exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files Date: 2012-11-07

Secunia Security Advisory 51185
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge has discovered a vulnerability in CMS Made Simple, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | c42b2a48e1b46f3cd8d45fd4fe28f29823194ab1b5c53c2f81d8bf9e5d2626f7
Secunia Security Advisory 51160
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in KVM, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 6d94979ec60318361bc0da4ad145ab75e8cc91d79aab04664e6b00bd71f01890
Secunia Security Advisory 51228
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes two vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | 0277fdcdb2ba6febd61a4c5eeb890c350235fea0b4e83ba1214ba51ee899bd33
Secunia Security Advisory 51207
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
systems | windows
SHA-256 | 4d865087bdde42e36a0bee3b6bb50a8e049b24cd3a12123ee78fd55bd6f8bbab
Secunia Security Advisory 51178
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Collax Business Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain security restrictions.

tags | advisory, denial of service, vulnerability
SHA-256 | 6b152fd97c8aa8561d0ae77b765a0efd9c5f8291cc5f201b31dc6e0bd6452fbb
Secunia Security Advisory 51179
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Hitasoft FLV Player plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 02ab5a66a9862133b36c8b893d869f52838704ae8a0b8fb9b46cd9431616880a
Secunia Security Advisory 50980
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in Pretty Link Lite plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 5116033791664b809082df10079ee858884865145af8837790f9f938a2ad7898
Secunia Security Advisory 51182
Posted Nov 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Sopas has reported a vulnerability in PrestaShop, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 62d4f6d5123e1913e2366b4f2e1f80f477f69f0dbd0d808c096069f01d5660f7
HP Security Bulletin HPSBHF02699 SSRT100592 2
Posted Nov 7, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF02699 SSRT100592 2 - A potential security vulnerability has been identified with HP ProLiant SL Advanced Power Manager (SL-APM). The vulnerability can be remotely exploited to incorrectly validate a user. Revision 2 of this advisory.

tags | advisory
advisories | CVE-2011-2405
SHA-256 | 3cf68e5b88ec21a5bfc2420fecc6f79484a890725505ae3a5ea576415057239c
WordPress Hitasoft FLV Player 1.1 SQL Injection
Posted Nov 7, 2012
Authored by Ashiyane Digital Security Team

WordPress Hitasoft FLV Player version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 39a23a454ed7bdf872f6e0cb391c71d58e45dfa358daac8cf318820d03c52f9c
PHP Support Tickets 1.9 Cross Site Scripting
Posted Nov 7, 2012
Authored by Sys_A501

PHP Support Tickets version 1.9 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | cf9f3edba165acca992de02c1ba78353df5d2c12b3db9021395b0b36f94cd88d
Wisecracker Cryptanalysis Framework
Posted Nov 7, 2012
Site selectiveintellect.com

Wisecracker is an open source high performance distributed cryptanalysis framework that leverages GPUs and multiple CPUs. It allows security researchers to write their own cryptanalysis tools that can distribute brute-force cryptanalysis work across multiple systems with multiple multi-core processors and GPUs. Security researchers can also use the sample tools provided out-of-the-box. The differentiating aspect of Wisecracker is that it uses OpenCL and MPI together to distribute the work across multiple systems, each having multiple CPUs and/or GPUs.

tags | tool, cracker
SHA-256 | 2d665503012b9624c671aa3baf865d92c5661427873b0007104aa8506cab66e7
OrangeHRM 2.7.1-rc.1 Cross Site Request Forgery / SQL Injection
Posted Nov 7, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

OrangeHRM version 2.7.1-rc.1 suffers from cross site request forgery and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
advisories | CVE-2012-5367
SHA-256 | 439484ab92a26f93c029153c595de5755d66408db277b54f3d4df86561bf82d6
LibreOffice Suite 3.5.5.3 Denial Of Service
Posted Nov 7, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

LibreOffice Suite version 3.5.5.3 suffers from multiple null pointer denial of service vulnerabilities. Multiple proof of concepts included.

tags | exploit, denial of service, vulnerability, proof of concept
systems | linux
advisories | CVE-2012-4233
SHA-256 | e35f8a5b17053ef5bbb7453b17da615dd29fdbd2c8de140c6974ca04b33f0fb0
Red Hat Security Advisory 2012-1426-01
Posted Nov 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1426-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the Linux kernel's memory management subsystem in the way quota handling for huge pages was performed. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. A use-after-free flaw was found in the madvise() system call implementation in the Linux kernel. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges.

tags | advisory, denial of service, kernel, local
systems | linux, redhat
advisories | CVE-2012-1568, CVE-2012-2133, CVE-2012-3400, CVE-2012-3511
SHA-256 | 1c51791335b35fcf313a290b696d7666712d6132c06e90364cc5a335638b96d9
Red Hat Security Advisory 2012-1430-01
Posted Nov 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1430-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way socket buffers (skb) requiring TSO (TCP segment offloading) were handled by the sfc driver. If the skb did not fit within the minimum-size of the transmission queue, the network card could repeatedly reset itself. A remote attacker could use this flaw to cause a denial of service.

tags | advisory, remote, denial of service, kernel, tcp
systems | linux, redhat
advisories | CVE-2012-3412
SHA-256 | 6934f4570406fb45fc13956b0cd5036e826fe5786a70bce3ee6a7bc4c54665ee
MD Webmarketing Cross Site Scripting / SQL Injection
Posted Nov 7, 2012
Authored by Caleb Bucker

Sites designed by MD Web Marketing suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, web, vulnerability, xss, sql injection
SHA-256 | 3a00d23d42a0ad63be2664695acb8d84cf5986c73cadfa69c1f59b83ac5425a2
Proyectos Margarita SQL Injection / LFI
Posted Nov 7, 2012
Authored by Ur0b0r0x

Sites designed by Proyectos Margarita suffer from local file inclusion and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 9ece24a9420e1feb71ab0c7a445c013ff983b85a06710bb90c608f1c228032d0
Saintel Consultores Cross Site Scripting / SQL Injection
Posted Nov 7, 2012
Authored by Ur0b0r0x

Sites designed by Saintel Consultores suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 3a4a76d8376ece48a6960d7d1a8bd97baf6f1459d45f9a696ed0255adbe4b5e9
RodWare SQL Injection
Posted Nov 7, 2012
Authored by Ur0b0r0x

Sites designed by RodWare suffer from multiple remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 5c1fd9e5dc16f4a290f09aba8c4ddc418ba8ef72df7cb6e3eb84e65d7d085a73
DNS Brute Force 0.2
Posted Nov 7, 2012
Authored by Julien CAYSSOL

This is a basic DNS brute forcing utility that takes in a dictionary file. Requires pyDNS and is written in Python.

Changes: Integration of Queue in thread management. Logger added.
tags | cracker, python
systems | linux
SHA-256 | ccf4b13bb77e7f6b233b15740f62935577f5ebfd78e85d18af69b9638e2a194d
LastClick Cross Site Scripting / SQL Injection
Posted Nov 7, 2012
Authored by Ur0b0r0x

Sites designed by LastClick suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | f6b78a0a9b44b9102c45d488b41fc739385903b52d81cc27fe75f4ca54a09b23
AustroSoft Cross Site Scripting / SQL Injection
Posted Nov 7, 2012
Authored by Ur0b0r0x

Sites designed by AustroSoft suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 29972de0faabede6015656e5129a45200fa2d42f1ced224324da8325154e6484
Arwen Cross Site Scripting / SQL Injection
Posted Nov 7, 2012
Authored by Ur0b0r0x

Sites created by Arwen suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | fdf90433cc7ced7c14248627f4e36c7e52ce5b1a519e61fdc3cf18664977a1d1
ON Technologia Cross Site Scripting / SQL Injection
Posted Nov 7, 2012
Authored by Ur0b0r0x

ON Technologia suffers from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | e4f2769c0c2392ef37a2b18ed383d380c5c9c550eb7f8605e6d6fc7970120e78
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close