exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2012-11-09

netOffice Dwins 1.4p3 SQL Injection
Posted Nov 9, 2012
Authored by dun

netOffice Dwins versions 1.4p3 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 39d41b4252de6df2de9804cbc38a0b31dfb7d7ffc050c10e0eb5d04a5d71b5ac
WordPress 3.3.1 swfupload.swf Cross Site Scripting
Posted Nov 9, 2012
Authored by MustLive

WordPress versions 2.5 through 3.3.1 suffer from a cross site scripting vulnerability in swfupload.swf.

tags | exploit, xss
SHA-256 | 3416c49055bebf361d1b122069bea5e7c90603b251960c5d38d0e202bb70d922
WordPress Eco-Annu SQL Injection
Posted Nov 9, 2012
Authored by Ashiyane Digital Security Team

The WordPress Eco-Annu third party plugin suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ed3ca78a5025666d9498723d9c589c3e9b99e671791dd50f388c64c98aac4e65
WordPress Calendar-Script Blind SQL Injection
Posted Nov 9, 2012
Authored by Ashiyane Digital Security Team

The WordPress Calendar-Script third party plugin suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 549093d17c959ce61a3b1cd9307c4708a3ae75a2861fd1f08ae6fdb629496b90
WordPress Kakao Theme SQL Injection
Posted Nov 9, 2012
Authored by Iranian Datacoders Security Team, sil3nt

The WordPress Kakao theme suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 3dc2268c974652d6a7dc818180fe747ab9e25822e57cf9844178f7d63c47f4b5
Mandriva Linux Security Advisory 2012-171
Posted Nov 9, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-171 - A buffer overflow flaw was found in the IcedTea-Web plug-in. Visiting a malicious web page could cause a web browser using the IcedTea-Web plug-in to crash or, possibly, execute arbitrary code. The updated packages have been upgraded to the 1.1.7 version which is not affected by this issue.

tags | advisory, web, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-4540
SHA-256 | 88b35f7abf8cc91226293af1402cd75d1bf293c0c5e90974ed919b1ffe98ec0f
Cisco Security Advisory 20121108-sophos
Posted Nov 9, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IronPort Email Security Appliances (ESA) and Cisco IronPort Web Security Appliances (WSA) include versions of Sophos Anti-Virus that contain multiple vulnerabilities that could allow an unauthenticated, remote attacker to gain control of the system, escalate privileges, or cause a denial-of-service (DoS) condition. An attacker could exploit these vulnerabilities by sending malformed files to an appliance that is running Sophos Anti-Virus. The malformed files could cause the Sophos antivirus engine to behave unexpectedly. As updates that address these vulnerabilities become available from Sophos, Cisco is working to qualify and automatically provision them through the Cisco Ironport ESA and WSA platforms. A workaround that mitigates these vulnerabilities is available.

tags | advisory, remote, web, vulnerability, virus
systems | cisco
SHA-256 | e0ba938d57783cbbfba45d30d5729f99796cfd43b619a82057d2ab76f7d6aa26
360-FAAR Firewall Analysis Audit And Repair 0.3.7
Posted Nov 9, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release fixes many of the bugs in the cisco reader and writer sections. Cisco configs can now be processed written, re-read, processed and written again cyclically. Access lists using proto groups, specifying only protocol details or using 'ip/any' services are now handled. Protocol group-objects are written and used in rules for service groups with many different protocol types specified within them. 'port-objects' are read in service objects, service groups and protocol groups alike. The cisco 'echo' default service has been updated to remove tcp and udp from its listed ports.
tags | tool, perl
systems | unix
SHA-256 | 8680b4e7358b1f8228ccc1ad72f65c83c7889eadc6a887adb27b060b96b044df
Microsoft Office Excel 2007 Memory Corruption
Posted Nov 9, 2012
Authored by coolkaveh

Microsoft Office Excel 2007 suffers from a WriteAV memory corruption vulnerability.

tags | exploit
systems | linux
SHA-256 | d0a125ddf295b440347d165196d4286ebce9a077959e87b13d5e075845006d02
Secunia Security Advisory 51226
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | apple
SHA-256 | 331b030466d2f9fef68aed123f9275211f457ccf2f060f43d7d88ab92a21df10
Secunia Security Advisory 51194
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Secure ACS, which can be exploited by malicious people to bypass security restrictions.

tags | advisory
systems | cisco
SHA-256 | 84921ef5463be4f49de534410773afdc975a2c0be73db3040837f1172299896f
Secunia Security Advisory 51174
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenStack, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 5d40f3c7047d2ddfc29491cd39c60373d1fb95046d96a24a0d92229ba461213d
Secunia Security Advisory 51220
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for icedtea-web. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory, web
systems | linux, redhat
SHA-256 | a8d4a91869a77f25486898439f8f55d9fd693ec786ba85d2d06a95b7fd868f89
Secunia Security Advisory 51158
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Tivoli Monitoring for Energy Management, which can be exploited by malicious, local users to disclose potentially sensitive data and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 459044ec33e40e7e00ae4dc86e251a0dd6ec8978ab904f0f3e7051761996ddc9
Secunia Security Advisory 51191
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the OM Maximenu module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 0db0f99f8cf70b4d0a7f1ab95fbf767304e356893733709d9444483388cdf2b1
Secunia Security Advisory 51203
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Pattern Insight Code Assurance, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | a7974423b89157ced0ba2cb6ae6e9160f2e0678b16df9cb3c56b077dddffdb92
Secunia Security Advisory 49856
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ecaab2e98606754f083cbeaf42919774e548699df825d9a5acb059002933a0bb
Secunia Security Advisory 51234
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for glance. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | bcbd8c6e6b96fe0f4be1cff800f23ce75457a8b76a8380e966e5570536c89c09
Secunia Security Advisory 51132
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stratsec has reported multiple vulnerabilities in Intramaps, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 6e50b694456ffcd31e5346876abf5c04ba772f8b9ab5f7b8cffb605ea6001256
Secunia Security Advisory 51237
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VMware Workstation and VMware Player, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.

tags | advisory, local, vulnerability
SHA-256 | 7267a60a595e89b8f964de0cfcb4220508398dab30abe740eb5a759bbcf16c70
Secunia Security Advisory 51240
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VMware OVF Tool, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a9f55e42c56739af89c7cd8931d214ecb42eef96a080d5d27946bc26866386da
Secunia Security Advisory 51217
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in TYPO3, which can be exploited by malicious users to conduct script insertion attacks, bypass security restrictions, and conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | ee1533a94aae39070e71a92030f14ca0fe392f274e8e26c022868b6fbfbb333e
Secunia Security Advisory 51197
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security Appliance and Cisco IronPort Email Security Appliance, which can be exploited by malicious people to compromise a vulnerable device.

tags | advisory, web, vulnerability
systems | cisco
SHA-256 | a3a7edc23ae3b8b2fb6a10a5e18ccdf22bddd5eeb714020f5c32b9282b9767cb
Secunia Security Advisory 51225
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, ubuntu
SHA-256 | 70bf691b821d72685c60f6757d5025871ab0532b0ce35e951cca345164c9aa61
Secunia Security Advisory 51216
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere MQ, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 803f893fa5e5facd159d70351ea3a046f710ec269ba00903cd83032b37688526
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close