exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 34 RSS Feed

Files Date: 2012-05-09 to 2012-05-10

Adobe Photoshop TIF Buffer Overflow
Posted May 9, 2012
Authored by Code Audit Labs | Site vulnhunt.com

Adobe Photoshop EXTENDED versions CS5 12.0 and CS5.1 12.1 suffer from a TIF parsing heap buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2012-2028
SHA-256 | 1c57d18bc8b121e5eec5591dd3db388f8274048b340a3437da7be973d0c7a7af
Serendipity 1.6 Cross Site Scripting / SQL Injection
Posted May 9, 2012
Authored by Stefan Schurtz

Serendipity version 1.6 suffer from backend related cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 4db56a7b7494edd69f88b7f2f0db6ddec3696ab66be10f3a4476c4d89c56033a
RSSH Circumvention
Posted May 9, 2012
Authored by Derek Martin | Site pizzashack.org

Henrik Erkkonen has discovered that, through clever manipulation of environment variables on the ssh command line, it is possible to circumvent rssh.

tags | advisory
SHA-256 | e569ddc10821d9e494884093dab704f6cca8c684a13ead70079866b8250e251e
Guitar Pro 6.1.1 r10791 Denial Of Service
Posted May 9, 2012
Authored by condis

Guitar Pro version 6.1.1 r10791 crash proof of concept exploit that creates a malicious .gpx file.

tags | exploit, denial of service, proof of concept
SHA-256 | b47118b6504b93679f30789d5a6f880b92105d33719aa58355ff34da6cc8da53
DecisionTools SharpGrid Active-X Code Execution
Posted May 9, 2012
Authored by Francis Provencher

DecisionTools SharpGrid suffers from an active-x related remote command execution vulnerability.

tags | exploit, remote, activex
SHA-256 | 605cb9c8ab0da81a67bc37b2736bffbfe9257a79f8659b7b27c6c01c05f9abb7
X7 Chat 2.0.5.1 Cross Site Request Forgery
Posted May 9, 2012
Authored by DennSpec

X7 Chat versions 2.0.5.1 and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 5a6c30045da825b60c8631b4e54c65d985928c2498b1dc1768c3aaa8458e6b85
Secunia Security Advisory 49072
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in OrangeHRM, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | a5a155c48dbcb9f71261c6da2ea1f9ba35582c87cc8b29a4aa48ba5ff75a747b
Secunia Security Advisory 49086
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 693d4558d923a6960a0452444ac98a6e95203f15318f3619b07b7696bc1ff4bc
Secunia Security Advisory 47116
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in Adobe Flash Professional CS5, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | de804a5ce903060db824587007a79a5381c5d2f1afec4aa62d13c0fcad1a74c5
Secunia Security Advisory 48980
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Core Security Technologies has reported multiple vulnerabilities in SAP NetWeaver, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | eff6f18dc3bd34c48491384e92912b99a2774c1815ef38d72844839aba14e852
Secunia Security Advisory 49094
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in CiscoWorks Prime LAN Management Solution (LMS), which can be exploited by malicious people to conduct HTTP response splitting attacks, disclose potentially sensitive information, and bypass certain security restrictions.

tags | advisory, web, vulnerability
SHA-256 | bb386a08f161b8e5a072a81bf26d3bb99833d1d926ad4db337a2d6582010fecf
Secunia Security Advisory 47118
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Adobe Illustrator, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 776578ee0d7f8f91e7bdae7733d285fd43066ceb79fc50db561f4e817f5c3129
Secunia Security Advisory 48999
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Collax has acknowledged a security issue and two vulnerabilities in Business Server, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 3bec2a5a546eba7a9fa1d3004cfb8378ea53ef5388415650604c9b22aa4372a7
Secunia Security Advisory 49101
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco Secure ACS, where some have unknown impacts and others can be exploited by malicious people to conduct script insertion, cross-site request forgery, and SQL injection attacks.

tags | advisory, vulnerability, sql injection, csrf
systems | cisco
SHA-256 | 4afb04664add28471921dcacc82bfa0578fed042c111f4443d047b18193e0226
Secunia Security Advisory 49104
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco Unified MeetingPlace, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
systems | cisco
SHA-256 | 7af1843d1f6372225e477179f330758336354244d94912fff20bd4350970c64d
Secunia Security Advisory 49102
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and two vulnerabilities have been reported in Cisco Unified MeetingPlace, which can be exploited by malicious people to enumerate folders on an affected system and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | cisco
SHA-256 | 3e3edad905648ca8ea9388ce987366f94086744cffdb23ff46c01c356e0dc00d
Secunia Security Advisory 49062
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in PivotX, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 64ba353a4ac4d5bc407a978bdba2f135cc9c0c2f2e1198e2baa6f88f7a5f0db5
Secunia Security Advisory 48571
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in DecisionTools, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 05aea29fa23eb15b5cc88590e1abd2687babfc7fbfb57783efb7a8509037bb23
Secunia Security Advisory 49050
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Han Lee has discovered a vulnerability in Core FTP, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2f33adc87940935fe02acdeff6a830c422face7ebf271830e8e6996d309f0327
Secunia Security Advisory 49056
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in AIX, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | aix
SHA-256 | 6ce926edc47d4e5d49cc125ca353ce13ea955a38f4ff174ab3ef8f56fd304bd5
Secunia Security Advisory 49042
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Horde IMP, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | c6cb48323fdca93ca41a4313bfe12e32c73f1c0239c114f42c6d0b66dd0f3655
Secunia Security Advisory 49085
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for php5. This fixes a vulnerability, which can be exploited by malicious people to disclose certain sensitive information or compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | 55258572f06d255050fa434cfe0fa96b9ac9d84aabbdd64d6bc3acaa0441e7ff
Secunia Security Advisory 49121
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 99781fc28f0c5e45969375600dfad67b883896db330bfe1e61fdd14079218fd8
Secunia Security Advisory 49071
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for horizon. This fixes a weakness and a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to conduct script insertion attacks and by malicious users to conduct session fixation attacks.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | 4313b082972877a6dadebfca2afdf41dc5da8e54c4432ea77eb77735d7aa7c70
Secunia Security Advisory 49013
Posted May 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Login With Ajax plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 460ce7cdd867e8d6bcff25ef1dc21d21440f17f86a63a79cef74bac9d9039b14
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close