exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files Date: 2012-03-06 to 2012-03-07

Secunia Security Advisory 48244
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for libmikmod. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | f25814326b1bd9578dfa571fa0b68f5c3f7ace7ca8cde832d5374a1819044206
Secunia Security Advisory 48165
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aung Khant has discovered multiple vulnerabilities in Etano, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5122ba6b50a85f6b86e6e8e252857b0142d631846fa1a60f3470471d641f5b1e
Secunia Security Advisory 48276
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in xArrow, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 7595d3e34ad2e01d931474b3a215d9836ccb27c893cf215314633e372202f5ca
Secunia Security Advisory 48254
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for puppet. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious users to conduct spoofing attacks and compromise a vulnerable system.

tags | advisory, local, spoof, vulnerability
systems | linux, gentoo
SHA-256 | dabec88880545814050f94ff0990240eb2a6097128545eaa56c80b1aa7b00856
Secunia Security Advisory 48253
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | c1371df63d1d386fe782c8145b844aeec274e3d4fe7665c720ca5e0306bdc5fd
Secunia Security Advisory 48263
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BlackBerry OS and BlackBerry Tablet OS, which can be exploited by malicious people to compromise a vulnerable device.

tags | advisory
SHA-256 | 07dc44fd23b788df8c772d2beabc449f5118e9f180c680883b743492fb72ea57
Secunia Security Advisory 48258
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in MantisBT, which an be exploited by malicious users to bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | 0ebe8a853f7adbf366a668424d7877bca397f7c7700e5fa593c0f27cf269cdc1
Secunia Security Advisory 48260
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities with unknown impacts have been reported in the Formidable Pro plugin for WordPress.

tags | advisory, vulnerability
SHA-256 | 5a12c27d6b64377ca76e7225bed38a7cbe1d3ea6c7254dc35fc192f14d8b3777
Secunia Security Advisory 48211
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in TagLib, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | e7e65845dc20341fc0a65af88a02006b3f36e2299bdd8a9d3dad83be534feb98
Secunia Security Advisory 48277
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in TwinCAT, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 17ee13c84d2ea80f9e5c2c830cfecd11a4b9b481e4114101e0e2432d34009b19
Secunia Security Advisory 48265
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 02c57a30aa3e77fc2e9bed9e67969114441648974618832ab82693dd1d954275
Secunia Security Advisory 48210
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the XML::Atom module for Perl, which can be exploited by malicious people to potentially disclose sensitive information.

tags | advisory, perl
SHA-256 | b5becd6a5c4aaa0440d46ded7e2c9c397e7242b8be03aadf9d6f7d71005f82c6
Secunia Security Advisory 48203
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in phpCAS, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 814e0e512f5592eb3bae42f89e6e5fc938ae139d0c6edfb3837a3a2a6dc20d23
Secunia Security Advisory 48239
Posted Mar 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Timesheet Next Gen, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 0e80fbbc6a30fa22e9b45f54a4365a3bfda41b399aab771ebadda70e41abc93b
Fork CMS 3.2.7 Cross Site Scripting
Posted Mar 6, 2012
Authored by LiquidWorm | Site zeroscience.mk

Fork CMS versions 3.2.7 and 3.2.6 suffer from multiple cross site scripting vulnerabilities when parsing user input to several parameters in different scripts, via POST and GET methods. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session.

tags | exploit, arbitrary, vulnerability, xss
SHA-256 | 87d720305c55d72a3967b0136aa44ba244c9cea9ae38e3e4a86188a755922947
Log1cms 2.1 Cross Site Request Forgery
Posted Mar 6, 2012
Authored by KedAns-Dz

Log1cms version 2.1 suffers from cross site request forgery vulnerabilities that allow for shell upload and file downloads.

tags | exploit, shell, vulnerability, csrf
SHA-256 | fc139e44abe15975ea6625bf46ebf7ec02a9bb3d4a76dce8e812d83c5f4d9870
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close