what you don't know can hurt you
Showing 1 - 25 of 40 RSS Feed

Files Date: 2013-01-11

Secunia Security Advisory 51835
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in T3 jQuery extension for TYPO3, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | c41e737627f43bacb2abd175508c38f3
Secunia Security Advisory 51769
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported a vulnerability in Quick.Cms, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 753f347629139a69785e2a761447bc8d
Secunia Security Advisory 51818
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in phpCAS, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | 9a94e2ebfc024b01272f967f1d9b0cf8
Secunia Security Advisory 51821
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple weaknesses have been reported in Apache CloudStack, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
MD5 | af1b58914e6884fd595bae2f0371409f
Secunia Security Advisory 51836
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Static Methods since 2007 extension for TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 66ceb3d55238a631eaedaa223f2757e2
Secunia Security Advisory 51831
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for Ruby on Rails. This fixes two vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system.

tags | advisory, vulnerability, sql injection, ruby
systems | linux, redhat
MD5 | 42f2fcb5a80da76f0b5a6161aec8614e
Secunia Security Advisory 51767
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Nero MediaHome, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 265d327f6918b1851bcbb8b10f8471e9
Secunia Security Advisory 51839
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in DotNetNuke, which can be exploited by malicious users to disclose potentially sensitive information and potentially cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 40b825892329cb85ffd79e22e592bcbb
Secunia Security Advisory 51797
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in WeBid, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | 0e9e5cb79ca8e6eaf485d2d7b188a6b3
Secunia Security Advisory 51808
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the multi_xml gem for Ruby, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, ruby
MD5 | 6dc796ef7c6e6a205b73aa783196b7df
Secunia Security Advisory 51827
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple weaknesses has been reported in Citrix CloudPlatform, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
MD5 | 50aaefc7cf6774a42b00e5bc4aa3e11d
Secunia Security Advisory 51744
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for OpenIPMI. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, redhat
MD5 | e6f941522f50bf4cf98c0da1335be26e
Secunia Security Advisory 51775
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for JBoss Enterprise Portal Platform. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, redhat
MD5 | d95d02fe97a5cde53860a399220efbbe
Secunia Security Advisory 51723
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, ruby
systems | linux, redhat
MD5 | 6f6856e20772485c3500433fd9b70d13
Secunia Security Advisory 51774
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for net-snmp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | dbf9d9a02b2a82906d35867345278a44
Secunia Security Advisory 51726
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for gtk2. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, redhat
MD5 | 16bfe68a2a510d6c1a6338a043755ad3
Secunia Security Advisory 51779
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for mysql-community-server. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, suse
MD5 | e43df7e45563b07f0b3ac3ccd318d3c5
Secunia Security Advisory 51791
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, local, vulnerability
MD5 | 84038708506220648abcf6dc7b9614ba
Secunia Security Advisory 51787
Posted Jan 11, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, and compromise a user's system.

tags | advisory, spoof, vulnerability
MD5 | 3657916c98e9d591b61b5030ca4ee04c
Slackware Security Advisory - Seamonkey Updates
Posted Jan 11, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 13.37, 14.0, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | d54e9a15bd46f35cd52324c63114351c
Java Applet JMX Remote Code Execution
Posted Jan 11, 2013
Authored by unknown, egypt, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module abuses the JMX classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in January of 2013. The vulnerability affects Java version 7u10 and earlier.

tags | exploit, java, arbitrary
advisories | CVE-2013-0422
MD5 | 30886a5fe5a8c62f2f65b5d9af2cfd89
Ruby On Rails XML Processor YAML Deserialization Code Execution
Posted Jan 11, 2013
Authored by H D Moore, lian, espes, charliesome | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in the XML request processor of the Ruby on Rails application framework. This vulnerability allows an attacker to instantiate a remote object, which in turn can be used to execute any ruby code remotely in the context of the application. This Metasploit module has been tested across multiple versions of RoR 3.x and RoR 2.x The technique used by this module requires the target to be running a fairly version of Ruby 1.9 (since 2011 or so). Applications using Ruby 1.8 may still be exploitable using the init_with() method, but this has not been demonstrated.

tags | exploit, remote, code execution, ruby
advisories | CVE-2013-0156
MD5 | 49cbb8a2818a2dd977c6e68b4115b578
Hero Framework 3.76 Cross Site Scripting
Posted Jan 11, 2013
Authored by Stefan Schurtz

Hero Framework version 3.76 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 80f179901865666982514309c5b79f2c
Internet Explorer 8 Heap Overflow
Posted Jan 11, 2013
Authored by sickness

Internet Explorer 8 heap overflow exploit with ASLR and DEP bypass that spawns a bind shell on port 4444.

tags | exploit, overflow, shell
advisories | CVE-2012-1876
MD5 | 318bf5718bdfe80a5c3f1a9d1fbcc2a6
Slackware Security Advisory - Mozilla Thunderbird Updates
Posted Jan 11, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 13.37, 14.0, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | 9dff3663bb26d2778279ca04840c9af8
Page 1 of 2
Back12Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    16 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close