exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 970 RSS Feed

Files Date: 2012-01-01 to 2012-01-31

Secunia Security Advisory 47691
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in DClassifieds, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 6ce2fbe994fab9b7edd8d23a393ffd074bdcb336e4c753e2d980a7a1070b3fc9
Secunia Security Advisory 47779
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Apache HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, web, denial of service, vulnerability
SHA-256 | d5416919a14910653e520de295c93869bd39f9c94975208b811584c384e3254b
Ajax Upload Shell Upload
Posted Jan 30, 2012
Authored by Daniel Godoy

Ajax Upload suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 55e320cf750e5028c05b68822b93d6d827a327692afa630f89b10250ebb7a9c9
PragmaMX 1.2.0 Persistent Cross Site Scripting
Posted Jan 30, 2012
Authored by HauntIT

PragmaMX version 1.2.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2acac9b9475fc75a7b022b1c9a2cbb62579325ae6f2cfe22066476045b410c91
HostBill Remote Code Injection
Posted Jan 30, 2012
Authored by Dr.DaShE

HostBill version 2.3 suffers from a remote php code injection vulnerability.

tags | exploit, remote, php
SHA-256 | bcb244d34c68f571539f3344ef065d8dbacc846a2e8ffcfa018945effa5af995
Secunia Security Advisory 47721
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for qemu-kvm. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 7a85b19a07004b670561a7a7a9160e7c55855754504afd0668b19e3ce77c2093
Secunia Security Advisory 47763
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Samba, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 14309a8acef624203641ff15d5959a7c02824e8c82f87fffd14e0b01197992e3
Secunia Security Advisory 47765
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | 66971616d229ba8cc44f9a624df34c67061a43a0f2c89c678fee140536146f6a
Secunia Security Advisory 47803
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ogro has reported a vulnerability in Ada Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, web, denial of service
SHA-256 | dd4e97d5184145da9ef2b8af50f4ac56a608de85746d57a9489efe65af5a5f11
Secunia Security Advisory 47714
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for icu. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
SHA-256 | d1cfd72e14abd163f84a6d362d3e0f0d464624e8de190b9fef81311545244569
Secunia Security Advisory 47719
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for xkeyboard-config. This fixes a weakness, which can be exploited by malicious people with physical access to bypass certain security restrictions.

tags | advisory
systems | linux, gentoo
SHA-256 | c26cc52558610ab67469174fb26818f83360bd1a5964fdf9484773e54fa57567
Secunia Security Advisory 47726
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 419259e25f26b4bc35b66b6640f283b8dc9c742b5ce663c9316b213638164710
Secunia Security Advisory 47717
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for chromium. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 2c7ef6501c218e169b5a5f20f9901832dde8dd4520c0c7fe48e01589c50bf59e
Secunia Security Advisory 47792
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability Lab has reported a vulnerability in Inquisiq R3, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 6bde184bc8529e4ba1f4a5981ca79a41696d2061c17fa6ac02fabdc7f1baf053
Secunia Security Advisory 47746
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has acknowledged two vulnerabilities in the ktsuss package, which can be exploited by malicious, local users to bypass certain security restrictions and gain escalated privileges.

tags | advisory, local, vulnerability
systems | linux, gentoo
SHA-256 | 1729455392851e02d7f83e2785ab5366a63e36ba345bc636ada4a50dfab6ba48
Secunia Security Advisory 47680
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for acroread. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, local, vulnerability, xss
systems | linux, gentoo
SHA-256 | 30b8bb32bbb3baf3bdf8d68dd4643213c8a93f384cdb7cc409f7941ee05d2fbc
Secunia Security Advisory 47769
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Web Experience Factory, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, web
SHA-256 | 5f67c9ea28bafe66e67622569348d20fc932dfab0a37aaf9fa7a18cbc09ca9a7
Secunia Security Advisory 47771
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information.

tags | advisory, local
SHA-256 | 9fc8be2d7f9d5d868a51bb809d189e4861031aa2e87d4004c1ba82bc0ca31f53
Secunia Security Advisory 47682
Posted Jan 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for bip. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 021b5058224b59c335f0c5c37abe200e9f13fadb45ebda732c44bed330baf32f
Lightidra IRC Router Scanner
Posted Jan 30, 2012
Authored by eurialo | Site ahacktivia.org

Lightaidra is an IRC commanded tool that allows for scanning and exploiting routers. It also performs flooding.

tags | tool, scanner
systems | unix
SHA-256 | e635493a0bb2cb118a4bfcf366984e92382fe1f4a65b187025ea0b667066c554
Solutions-Immovision Cross Site Scripting
Posted Jan 30, 2012
Authored by Atmon3r

Solutions-Immovision suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 653414562a6ca16082b7baede4da465708efce30efa8ffe43c01b04337a90da2
ME Monitoring Manager Cross Site Scripting / SQL Injection
Posted Jan 29, 2012
Authored by Benjamin Kunz Mejri, Pim J.F. Campers, Vulnerability Laboratory | Site vulnerability-lab.com

ME Monitoring Manager versions 9.x and 10.x suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 27495ed2f2e058fb3695234a4e0de35c6432d8dc1b07b45b11e1b624e0d050bf
Zorp Proxy Firewall Suite 3.9.3
Posted Jan 29, 2012
Authored by Balazs Scheidler | Site balabit.com

Zorp is a proxy firewall suite with its core architecture built around today's security demands. It uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.

Changes: This release fixes passphrase handling of trusted CA private keys and removes support for obsolete Linux versions and Solaris.
tags | tool, firewall
systems | unix
SHA-256 | 05c0dd91dd29762f5e296d14459621c31954abd49ee245eed81ed44d3cf305ae
HercSP Cross Site Scripting
Posted Jan 29, 2012
Authored by Red Security TEAM

HercSP suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 32b84d2c5b473e4dd8e3cd4460d91b32e8178dac6685fd3b3c6029d150c88143
Redbus.in Open Redirection
Posted Jan 29, 2012
Authored by r007k17-w

Redbus.in suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 5f80c3d3b59c788a6c571300287636cc82e5cab5cfb8a328bf2239b695f822c5
Page 2 of 39
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close