what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2012-11-03

Joomla Parcoauto SQL Injection
Posted Nov 3, 2012
Authored by Andrea Bocchetti

The Joomla Parcoauto component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7ee1ffcee96f5c755f777a3f26f33fd8f270f72a6431ce800ceca27b2c2fcd87
ICS-CERT Advisory - C3-ILEX EOSCADA DoS / Leakage
Posted Nov 3, 2012
Authored by ICS-CERT, Dale Peterson | Site ics-cert.org

ICS-CERT Advisory 12-271-01 - This Advisory is a follow-up release to the original Advisory which was posted to the US-CERT secure Portal library October 08, 2012. Dale Peterson of Digital Bond has identified multiple vulnerabilities in the C3-ilex's EOScada application that can result in data leakage and a denial-of-service (DoS) condition. C3-ilex has produced a patch that resolves these vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2012-1810, CVE-2012-1811, CVE-2012-1812, CVE-2012-1813
SHA-256 | 2dbc28bc1abdae2611ac393447f9f3c191203496af620601f16a8d74aa1efb70
Pebble Open Redirection
Posted Nov 3, 2012
Authored by Takahisa Kishiya | Site jvndb.jvn.jp

Pebble versions prior to 2.6.4 suffer from an open redirection vulnerability.

tags | advisory
advisories | CVE-2012-5170
SHA-256 | 32719a02967e07d9ca2ff8d4aff8805e9c9a5ec0815afca86e925c05c19289e7
Secunia Security Advisory 51157
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | apple
SHA-256 | 1ba8115c5a31f29457cf9438aa0590dff8ac5889c06705eabf1f52d63d4a494f
Secunia Security Advisory 51162
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to disclose certain system information and compromise a vulnerable device.

tags | advisory, vulnerability
systems | cisco, apple
SHA-256 | e25387d7b7a6b810d95fa6745c1439a0d9f77041115255d972b0b78b71a8cbe5
Secunia Security Advisory 51102
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Pebble, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 2e03d52ea7e3bd693f084f87eab203b61b15676d4b7e4f208d6ffbed35679978
Secunia Security Advisory 51171
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in EOScada, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 737dc38e3f5fa5c9302f194d97dc133fd330dfa2ec08ac9a2f06640030e6fc3f
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close