exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2013-01-28

Hunt CCTV Credential Disclosure
Posted Jan 28, 2013
Authored by Alejandro Ramos

Hunt CCTV and generic brands suffer from a file disclosure vulnerability that discloses authentication information.

tags | exploit, info disclosure
advisories | CVE-2013-1391
SHA-256 | 14b74ae440b4a6e07d0a98ee13f99a611c71523e6ac3e975712c53334e4ca50b
Kohana Framework 2.3.3 Directory Traversal
Posted Jan 28, 2013
Authored by Karim H.B., Vulnerability Laboratory | Site vulnerability-lab.com

Kohana Framework version 2.3.3 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | ea06955b013046f6fb45f73dc70e9f96d73e7d9d2dc5ae38af913fe70c4fa2f7
Mandriva Linux Security Advisory 2013-005
Posted Jan 28, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-005 - Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service or possibly execute arbitrary code via the x string repeat operator. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, overflow, arbitrary, perl
systems | linux, mandriva
advisories | CVE-2012-5195
SHA-256 | a30259c8c48c9d4f240f41c98a0bacfa483a7a6f42946a30309aa57aa4c6b8ec
Fortinet FortiMail IBE Appliance Application Filter Bypass
Posted Jan 28, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Exception-handling and input filter bypass vulnerabilities have been detected in Fortinet's FortiMail IBE Appliance Application versions 200D, 400C, VM2K, 2000B, and 5002B.

tags | exploit, vulnerability
SHA-256 | a7f37e90cd1bb9bf20490bf181d3c23bf5514eb7d341e42a733e7a2989dc440c
nCircle PureCloud Vulnerability Scanner Bypass / Injection
Posted Jan 28, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

nCircle PureCloud Vulnerability Scanner suffered from bypass and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d0981aa4c5de3af0ee27372b710e88674902e0a7e5c20ed0ad8cebb12d5f460a
PayPal Cross Site Scripting
Posted Jan 28, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

PayPal suffered from a persistent script insertion vulnerability.

tags | exploit
SHA-256 | 94a509e5cbb5161d8060abd3385a8bdff995a376f1b0272a7ceeefe20b90587d
Secunia Security Advisory 51950
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in some Hitachi Cosminexus products, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | f7f63c30907d30119a975529a141772b6a6dabdc64c7b35fae221d64bafb0133
Secunia Security Advisory 51964
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities with unknown impacts have been reported in FFmpeg.

tags | advisory, vulnerability
SHA-256 | 369e656326f644487f0a3ef70b3553bcc55c64ae2b38da43232ceb1bd7ac5f7a
Secunia Security Advisory 52008
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for java-1_7_0-openjdk. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, java, vulnerability
systems | linux, suse
SHA-256 | 4d4c484b763f9ab92e1f8e0f3ff1dd1906cb38fec839fe15818c7688b4c22b65
Secunia Security Advisory 52007
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Elgg, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 2be2a4f3e6daa87dea4d22e1baa1a95641dec8655ca9fe2581362ca2bc4659b9
Secunia Security Advisory 51913
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in ImageCMS, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 53b5e572c41f0b17636515e742b358d2aefa3d0194d9119ba4deb02286d6d7a7
Secunia Security Advisory 51955
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | da5276f8fb24a2bedf49c85d103f6ec22ef66af532912b0c5bedd73760385bfe
Secunia Security Advisory 51996
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cisco WebEx Social, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | cisco
SHA-256 | c019a4aa8266a3d87826bf3a8b7d1c26703fae12625c942990be6d5a2c1e35c3
Secunia Security Advisory 51954
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Unified Communications Domain Manager (CUCDM), which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | cisco
SHA-256 | 83fc431d44bd356bebf66fc24bdc9d2256918fbdd14e98ddb5a1d80b4c602cf2
Secunia Security Advisory 51924
Posted Jan 28, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Perforce Web Client (P4Web), which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | b96cbbd3af664534d7a0b2d63a65dc2935d7e4713445cd1714b82a28376c21e5
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close