exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2012-04-06 to 2012-04-07

sX-CMS SQL Injection
Posted Apr 6, 2012
Authored by Ryuzaki Lawlet

sX-CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f67ebb0b331c2c6965fe80893a34500c3556e608a07b6135ee452f6ddbb64471
HP Security Bulletin HPSBUX02757 SSRT100779 2
Posted Apr 6, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02757 SSRT100779 2 - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities. Revision 2 of this advisory.

tags | advisory, java, remote, vulnerability
systems | hpux
advisories | CVE-2011-3563, CVE-2011-5035, CVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501, CVE-2012-0502, CVE-2012-0503, CVE-2012-0504, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507
SHA-256 | c5a0e87798a83e3a26479d57dc941d9529228666687065183c587e8f64dae163
Sagan Log Monitor 0.2.1
Posted Apr 6, 2012
Authored by Champ Clark III | Site sagan.softwink.com

Sagan is multi-threaded, real-time system- and event-log monitoring software, but with a twist. Sagan uses a "Snort" like rule set for detecting nefarious events happening on your network and/or computer systems. If Sagan detects a "bad thing" happening, it can do a number of things with that information. Sagan can also correlate the events with your Intrusion Detection/Intrusion Prevention (IDS/IPS) system and basically acts like an SIEM (Security Information and Log Management) system.

Changes: Several bug fixes and code clean up.
tags | tool, sniffer
systems | unix
SHA-256 | 6c4fe7128a01c6f309bd181563c54cdf0abf2f623db78e0207f9c69176b15858
Microsoft Security Bulletin Advance Notification For April 2012
Posted Apr 6, 2012
Site microsoft.com

This is an advance notification of security bulletins that Microsoft is intending to release on April 10, 2012.

tags | advisory
SHA-256 | 72e555f1a509f4ee40ec3be452c9b42d9368e6ed8ecbe4b28a7095f6ae18a732
WordPress Taggator SQL Injection
Posted Apr 6, 2012
Authored by Am!r | Site irist.ir

WordPress Taggator suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f0cbc871c61618f34dfc0d1e3ebaa034b7d5ae5aa10b2623e29bc22148765482
CenterSite CMS Cross Site Scripting
Posted Apr 6, 2012
Authored by Am!r | Site irist.ir

CenterSite CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a04f2e27b363ca3da81945f3feaddf9cc2b57ce4c93a273bef2793058185b5f1
Umbraco 4.x Open Proxy
Posted Apr 6, 2012
Authored by Florent Daigniere | Site trustmatta.com

Vulnerable installations of Umbraco allow unauthenticated users to abuse the script FeedProxy.aspx into proxying requests on their behalf through the "url" parameter.

tags | advisory
advisories | CVE-2012-1301
SHA-256 | 19987edc1f1a1fecf2c9df97f5014d7f25ea604cf74d0337f115ba76e02245bc
Mandriva Linux Security Advisory 2012-054
Posted Apr 6, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-054 - An integer overflow was discovered in the libtiff/tiff_getimage.c file in the tiff library which could cause execution of arbitrary code using a specially crafted TIFF image file. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-1173
SHA-256 | c2470d757530bdc1d852c273dcedf2585d7fa9b116357c0843f71011fcfb5e3d
vBulletin 4.1.10 SQL Injection
Posted Apr 6, 2012
Authored by Am!r | Site irist.ir

vBulletin version 4.1.10 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 02406384a6b943c7552c60eb8d789b3ea129b3f7c2768fa49035894789989e3c
Ubuntu Security Notice USN-1418-1
Posted Apr 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1418-1 - Alban Crequy discovered that the GnuTLS library incorrectly checked array bounds when copying TLS session data. A remote attacker could crash a client application, leading to a denial of service, as the client application prepared for TLS session resumption. Matthew Hall discovered that the GnuTLS library incorrectly handled TLS records. A remote attacker could crash client and server applications, leading to a denial of service, by sending a crafted TLS record. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2011-4128, CVE-2012-1573, CVE-2011-4128, CVE-2012-1573
SHA-256 | 13bc1e954c5707a74014e86b9b7592f3b622b5e97b35e85f4312492b2cad81f0
Ubuntu Security Notice USN-1417-1
Posted Apr 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1417-1 - It was discovered that libpng incorrectly handled certain memory operations. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2011-3048
SHA-256 | 6757b068ec4a6d4c42a1f8a508f6f4e78eb202dff6db85582db62d2beb21d650
Page 2 of 2
Back12Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    11 Files
  • 30
    Jun 30th
    7 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close