what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files Date: 2012-03-13 to 2012-03-14

GrrCON 12 Call For Papers
Posted Mar 13, 2012
Site grrcon.org

GrrCON is an information security and hacking conference held annually in the Midwest. This conference was put together to provide the information security community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere. It will take place September 27th through the 28th, 2012 in Grand Rapids, MI, USA.

tags | paper, conference
SHA-256 | c10fc8f54afc04f8551c1bdf5575e9141c59fce332c5fa9a6dd487d0543e2719
ZyXel GS1510 Cross Site Scripting
Posted Mar 13, 2012
Authored by Neil Fryer

The ZyXel GS1510 web frontend suffers from cross site scripting and password submission over HTTP vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 7bf039aa909839bc91b9955ca5263119afc35507902d82b8af6626a2ab2bd5f9
Microsoft Security Bulletin Re-Releases For March, 2012
Posted Mar 13, 2012
Site microsoft.com

This bulletin summary lists a re-released MS10-058 Microsoft security bulletin for March, 2012.

tags | advisory
SHA-256 | 039fc14e323510b6c9a961f11bb2cc328ff04d4f7bf8462ae57de8142ad065e4
EMC Documentum eRoom Cross Site Scripting
Posted Mar 13, 2012
Site emc.com

EMC Documentum eRoom versions prior to 7.4.4 suffer from multiple cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
advisories | CVE-2012-0398, CVE-2012-0404
SHA-256 | 6de937902c35d494f2c737d15c5405e6e0f7cdecd24f8733f79ee51fa271ba9c
Hackademic Call For Papers
Posted Mar 13, 2012
Site hackademic.info

The Hackademic Call For Papers has been announced. Hackademic is a three day security conference that aims to bring together the hacking community and members from the academic community in order to learn from each others successes and failures. Hosted by the IEEE Reliability Society, this innagural event will be held in the Clayton Hall conference facility at the University of Delaware in Newark DE. Everything about the conference, from the venue to the speakers to the schedule, is structured to facilitate collaboration and information sharing between attendees.

tags | paper, conference
SHA-256 | 5a88ec9adde7999975d27221f31798ffdcfa01d28f4b5c830356377cb44f8332
PBLang 4.67.16.a Local File Inclusion
Posted Mar 13, 2012
Authored by Number 7

PBLang version 4.67.16.a suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 55dc191c4b41ee9d5c176b09d071d85df2acdfd2d242b0744bc3e4131b18acf6
Yealink VOIP Phone Cross Site Scripting
Posted Mar 13, 2012
Authored by Narendra Shinde

Yealink VOIP Phone suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2012-1417
SHA-256 | 594dab55fa06525eeb25a234672469d458221c09b400c782310c5903d307c318
Microsoft Security Bulletin Summary For March 2012
Posted Mar 13, 2012
Site microsoft.com

This bulletin summary lists 6 Microsoft security bulletins released for March, 2012.

tags | advisory
SHA-256 | 2fc87b0379f848fe784413433c5a93cd6ee778f6af0b5fcfea8a3766d7892a52
PrivaWall Antivirus Office XML Format Evasion/Bypass
Posted Mar 13, 2012
Authored by Moshe Zioni

PrivaWall Antivirus suffers from an Office XML format evasion / bypass vulnerability. Versions 5.6 and below are affected.

tags | advisory, bypass
SHA-256 | 57c9ab5ac6dd39653d293a5937b5378a8b03f2696525cb2d336fa349b059e84b
Network Instrument Observer SNMP SetRequest Denial Of Service
Posted Mar 13, 2012
Authored by Francis Provencher

Network Instrument Observer suffers from an SNMP SetRequest denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 948eca9f21b284f006806098d957897aad100eefb7bef7b5ac8bf7042c20d318
XnView FlashPix Image Processing Heap Overflow
Posted Mar 13, 2012
Authored by Francis Provencher

XnView FlashPix suffers from an image processing heap overflow vulnerability. Proof of concept file included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 97c5fd589baeaf814316e7cce4504bc6ee68880801787c1bf145adc3a4300494
VLC Media Player 1.1.11 Denial Of Service
Posted Mar 13, 2012
Authored by Senator of Pirates

VLC Media Player versions 1.1.11 and below denial of service exploit that makes a malicious .flv file.

tags | exploit, denial of service
SHA-256 | 0eca42f600feb65e6a323e108ff5b1100d57ba6652c470f72002fe4d1c68fa73
Max's Photo Gallery 1.0 Local File Inclusion
Posted Mar 13, 2012
Authored by n0tch

Max's Photo Gallery version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | c29e086711461caf700a0cb9b6614a3127c0a18809e32ce91ef6f67523f514c0
ClubHACK Magazine Issue 26
Posted Mar 13, 2012
Authored by clubhack | Site chmag.in

ClubHACK Magazine Issue 26 - Topics covered include Network Security, Who wants to be a Millionaire, Section 66A - Sending offensive or false messages, and more.

tags | magazine
SHA-256 | 7ceafe2b3bd11254736e2c21df31c977f90ad111dcd99960dfd45c1036e48780
4Images 1.7.7 Cross Site Request Forgery
Posted Mar 13, 2012
Authored by Dmar al3noOoz

4Images version 1.7.7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 65d7f74b87cb61f7ac3275ba66b3af53fd623ca283345f4fe62030f2b0ce3924
BBShop SQL Injection
Posted Mar 13, 2012
Authored by AMC

BBShop suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 387557c45e37ab0a0224639f21c146e9d126b1864680837ea872886de01d48e5
Cycade Gallery SQL Injection
Posted Mar 13, 2012
Authored by DownFall

Cycade Gallery suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8fbe9b17f90ea0ab55aa7d02a9d566c64be91d882f70efdaf802314a3d02de6a
e-Rapido 3.3.2 Cross Site Scripting
Posted Mar 13, 2012
Authored by l20ot

e-Rapido version 3.3.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 547a7d9b3392533531e7498a23d65aa3e1503d23b13f582084e9f8cb110337f3
IPUtils Denial Of Service
Posted Mar 13, 2012
Authored by Christophe Alladoum, Romain Coltel

An integer overflow was found in the iputils/ping_common.c main_loop() function. This issue can lead to a denial of service condition.

tags | exploit, denial of service, overflow
SHA-256 | bcacc8a29465d117a35c8296adb71bf234370fa89930a6345a30c4ab42c642d9
Simple Posting System 1.0 Final Local File Inclusion
Posted Mar 13, 2012
Authored by n0tch

Simple Posting System version 1.0 Final suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d73abe8631ff8d9a2ed2661dce68ae64f4fa4453d6808dd87777087f0e7b3e0b
Max's Guestbook 1.0 Local File Inclusion / Path Disclosure
Posted Mar 13, 2012
Authored by n0tch

Max's Guestbook version 1.0 suffers from path disclosure and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | b9b523de9c2261e48feaa347895bf53bf393e2e05b6eb7a951fd4ee84dd02834
Modx 2.2.0 Local File Inclusion / Path Disclosure
Posted Mar 13, 2012
Authored by n0tch

Modx version 2.2.0 suffers from local file inclusion and path disclosure vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | f3bea47c3f6391d62661a0662104383661b59816b1cca6df581ba2aeb6ff8d3a
Secunia Security Advisory 47082
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mysql. This fixes multiple security issues and vulnerabilities, where one has unknown impacts while others can be exploited by malicious, local users to gain knowledge of sensitive information, bypass certain security restrictions, manipulate certain data, and cause a DoS (Denial of Service), by malicious users to gain knowledge of sensitive information, bypass certain security restrictions, manipulate certain data, gain escalated privileges, cause a DoS (Denial of Service), and potentially compromise a vulnerable system, and by malicious people to conduct cross-site scripting attacks, script insertion attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, xss
systems | linux, ubuntu
SHA-256 | a1558313b0404f4de626d14560de751b4af55264b6966370de010d41bf9bc4d6
Secunia Security Advisory 48370
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP Data Protector Express, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 2138afb80d6e6700ae8f69ad93a2bc2907fabae1a27d8dc0791fc1d528742f65
Secunia Security Advisory 48358
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in osFileManager, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5a6a0dc821289cbf512fdc366ce2e97e6a6480a36ce4a4c8f33e33c497de89a8
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close