exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files Date: 2012-03-13 to 2012-03-14

Secunia Security Advisory 47919
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | e396ffc2ec0af9076c93223897d604b7ec49ecde9cd413e215fcd8fae3cd9d05
Secunia Security Advisory 48365
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for ldm. This fixes a security issue, which can be exploited by malicious people with physical access to bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | 5ae5d8eb89a1525150de9cb8ac5e1fe2e12291baa6d3bce2a96e6dac0c6f104e
Secunia Security Advisory 48339
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Eleytt Research has reported multiple vulnerabilities in Holdem Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 1f0c788abc71736e6f4544514c9a8cbb25d8f0b1f83632300dbe91011cc1c988
Secunia Security Advisory 48363
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in twicca for Android, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 2b5cc515530fe1abeef5cb2af52517e8982494ef30f6e21c3519b8ba65ef4aa8
Secunia Security Advisory 47183
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in GNU Gnash, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 87841e64b86661e393e31fcfd9080b6b74df43ff2f0a2e3c8f4e750d15053b9a
Secunia Security Advisory 48350
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in OneFileCMS, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | a0222e3d9fe7fdf7117aaf15bd9fe0ef3f1122363c216d1ccd58fb3a13331b99
Secunia Security Advisory 48353
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Expression Design, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 13cf5397a984a354aa6048c4c18ea2e3423457a174104d672bd199a5a5871971
Secunia Security Advisory 48396
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Visual Studio, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | c3af45572b330bff3a7af7d92580a3e19636b727d63152435268c10018bcf994
Secunia Security Advisory 48395
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | windows
SHA-256 | 35efd86b7300074fab6c890b6808a7ea68ca15d8c2d96591515d9cd15b3b5e22
Secunia Security Advisory 48394
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | e86abc5e38a95ae5de2fb87a91ffafd9702de11be5d4ec607545bd70c072f285
Secunia Security Advisory 48361
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | fa11eff82c3950cfeaa3ae80c30ba052e4a91ab91740f995847d3c0fbbebe505
Ubuntu Security Notice USN-1398-1
Posted Mar 13, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1398-1 - Tenho Tuhkala discovered that the LTSP Display Manager (ldm) incorrectly filtered keybindings. An attacker could use the default keybindings to execute arbitrary commands as root at the login screen.

tags | advisory, arbitrary, root
systems | linux, ubuntu
advisories | CVE-2012-1166
SHA-256 | 7ce1e6e2ce3facc78d68784fa8ed22148f48cebd6fdfe476a93f740c51212ff3
Apple Security Advisory 2012-03-12-1
Posted Mar 13, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-03-12-1 - Safari version 5.1.4 is now available and addresses 84 different vulnerabilities. This includes many fixes for WebKit related issues.

tags | advisory, vulnerability
systems | apple
advisories | CVE-2011-2825, CVE-2011-2833, CVE-2011-2846, CVE-2011-2847, CVE-2011-2854, CVE-2011-2855, CVE-2011-2857, CVE-2011-2860, CVE-2011-2866, CVE-2011-2867, CVE-2011-2868, CVE-2011-2869, CVE-2011-2870, CVE-2011-2871, CVE-2011-2872, CVE-2011-2873, CVE-2011-2877, CVE-2011-3881, CVE-2011-3885, CVE-2011-3887, CVE-2011-3888, CVE-2011-3897, CVE-2011-3908, CVE-2011-3909, CVE-2011-3928, CVE-2012-0584, CVE-2012-0585, CVE-2012-0586
SHA-256 | bc365007227c4580123163b3c91e0db846e682785546cac5b750dbdacd9d0a55
OneFileCMS 1.1.4 Access Bypass
Posted Mar 13, 2012
Authored by Abhi M Balakrishnan

OneFileCMS versions up to 1.1.4 suffers from a direct access bypass vulnerability.

tags | exploit, bypass
SHA-256 | 2c05d07d60476a4de6a5fc22c6af9da20f55d52633c789d4713aa7c686b4082c
WeBaCoo (Web Backdoor Cookie) 0.2.3
Posted Mar 13, 2012
Authored by Anestis Bechtsoudis | Site github.com

WeBaCoo (Web Backdoor Cookie) is a web backdoor script-kit, aiming to provide a stealth terminal-like connection over HTTP between client and web server. It is a post exploitation tool capable to maintain access to a compromised web server. WeBaCoo was designed to operate under the radar of modern up-to-dated AV, NIDS, IPS, Network Firewalls and Application Firewalls, proving a stealth mechanism to execute system commands to the compromised server. The obfuscated communication is accomplished using HTTP header's Cookie fields under valid client HTTP requests and relative web server's responses.

Changes: Single command execution mode. Multi HTTP methods support. Download / Stealth extension modules. Various other updates.
tags | tool, web, rootkit
systems | linux, unix
SHA-256 | 087283a5e4ae66b6ac53dccfd5878fe22ca5d12bcebb302675d4406e23575560
ExploitsDownload.com Cross Site Scripting
Posted Mar 13, 2012
Authored by l20ot

ExploitsDownload.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d8d031a1df4b5758a896f0ede472aba3e367274f9819825452f6799c61b80115
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close