exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2013-01-23

iTop Cross Site Scripting
Posted Jan 23, 2013
Authored by Stephan Rickauer | Site csnc.ch

iTop from Combodo suffers from a cross site scripting vulnerability. All trunk revisions prior to 2589 are affected.

tags | advisory, xss
advisories | CVE-2013-0805
SHA-256 | 90232c5bf04fbe0246837a2afea462fe74f1d981ab58938eec4e281605ec4ef4
Slackware Security Advisory - MySQL Updates
Posted Jan 23, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mysql packages are available for 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security and other issues.

tags | advisory
systems | linux, slackware
SHA-256 | 700e39fb63ceee4dffa98cfd80619fea202c7a50621640c01515e459761a0eca
Drupal Keyboard Shortcut Utility 7.x Access Bypass
Posted Jan 23, 2013
Authored by Michael Griego | Site drupal.org

Drupal Keyboard Shortcut Utility third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 71f6f5a0df7522634272e45cca714c1da1469d095fb151a60e3ba07ce632a69d
WordPress Chocolate Theme XSS / Denial Of Service / Shell Upload
Posted Jan 23, 2013
Authored by MustLive

The WordPress Chocolate theme suffers from cross site scripting, denial of service, path disclosure, abuse of functionality, and remote shell upload vulnerabilities.

tags | exploit, remote, denial of service, shell, vulnerability, xss, info disclosure
SHA-256 | 0a3fbe3735d9d16287a5efb8d639939ce812da95e23a71e2a0731c6b0b790dcb
Weboptima CMS Add Administrator / Shell Upload
Posted Jan 23, 2013
Authored by Akastep

Weboptima CMS suffers from add administrator and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, add administrator
SHA-256 | fc99f270ff007095d824949c224a7ce7178b34040bce8b1aaa503770f5db42fc
Secunia Security Advisory 51932
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in Performance Co-Pilot, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 5b029f65ffe1a45c72eacda59f98be785246d2bba82f52cc6fce0273d69f8080
Secunia Security Advisory 51906
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux
SHA-256 | 85ee624ed4d5004d2c9ee62a11155db57b58976b8e557bf06a9dd70a934b33c1
Secunia Security Advisory 51937
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes two vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) and to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 20437e38f7106bd1bb3e0f1b061ba42e72a30fd1efb3a8b2970f44e0e136c41d
Secunia Security Advisory 51934
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux, redhat
SHA-256 | 03ffc078cf0ec2f469d085820fb8a95d9459efca9cc38bf661c09a8b78b51e41
Secunia Security Advisory 51908
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for horde3-kronolith. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 13258d0b4a0a145f390b579152ffe770f00a065395f9c1ed7f260feaa8d4b8eb
Secunia Security Advisory 51900
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for freetype2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
systems | linux, suse
SHA-256 | c2c6afe3a3e97b574840e82722863fb413f57c7b83d1c74bb3b332ab45fad7dc
Microsoft Security Bulletin Re-Release For January, 2013
Posted Jan 23, 2013
Site microsoft.com

This bulletin summary lists two re-released Microsoft security bulletins for January, 2013.

tags | advisory
SHA-256 | 26595f551eaaa95b87991a65b1f6d4630a0bec89dca13038ba78126cacf31400
Secunia Security Advisory 51872
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in ownCloud, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5119c1655c6de8d45fb7fbf5310276f66a8eedd7928b069fa5c4b6cc1920857d
Secunia Security Advisory 51746
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in Proficy Real-Time Information Portal, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
SHA-256 | b51793b70a0e704b6feff1ba3d375ebf973c9647f8893ce47b8b715cd0f1f1c4
Secunia Security Advisory 51899
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in gpEasy CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 45f08123c1405e72d4d5c74daa9f178d0d6e352dfe7b37e5324a85fb00d7a470
Secunia Security Advisory 51931
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM WebSphere Application Server, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
SHA-256 | 0ce8c9681112b4b09115a1ae5e7f2410a7136d5f746a4d84e7e5a20641416daf
Secunia Security Advisory 51929
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for opera. This fixes a weakness, a security issue, and multiple vulnerabilities, where some have unknown impacts and others can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks, bypass certain security restrictions, disclose certain sensitive information, and compromise a user's system.

tags | advisory, local, spoof, vulnerability, xss
systems | linux, suse
SHA-256 | dc1cbb1497834e9cfb295e36167debb18221541c9a6e31650eefa01e4a3e3568
Secunia Security Advisory 51962
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for freeradius-server. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, suse
SHA-256 | 8f250a8a65947e600a46a6def3da91e11b66042d5b5f5a99eaf34f7f01f3d639
Secunia Security Advisory 51945
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM WebSphere Application Server, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 8912adaaa6248cdc0f70c65f85823d16ea09a9f46260924e310940149a22e9eb
Secunia Security Advisory 51956
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for otrs. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
systems | linux, suse
SHA-256 | c1335a9e7d91dcfcd6aad4d3d0edfc47284f2d245561892d2c1b1b335cb8bb22
Secunia Security Advisory 51959
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for acroread. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, suse
SHA-256 | 2ee578254e8c6b6bad698fd25707e75db226e2b83ff9b9fea847a6ddb95992ee
Secunia Security Advisory 51740
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ERPScan has reported multiple vulnerabilities in SAP NetWeaver, which can be exploited by malicious people to disclose certain sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | cfb0e5a1b034291bdcf971f3e3290db6351fa9bef8bbbb734133ff89df8a1ac8
Secunia Security Advisory 51958
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for nagios. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | fc402ae525e44c7f1f5f267e4ff7aeaee084467086861200f7e614399221476d
Java Applet AverageRangeStatisticImpl Remote Code Execution
Posted Jan 23, 2013
Authored by juan vazquez, temp66 | Site metasploit.com

This Metasploit module abuses the AverageRangeStatisticImpl from a Java Applet to run arbitrary Java code outside of the sandbox, a different exploit vector than the one exploited in the wild in November of 2012. The vulnerability affects Java version 7u7 and earlier.

tags | exploit, java, arbitrary
advisories | CVE-2012-5076, OSVDB-86363
SHA-256 | d60e88d1c35ce2c590ccaca3bb69232e1fa72e0dc95b7d237cae3e89eaf0668a
Java Applet Method Handle Remote Code Execution
Posted Jan 23, 2013
Authored by juan vazquez, temp66 | Site metasploit.com

This Metasploit module abuses the Method Handle class from a Java Applet to run arbitrary Java code outside of the sandbox. The vulnerability affects Java version 7u7 and earlier.

tags | exploit, java, arbitrary
advisories | CVE-2012-5088
SHA-256 | 56cdda70d19b81c54b81eafca0cce9a0e594a89c837b327c0ae866038e17e745
Page 1 of 2
Back12Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close