what you don't know can hurt you
Showing 26 - 41 of 41 RSS Feed

Files Date: 2012-03-16 to 2012-03-17

WikyBlog 1.7.3RC2 Cross Site Scripting
Posted Mar 16, 2012
Authored by Stefan Schurtz

WikyBlog version 1.7.3RC2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 32f8d3c9e31ae4c861a8769ee0edc9c3
Microsoft Bing Flash Editor Cross Site Scripting
Posted Mar 16, 2012
Authored by Aditya Gupta, Subho Halder, Dev Kar | Site vulnerability-lab.com

Microsoft Bing's Flash editor suffers from an input validation vulnerability that can lead to cross site scripting attacks.

tags | exploit, xss
MD5 | 128448de9e68d372f712c96b1ba49213
ProvideChat Cross Site Scripting
Posted Mar 16, 2012
Authored by Sony

ProvideChat suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | e1d165b0b30e67e5c6c09cc8990a4b43
EMC Documentum eRoom 7.33.498.98 Cross Site Scripting
Posted Mar 16, 2012
Authored by F. Lukavsky, B. Schildendorfer | Site sec-consult.com

EMC Documentum eRoom version 7.33.498.98 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | b289c658d2aa4de7867c38ac84c568b9
Aurora WebOPAC SQL Injection
Posted Mar 16, 2012
Authored by Niket Khosla | Site senseofsecurity.com.au

Aurora WebOPAC suffers from a remote SQL injection vulnerability. Versions affected include 3.5.0e, 3.4.6a, 3.5.3, 3.5.0i, 3.4.7b, 3.5.2.2, 3.4.7b, and possibly others.

tags | advisory, remote, sql injection
MD5 | a1f6cacd34b20aef7ac99ee57bf7a1e0
Red Hat Security Advisory 2012-0393-01
Posted Mar 16, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0393-01 - The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. An integer overflow flaw was found in the implementation of the printf functions family. This could allow an attacker to bypass FORTIFY_SOURCE protections and execute arbitrary code using a format string flaw in an application, even though these protections are expected to limit the impact of such flaws to an application abort.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-0864
MD5 | 50dfa6117a76e1d53ce2ae1cdf94420e
Debian Security Advisory 2433-1
Posted Mar 16, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2433-1 - Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications included in Debian.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2012-0455, CVE-2012-0456, CVE-2012-0458, CVE-2012-0461
MD5 | 94cdd6ad4170e168e86e244c082db9d3
Secunia Security Advisory 48445
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability have been reported in Joomla!, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 238571e2dc97427412cf5dbbad91b1cd
Secunia Security Advisory 48338
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities with unknown impact have been reported in ez Publish.

tags | advisory, vulnerability
MD5 | 76803f9156bfaab009f91d0c91acd4e2
Secunia Security Advisory 48436
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mr.pr0n has discovered two vulnerabilities in OneFileCMS, which can be exploited by malicious users to disclose sensitive information.

tags | advisory, vulnerability
MD5 | c6a0ec1f44e702af1c3969fb694d39a1
Secunia Security Advisory 48420
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a vulnerability in Limit My Call for Android, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 02bbe7f8923a564ed5e1880048fd64d4
Secunia Security Advisory 48401
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NTG Haber Yazilimi, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | ed0e92accda85cb5b89f4cdb0f296107
Secunia Security Advisory 48373
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in TVersity, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 6d63cba0cfb3434a16369044dc42879d
Secunia Security Advisory 48352
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Tivoli Endpoint Manager, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 9868aaa30f1e14180b4a79b2e15077a1
Secunia Security Advisory 48360
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Slidebox module for Drupal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | c5bf5c2b7341802b99d419104ad2cc3e
Secunia Security Advisory 48315
Posted Mar 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in libgdata, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | 4267fcfbf9bc1b044c338cf1d7d49aea
Page 2 of 2
Back12Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close