exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2012-05-10 to 2012-05-11

Chevereto Upload Script suffers from cross site scripting and user enumeration vulnerabilities.
Posted May 10, 2012
Authored by Akastep

Chevreto Upload Script suffers from cross site scripting and user enumeration vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 652bb56ffcc83e4e9f8c891a98b7b9a5ded3cf4471aced7d86d312e0ab0daf48
Debian Security Advisory 2468-1
Posted May 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2468-1 - It was discovered that Apache POI, a Java implementation of the Microsoft Office file formats, would allocate arbitrary amounts of memory when processing crafted documents. This could impact the stability of the Java virtual machine.

tags | advisory, java, arbitrary
systems | linux, debian
advisories | CVE-2012-0213
SHA-256 | 920a70bfc04b0acc0425ec067ac9afcca3536a5264b0f2d72e8aaeffc68e9fde
Debian Security Advisory 2422-2
Posted May 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2422-2 - A regression was discovered in the security update for file, which lead to false positives on the CDF format. This update fixes that regression.

tags | advisory
systems | linux, debian
advisories | CVE-2012-1571
SHA-256 | da5587655e5758f4b0e013bb717efdacb652bee005900188f3319cb5f1be004b
Debian Security Advisory 2467-1
Posted May 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2467-1 - It was discovered that Mahara, the portfolio, weblog, and resume builder, had an insecure default with regards to SAML-based authentication used with more than one SAML identity provider. Someone with control over one IdP could impersonate users from other IdP's.

tags | advisory
systems | linux, debian
SHA-256 | 5dee642e0bd8295239c7653b2351ced32900bd0db2c2ba222a7b00678aca31fd
Debian Security Advisory 2466-1
Posted May 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2466-1 - Sergey Nartimov discovered that in Rails, a Ruby based framework for web development, when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped and an attacker can inject arbitrary HTML into the document.

tags | advisory, web, arbitrary, ruby
systems | linux, debian
advisories | CVE-2012-1099
SHA-256 | 45fc779659d12b3f4006e50d93f3790391de6edf2d1948ba64eb85d6500c30e4
Debian Security Advisory 2465-1
Posted May 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2465-1 - De Eindbazen discovered that PHP, when run with mod_cgi, will interpret a query string as command line parameters, allowing to execute arbitrary code.

tags | advisory, arbitrary, php
systems | linux, debian
advisories | CVE-2012-1172, CVE-2012-1823, CVE-2012-2311
SHA-256 | 132dc392faa1d0ed24275c516bc3f43d8f2d89f20f9fd699ba65d12b22ac8edd
Video Entropyd 2.0
Posted May 10, 2012
Authored by Folkert van Heusden | Site vanheusden.com

video-entropyd is a program to add entropy data from video4linux devices to the kernel random driver.

Changes: This version is now compatible with recent kernels (kernels that export the video4linux2 API).
tags | kernel, encryption
systems | linux
SHA-256 | aba6255ddb32cd376c785128a7e850fb51b6c1d7fe3f4ba765abc0c50ec67d7a
Secunia Security Advisory 49074
Posted May 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Glossary module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 62ed63fbe79eb110f527ee4884523db71d7d4ef939846f2274dc494dce34a6fe
Secunia Security Advisory 47292
Posted May 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | apple
SHA-256 | d882890023babb38e6f8be453cbe7f8a029014de44cb8cbfe52e84d9900d1c55
Secunia Security Advisory 49060
Posted May 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Take Control module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 2bb91d04e18e5083fa0af8235d5f3660649a53bd404fbb7eab5c7ae7d95d0a23
Secunia Security Advisory 49040
Posted May 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libjakarta-poi-java. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, java, denial of service
systems | linux, debian
SHA-256 | 233f2743e53dbf983823995425586b3556d35d157dcd31fb2b97dd58e028236f
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close