what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files Date: 2012-05-17 to 2012-05-18

Web Application Vulnerability Scanner 0.11
Posted May 17, 2012
Authored by Twofiq I. | Site code.google.com

WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or local, web applications for security vulnerabilities. As a scan is running, details of the scan are dynamically updated to the user. These details include the status of the scan, the number of URLs found on the web application, the number of vulnerabilities found and details of the vulnerabilities found. After a scan is complete, a detailed PDF report is emailed to the user. The report includes descriptions of the vulnerabilities found, recommendations and details of where and how each vulnerability was exploited.

tags | tool, remote, web, local, scanner, php, vulnerability
systems | unix
SHA-256 | 7db76126f4d9d48f9ae2665799f23ecf665fdbd9bee7fda978423604c2ca79a2
Division 6 IT SQL Injection / Cross Site Scripting
Posted May 17, 2012
Authored by the_cyber_nuxbie

Division 6 IT suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | beb72df7b1666169389e4e6e3035fd20971cddf0a679f8f6d5b10c1ecb0e553c
HP Security Bulletin HPSBUX02777 SSRT100854
Posted May 17, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02777 SSRT100854 - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities may allow remote Denial of Service (DoS), unauthorized modification and disclosure of information. Revision 1 of this advisory.

tags | advisory, java, remote, denial of service, vulnerability
systems | hpux
advisories | CVE-2010-4447, CVE-2010-4448, CVE-2010-4454, CVE-2010-4462, CVE-2010-4465, CVE-2010-4469, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476, CVE-2011-0802, CVE-2011-0814, CVE-2011-0815, CVE-2011-0862, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0871, CVE-2011-3389, CVE-2011-3545, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560, CVE-2011-3563, CVE-2012-0499
SHA-256 | 2cc74a2a5e99e58215f13d95e8b49783618308eb6d3e4abfe71dd4568d72d61e
Mandriva Linux Security Advisory 2012-077
Posted May 17, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-077 - Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. A flaw was found in the way ImageMagick processed images with malformed Exchangeable image file format metadata. An attacker could create a specially-crafted image file that, when opened by a victim, would cause ImageMagick to crash or, potentially, execute arbitrary code. A denial of service flaw was found in the way ImageMagick processed images with malformed Exif metadata. An attacker could create a specially-crafted image file that, when opened by a victim, could cause ImageMagick to enter an infinite loop. Various other issues have also been addressed.

tags | advisory, denial of service, arbitrary, local, trojan
systems | linux, mandriva
advisories | CVE-2010-4167, CVE-2012-0247, CVE-2012-0248, CVE-2012-1185, CVE-2012-0259, CVE-2012-0260, CVE-2012-1798
SHA-256 | d7de3f7e0b80f09045f1b2c5f542725b115d3f5c08f7a893d8351dc7200e188a
Ubuntu Security Notice USN-1443-1
Posted May 17, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1443-1 - It was discovered that Update Manager created system state archive files with incorrect permissions when upgrading releases. A local user could possibly use this to read repository credentials. Felix Geyer discovered that the Update Manager Apport hook incorrectly uploaded certain system state archive files to Launchpad when reporting bugs. This could possibly result in repository credentials being included in public bug reports. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2012-0948, CVE-2012-0949, CVE-2012-0948, CVE-2012-0949
SHA-256 | 6404506a03e0bd2370106f34332c5a744490330dc284ffba95740f7fd563f31a
Debian Security Advisory 2474-1
Posted May 17, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2474-1 - Benencia discovered that ikiwiki, a wiki compiler, does not properly escape the author (and its URL) of certain metadata, such as comments. This might be used to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, debian
advisories | CVE-2012-0220
SHA-256 | a77c6364ff42f6e4ec36b1b89e3dd029f590700100d32902704980fbb69b522d
Secunia Security Advisory 49156
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FishEye and Crucible, which can be exploited by malicious people to cause a DoS (Denial of Service) or disclose potentially sensitive information.

tags | advisory, denial of service
SHA-256 | 619745a18a194e45b5d52924cd8ead4e3d4cde8a5344ea51c2e7049f5b2fb267
Secunia Security Advisory 49146
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in JIRA, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 2ace201a611dcbe655f664cdd109e85a95b75fd92a4b3274e8050be29b751241
Secunia Security Advisory 49168
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Track That Stat plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 6f97dfc1a2e7b50bcd23e7011c593eff7cc502dfb93c7aae9eda6c30c66b02cc
Secunia Security Advisory 49194
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 4eeb301ede4d743d252dac48528e92f9cbc3ae1330bb34096f9f73e0b863611a
Secunia Security Advisory 49139
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
systems | cisco
SHA-256 | e45add35072bcdc3ef566dbf7d8d09806ebc1397cbf59712514aac863b8976d8
Secunia Security Advisory 47447
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in QuickTime, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 950e052bbf14e52a5c10eae6bea9b9ddb60760783dd7b8bf84828da8133da1ce
Secunia Security Advisory 49173
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in Invensys Wonderware InTouch, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d271034ef93519bc8f78b1a6ce1ad362874b784cd0e6d5888c4a0285908ebe63
Secunia Security Advisory 49186
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for connman. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 6fe45118d7ab4c8ac47fdaf4ba8734b72140b52d01b5f6339b4bb9610f48d1b6
Secunia Security Advisory 49193
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | a1d30186496845399b0ac3d413e64ee8f1ddfdb9edb58adaddaeb4b9fb3c4891
Secunia Security Advisory 49192
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Cognos Express, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 2252fd4b89af6fad4a83e793ac762a6fd2198fbe7e16bfcb47e09f709eeb87ae
Secunia Security Advisory 49133
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Chokri B.A. has reported a vulnerability in GENU, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 67226885bda9213fdf0e33dbe8a7e1049b1acd9d587ccd2e6031ecdeab50fb6e
Secunia Security Advisory 49197
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for quagga. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | dd515f664bac6f66a462b3eb358d675506077b90c5fc1a608b4f214741b2e062
Secunia Security Advisory 49161
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gridengine. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 158a0133a0d96405f70dd8b8ca43a4ab095c35ba1ea264eb57859f9f6a5b3d20
Secunia Security Advisory 49157
Posted May 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Walied Assar has discovered a vulnerability in Resource Tuner, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2bf64ecbacb36788a5260654d9ea6801360c02e02c1ae20db3b183dc5d99aa3c
Artiphp CMS 5.5.0 Database Backup Disclosure
Posted May 17, 2012
Authored by LiquidWorm | Site zeroscience.mk

Artiphp CMS version 5.5.0 suffers from a database backup disclosure vulnerability.

tags | exploit
SHA-256 | 2d47b6d911592d5ad10e5f9ed6aee5747555241f52f6549700cf57ce4a15e301
Artiphp CMS 5.5.0 Cross Site Scripting
Posted May 17, 2012
Authored by LiquidWorm | Site zeroscience.mk

Artiphp CMS version 5.5.0 suffers from multiple POST cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7a4376013ae27e84c455c4635174e7c9d3e1f35f0efd073c63ffb7ec3323f459
OpenOffice.org 3.3.0 Powerpoint Denial Of Service
Posted May 17, 2012
Authored by Sven Jacobias

A review of the code in filter/source/msfilter msdffimp.cxx in OpenOffice.org versions 3.3 and 3.4 Beta revealed some unchecked memory allocations, which could be exploited via malformed Powerpoint graphics records ("escher") to cause bad_alloc exceptions. From this vulnerability a denial of service attack is possible.

tags | advisory, denial of service
advisories | CVE-2012-2334
SHA-256 | 37ba90753876b3352a8f998736c035b6682c16dcc663dc0b8448e6d9efb6e4d3
Drupal Zen 6.x Cross Site Scripting
Posted May 17, 2012
Authored by Jakub Suchy, Premek Sumpela | Site drupal.org

Drupal Zen third party module version 6.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 8b3257fa66f9dcce4b6bc69cf81759ef4837da4cbef5fad1533b7add8f34b154
SiliSoftware backupDB() 1.2.7a Cross Site Scripting
Posted May 17, 2012
Authored by LiquidWorm | Site zeroscience.mk

SiliSoftware backupDB() version 1.2.7a suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 93a38f800fc0a877b5be79911d049e6102a1c97585507571023aa77665e09f5f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close