exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 52 RSS Feed

Files Date: 2011-04-22 to 2011-04-23

Secunia Security Advisory 44311
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Automagick Tube Script, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 3cbca3718c0a5e41652ed28309683fd18151087cbb3823deca8473555d07242c
Secunia Security Advisory 44234
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three vulnerabilities have been reported in HP Proliant Support Pack, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct spoofing attacks or gain knowledge of sensitive information.

tags | advisory, spoof, vulnerability
SHA-256 | 6ede9eed80ecd139679cf8789bb6643d03052441ea5ca9cac2691a24cc502fff
Secunia Security Advisory 44329
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for kdenetwork. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | 603e6eebbd42948f3ebcdfae5396bd9e89b8f43e712c02158a972880488e1757
Secunia Security Advisory 44330
Posted Apr 22, 2011
Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

SHA-256 | bdf9f6db17533145a059a4db67c851b5bd43a369fe47aa60caa8f32ed520d387
Secunia Security Advisory 44330
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, redhat
SHA-256 | bdf9f6db17533145a059a4db67c851b5bd43a369fe47aa60caa8f32ed520d387
Secunia Security Advisory 44323
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three vulnerabilities have been discovered in ZenPhoto, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
SHA-256 | a747c5f8648eced824e3ce22465caac765dd859a2283fa377ccc9588ef67e7ea
Secunia Security Advisory 44315
Posted Apr 22, 2011
Site secunia.com

Secunia Security Advisory - A weakness has been discovered in Pulse CMS, which can be exploited by malicious people to disclose sensitive information.

SHA-256 | 45e9f670876071f40c708351203b387b86b5dc0f55e914741e1899dabd68b99a
Secunia Security Advisory 44285
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in web2Project, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 7637dc360b85e6b5a16d31aa1c2cab96a57585a0b90b8202ff6f97397f2d9d20
Secunia Security Advisory 44264
Posted Apr 22, 2011
Site secunia.com

Secunia Security Advisory - John Leitch has discovered two vulnerabilities in Dolibarr ERP/CRM, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information.

SHA-256 | c642021e9067f2892d88b61725c2ad14cb109b21a3ce47142e706e9a88b30076
Secunia Security Advisory 44327
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for postfix. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | linux, suse
SHA-256 | 975e2a9f44bd18804ba77f5e4d96a6e1131e56d00612e403deb299b0a2c55a73
Secunia Security Advisory 44323
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three vulnerabilities have been discovered in ZenPhoto, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
SHA-256 | a747c5f8648eced824e3ce22465caac765dd859a2283fa377ccc9588ef67e7ea
Secunia Security Advisory 44315
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been discovered in Pulse CMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 45e9f670876071f40c708351203b387b86b5dc0f55e914741e1899dabd68b99a
Secunia Security Advisory 44285
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in web2Project, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 7637dc360b85e6b5a16d31aa1c2cab96a57585a0b90b8202ff6f97397f2d9d20
Secunia Security Advisory 44264
Posted Apr 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered two vulnerabilities in Dolibarr ERP/CRM, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | c642021e9067f2892d88b61725c2ad14cb109b21a3ce47142e706e9a88b30076
Spreecommerce Arbitrary Command Execution
Posted Apr 22, 2011
Authored by joernchen | Site metasploit.com

This Metasploit module exploits an arbitrary command execution vulnerability in the Spreecommerce API searchlogic. Unvalidated input is called via the Ruby send method allowing command execution.

tags | exploit, arbitrary, ruby
advisories | OSVDB-71900
SHA-256 | 5f324564c756ec1163ada3b1c576328ce33a96570f58fa83e43acb3bf9d56e4e
Dolibarr 3.0.0 Local File Inclusion
Posted Apr 22, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in Dolibarr version 3.0.0 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
SHA-256 | efefe3ea8c6810ee1b670ebdcaa5526092580261c7cc1260a703f0ba6ed0f2ef
Dolibarr 3.0.0 Cross Site Scripting
Posted Apr 22, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in Dolibarr version 3.0.0 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | d40933a490a20ec99376edb8fcfdf191c2b6d3f52c7403f52d814f84aaa0429f
LightNEasy 3.2.3 SQL Injection
Posted Apr 22, 2011
Authored by AutoSec Tools | Site autosectools.com

A SQL injection vulnerability in LightNEasy version 3.2.3 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.

tags | exploit, arbitrary, shell, php, sql injection
SHA-256 | 93a1ba2d22f9b3d9d4a6a2fd2808c2d63040253943fdf3ad6963492f3074085f
Todayu 2.0.8 Cross Site Scripting
Posted Apr 22, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in Todoyu version 2.0.8 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | 8905a94f9ae11f23729ab5705029975f0e8f3fa55cf34596e953c48ab0ef4325
Web2Project 2.3 SQL Injection
Posted Apr 22, 2011
Authored by AutoSec Tools | Site autosectools.com

Web2Project version 2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 627a34cbf590c6a115d8710e1446b9296d812a1043dbd985cf440ede9c495a61
Asterisk Project Security Advisory - AST-2011-006
Posted Apr 22, 2011
Authored by Matthew Nicholson | Site asterisk.org

Asterisk Project Security Advisory - It is possible for a user of the Asterisk Manager Interface to bypass a security check and execute shell commands when they should not have that ability. Sending the "Async" header with the "Application" header during an Originate action, allows authenticated manager users to execute shell commands. Only users with the "system" privilege should be able to do this.

tags | advisory, shell
SHA-256 | 31ede85ee7d0cff21021d4dd6f89dfc438a48a6a387fbe72033246f6071a6e17
4images 1.7.9 SQL Injection / Path Disclosure
Posted Apr 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

4images version 1.7.9 suffers from path disclosure and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | ec8a032011134c00f1579ce76dd4a3c98b1ce8bad1a156a8c072bd2e686b630c
Hack.lu 2011 Call For Papers
Posted Apr 22, 2011
Site hack.lu

Call For Papers Hack.lu 2011 - The purpose of the hack.lu convention is to give an open and free playground where people can discuss the implication of new technologies in society. The convention will be held in the Grand-Duchy of Luxembourg from September 19th through the 21st, 2011.

tags | paper, conference
SHA-256 | 851f13b1c36beaa8bf216cdf1a7f9361919431b404d2e9700e9ca1e20d65634c
Win32 XP/SP3 MessageBox Shellcode
Posted Apr 22, 2011
Authored by Xecuti0N3r

73 bytes small Microsoft Windows 32-bit XP/SP3 MessageBox shellcode.

tags | shellcode
systems | windows
SHA-256 | 04a43186ea7b420fe973f0033f8313e9016718ea94b9cc348821109595146974
ZENphoto 1.4.0.3 Cross Site Scripting / Path Disclosure
Posted Apr 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

ZENphoto version 1.4.0.3 suffers from cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 1144a0505d5a54673c9cb3ad14c501b10a5311d7e4ae93639565b1b28542d45c
Page 2 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close