what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 34 RSS Feed

Files Date: 2012-01-10 to 2012-01-11

Big B Trading CMS Cross Site Scripting
Posted Jan 10, 2012
Authored by Am!r, H4ckCity Security Team | Site irist.ir

Big B Trading CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 97c9531ca17a700e32176711d09bc47eda6bba3e427db84a9f14e70b8f66bbbb
Zero Day Initiative Advisory 12-008
Posted Jan 10, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-08 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Citrix Provisioning Services. Authentication is not required to exploit this vulnerability. The specific flaw exists within the streamprocess.exe component which listens for UDP traffic on multiple ports, beginning with 6905. When handling a packet which requests a vDisk name, the user-supplied length value is not properly validated. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, udp
SHA-256 | e5cec0d5fc3c15d052d61b16dbca622d563f1cb0132cd343599dd00b030e4c7c
Mandriva Linux Security Advisory 2012-003
Posted Jan 10, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-003 - Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a.htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of RewriteRule and ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an \@ character and a : character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, overflow, local
systems | linux, mandriva
advisories | CVE-2011-3607, CVE-2011-4317
SHA-256 | c67cf79a3c62b81057754ad363ae14900efdb1f1fcbad2d4c3fd00086a37d2b6
W-CMS 2.01 Cross Site Scripting / Directory Traversal
Posted Jan 10, 2012
Authored by th3.g4m3_0v3r

W-CMS version 2.01 suffers from cross site scripting and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
SHA-256 | 8e52c729a0a5efbace8d33fd10b640922db038a33dcc439763c29ee908f0e98e
PHP Vulnerability Hunter 1.2.0.2
Posted Jan 10, 2012
Authored by AutoSec Tools | Site autosectools.com

PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.

Changes: Fix made in relation to the error reporting.
tags | arbitrary, local, php, vulnerability, file inclusion, fuzzer
SHA-256 | 3c0e45c995b45ccd06e3e1921ce42b2dc006e7c50ef41f09e35465397971feca
Secunia Security Advisory 47490
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi IT Operations Director, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0503c80bf3a52b719d4e2306f1572fa24b25c8f707a39e19c1b8757810d7cf75
Secunia Security Advisory 47472
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel
systems | linux
SHA-256 | e9d8e0215356abdf73385c32aa3ee78b2ab20896254e97466e2b60d3269cfc00
Secunia Security Advisory 47473
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Application Server Community Edition, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 638e530256d1c54758afbff4c273a7d6665c72dfc693d86c9db2b8c956edf9e7
Secunia Security Advisory 47463
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in libvirt, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | ff7806022737c21d583a093fd4fa9294df1c0622115cc7f8dd222d58d045df1c
Secunia Security Advisory 47467
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi IT Operations Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ce4610f11086d9231fe07460b6ce095571fb543acb42fe387521d64fe281c034
Secunia Security Advisory 47515
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Emacs, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 443743f9994927b58bb3699fd4bb154dbd58fa6d9325951092dcc3a2c353660a
Secunia Security Advisory 45189
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | edbbe10ce1a486316c7bbf668a523fc52e89d99b79c1b2bbd442084283a4e5fb
Secunia Security Advisory 47311
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CEDET, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5f872b61abc5ccd2696f145ccca53efecd1b12dbae23ab63b7690553051e1848
Secunia Security Advisory 47483
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft AntiXSS Library, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 06895b9aa92b12d7f37ac65e4bc163fe6b10fbdb94b7a08b0b737655563bb18f
Secunia Security Advisory 47476
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.4.2-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | b1a5b002667d20b6e9d78dc302058395fc30f4f7366d7701e770a187a5a5eaaa
Secunia Security Advisory 47466
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in dl Download Ticket Service, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 6ff61deaf8c3cfb8981938c9c520af19b7be16cc2b07e7da9a1aaf4219f8d292
Secunia Security Advisory 47455
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cacti. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
systems | linux, debian
SHA-256 | b84ad5133b7057bb7d0526d78cec33ee5d2547146e4a68c611b19c653d43417c
Secunia Security Advisory 46748
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered two vulnerabilities in X3 CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | c15aae8399c88092db73f704917c8d4746398276e79ed98b7ac6f3a983e9fe1d
Secunia Security Advisory 47485
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | windows
SHA-256 | 863727e71b5457a41c29a432aac1f3b8cf2ad54810fc7c6c2c14f7545fb2d993
Secunia Security Advisory 47461
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in razorCMS, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 1b98bf182060e3c5f682756efe8d8aa90564599665e7769a7a06357e5afe896a
Secunia Security Advisory 47492
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in SumatraPDF, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | c4534b20958c9f87dc142e923e1079210f7bdca3210798442a602e4ce6c5d6de
Secunia Security Advisory 47356
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security features.

tags | advisory
systems | windows
SHA-256 | b5afc94ac322dd5513921076204c2f24455af1d5fe508e0603a21b26d82481e2
Secunia Security Advisory 47516
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft AntiXSS Library, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 9471cb4743c5b83f5a04cdaa812ecba8267a115e6d737935610b90feb402ac49
Secunia Security Advisory 47480
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 7909289c308819317964b6764b4094755775e0af592573e7dc3f8fec970eccd5
Secunia Security Advisory 47479
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | ccd670605d7ce8588871bd4ff27567202a99042c493b06d93dd22c3cf99326f5
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close