Exploit the possiblities
Showing 1 - 24 of 24 RSS Feed

Files Date: 2012-11-14

Call Of Duty: Modern Warfare 3 NULL Pointer Dereference
Posted Nov 14, 2012
Authored by Luigi Auriemma, Donato Ferrante | Site revuln.com

This paper describes a pre-auth server-side NULL pointer dereference vulnerability in Call Of Duty: Modern Warfare 3, which is due to an issue related to the DemonWare6 query packets. This vulnerability can be exploited to perform Denial of Service (DoS) attacks against game servers.

tags | advisory, denial of service
MD5 | f81259fd248e1c5f858de6428a1df2bf
MYREphp Business Directory Cross Site Scripting / SQL Injection
Posted Nov 14, 2012
Authored by d3b4g

MYREphp Business Directory suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | ab36e8fcb65360af9160ed03c5f47b57
MYREphp Vacation Rental Cross Site Scripting / SQL Injection
Posted Nov 14, 2012
Authored by d3b4g

MYREphp Vacation Rental suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 957962854d638d77d15eccca1b02e726
Novell Groupwise Internet Agent Overflow
Posted Nov 14, 2012
Authored by Francis Provencher

An overflow error occurs in GroupWise Internet Agent (gwia.exe) when the LDAP service process receives an overly long BIND Request. Successful exploitation may allow execution of arbitrary code. Versions 8.0.2 HP3 and 2012 are affected. Proof of concept code included.

tags | exploit, overflow, arbitrary, proof of concept
MD5 | 02c8d73536b740e4d34f4bff6b462f34
Red Hat Security Advisory 2012-1462-01
Posted Nov 14, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1462-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2012-0540, CVE-2012-1688, CVE-2012-1689, CVE-2012-1690, CVE-2012-1703, CVE-2012-1734, CVE-2012-2749, CVE-2012-3150, CVE-2012-3158, CVE-2012-3160, CVE-2012-3163, CVE-2012-3166, CVE-2012-3167, CVE-2012-3173, CVE-2012-3177, CVE-2012-3180, CVE-2012-3197
MD5 | a1ba73432d29e6789e9286158c52fc6d
Red Hat Security Advisory 2012-1461-01
Posted Nov 14, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1461-01 - libproxy is a library that handles all the details of proxy configuration. A buffer overflow flaw was found in the way libproxy handled the downloading of proxy auto-configuration files. A malicious server hosting a PAC file or a man-in-the-middle attacker could use this flaw to cause an application using libproxy to crash or, possibly, execute arbitrary code, if the proxy settings obtained by libproxy instructed the use of a PAC proxy configuration. This issue was discovered by the Red Hat Security Response Team.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-4505
MD5 | 5c7c38c7b43fef0aee8ed37686f58192
Drupal User Read-Only 6.x / 7.x Access Bypass
Posted Nov 14, 2012
Authored by Kellie Bradford Delaney | Site drupal.org

User Read-only is a module that allows an administrator to prevent modification of user account/profile fields. The administrator can select which fields will allow or disallow editing. The module can mistakenly assign roles when performing unrelated operations against a user's account such as changing a password. The vulnerability is particular to certain combinations of configuration and the number of roles available on the site (more than 3). Versions 6.x and 7.x are affected.

tags | advisory
MD5 | 11287af464d679c00446f97615e2b3c5
Hakin 9 Cross Site Scripting
Posted Nov 14, 2012
Authored by Pieter

Hakin 9's site at hakin9.org suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
MD5 | 1dfc8498afdb39640e542caca8096526
Secunia Security Advisory 51269
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with an unknown impact have been reported in the WP-Filebase Download Manager plugin for WordPress.

tags | advisory, vulnerability
MD5 | a9ee8836a3c555cbf94082b432d4cb1b
Secunia Security Advisory 51265
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and multiple vulnerabilities have been reported in Bugzilla, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
MD5 | af64efb82cec4157c00fd94c6c120fb2
Secunia Security Advisory 51247
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM WebSphere Real Time, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
MD5 | a2d3339bb51fd18935d1ddefb7cbb1a4
Secunia Security Advisory 51264
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability Lab has reported two vulnerabilities in ManageEngine Exchange Reporter Plus, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 58e46d4a0388c1ec2058bcf2ad92865a
Secunia Security Advisory 51082
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Zhao Liang has discovered a vulnerability in the DX-Contribute plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | c8d425e3c34dfcf6b918aece2c85247a
Secunia Security Advisory 51245
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | b7f04b7b4c60a7fdc750cc5fca98833f
Secunia Security Advisory 50971
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the Amazon Associate plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 453d10b27ee80e71cfe6379e7118a06b
Secunia Security Advisory 51243
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities with unknown impacts have been reported in Moodle.

tags | advisory, vulnerability
MD5 | f9d82427c43f33492f84d76cdfee8755
Secunia Security Advisory 51275
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux, redhat
MD5 | c9bfc246b9faf8965900440db1c80a2d
Secunia Security Advisory 51271
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the NextGEN Gallery plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 2e9df828243da0d2cdb2594ea01d62bc
Secunia Security Advisory 51267
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability lab has reported multiple vulnerabilities in idev-Rentals, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | 0194b8399431cb41312632c4f44d1cbf
Secunia Security Advisory 51037
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Advanced Custom Fields plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | d0cdb27b306f3ef45c56c5fefee0fecb
Secunia Security Advisory 51248
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ERPScan has reported two vulnerabilities in SAP NetWeaver, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
MD5 | f92a71018184766d67cbdff8825687f6
Secunia Security Advisory 50972
Posted Nov 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered two vulnerabilities in the Buddystream plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 402e999f6e97ff6280e04481660c55e3
OpenDNSSEC 1.3.11
Posted Nov 14, 2012
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: NSEC3PARAM TTL should be set to zero. Multiple bugfixes have been added.
tags | tool
systems | unix
MD5 | 074da6590b227710a4bde64594a7a41e
Another File Integrity Checker 3.2
Posted Nov 14, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This is the second release of the new 3.x branch (a progressive rewrite in object oriented programming). Many bugs were fixed. A new plugin (stat_date) was added. The class Afick::Tst was added.
tags | tool, integrity
systems | linux, windows, unix
MD5 | 720ca380c7a5177be14239cf434e05ec
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    42 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close