what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 79 RSS Feed

Files Date: 2012-06-14 to 2012-06-15

Secunia Security Advisory 49552
Posted Jun 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a weakness and multiple vulnerabilities in IBM Rational AppScan, which can be exploited by malicious users to disclose certain information and by malicious people to conduct spoofing and cross-site scripting attacks, disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, spoof, vulnerability, xss
SHA-256 | 4d333496b2ab011dfa51dd6328104952558a225f890f2caf54508c9b5ed4785c
Secunia Security Advisory 49430
Posted Jun 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in multiple VMware products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 90de6f9f02e3e780445525d4f4b2981c6636a6dc47bf45c0042741c9f4f2267f
TOR Virtual Network Tunneling Tool 0.2.2.37
Posted Jun 14, 2012
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release introduces a workaround for a critical renegotiation bug in OpenSSL 1.0.1 (20% of the Tor network can't talk to itself currently).
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | ae2c1fb52babd9e92264ac7c4486d3e941be6deb91b8a590965848fbbcbd9e88
Microsoft Internet Explorer 8 / 9 Toolbar Code Execution
Posted Jun 14, 2012
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered that Microsoft Internet Explorer versions 8 and 9 suffer from a use-after-free vulnerability in the developer toolbar.

tags | advisory
advisories | CVE-2012-1874
SHA-256 | f7298e95d2549588ea1cd82324a1caedfe0a90734ffc624026081336553170f8
Microsoft Internet Explorer 8 Code Execution
Posted Jun 14, 2012
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered a remote code execution vulnerability in Microsoft Internet Explorer 8 due to a use-after-free issue having to do with property ids.

tags | advisory, remote, code execution
advisories | CVE-2012-1875
SHA-256 | d90822cc1fdf82eaf50e354edf2ba9269a59ae2ff8196eb2ba50bfbd36cfe29b
Drupal Global Redirect 6.x / 7.x Open Redirect
Posted Jun 14, 2012
Authored by Justin C. Klein Keane, Joe Chambers, Ben Johnson | Site drupal.org

Drupal Global Redirect third party module versions 6.x and 7.x suffer from an open redirection vulnerability.

tags | advisory
SHA-256 | f954e02eb6b27fce9898cb582e4a94107053758103ac19cad8ebbdc238d012d4
Drupal Ubercart AJAX Cart 6.x Information Disclosure
Posted Jun 14, 2012
Authored by Neil Bertram | Site drupal.org

Drupal Ubercart AJAX Cart third party module version 6.x suffers from an information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | 1c1380ec32ac5791363040339561d85968b380b06d722625571b489f7907f87a
Drupal Protected Node 6.x Access Bypass
Posted Jun 14, 2012
Authored by Martin Barbella | Site drupal.org

Drupal Protected Node third party module version 6.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | b4aaddf3a18e328ac108e52f95a4dcea1a732a0ccdd4f218edd6da70910802f5
ESRI ArcMap Arbitrary Code Execution
Posted Jun 14, 2012
Authored by Boston Cyber Defense

ESRI ArcMap suffers from an arbitrary code execution vulnerability when handling a specially crafted map file.

tags | exploit, arbitrary, code execution
advisories | CVE-2012-1661
SHA-256 | 41300a1d1574cd78396223284910e6a41716e4bf600d84b852228613ab075960
Drupal SimpleMeta 6.x Cross Site Request Forgery
Posted Jun 14, 2012
Authored by Nicholas Thompson | Site drupal.org

Drupal SimpleMeta third party module version 6.x suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
SHA-256 | 559caf9547f39a2aeed5b0f1830e8ad64accf5a1df871e48df2290bd93d06919
Adobe Illustrator CS5.5 Memory Corruption Proof Of Concept
Posted Jun 14, 2012
Authored by Felipe Andres Manzano

Adobe Illustrator CS5.5 memory corruption proof of concept exploit that spawns a calculator.

tags | exploit, proof of concept
advisories | CVE-2012-0780
SHA-256 | 35acd4b2f3b86dad800d4dd1e04e53c4376cae35b9ee1d7a968284f59cf357ee
Drupal Node Hierarchy 6.x Cross Site Request Forgery
Posted Jun 14, 2012
Authored by Dylan Wilder-Tack | Site drupal.org

Drupal Node Hierarchy third party module version 6.x suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
SHA-256 | 7e53cac24e1e0b6cf9bc8e8e14e787dfd0e07331fdd56dd24a23c1a3f21721d7
Drupal Janrain Capture 6.x / 7.x Open Redirect
Posted Jun 14, 2012
Authored by Peter Wolanin | Site drupal.org

Drupal Janrain Capture third party module versions 6.x and 7.x suffer from an open redirect vulnerability.

tags | advisory
SHA-256 | 5cd86472df348671d59ea4a24f9de07cb78b7d14b9f0f04870be4a0cd322990f
WordPress Invit0r 0.22 Shell Upload
Posted Jun 14, 2012
Authored by Sammy FORGIT

WordPress Invit0r plugin version 0.22 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 721c03aa5c5e768581e252bff7a0323af56be4f8b13abeb9e211d0128f2e7244
WordPress Evarisk 5.1.5.4 Shell Upload
Posted Jun 14, 2012
Authored by Sammy FORGIT

WordPress Evarisk plugin version 5.1.5.4 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | acf005b9162e1f259ec0430b14dff8146bc48acb8a5093ae793a646c952e8e21
WordPress Annonces 1.2.0.1 Shell Upload
Posted Jun 14, 2012
Authored by Sammy FORGIT

WordPress Annonces plugin version 1.2.0.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 000de251d7e1514cbd248f056229f6203211c01293eaf8acfb60ebd9a51a20a3
Dotcombinat SQL Injection
Posted Jun 14, 2012
Authored by Mr.XpR

Dotcombinat suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 68a5dcc077787b7f9952f9fa102af7601076ada81fc62ae04d56c721b96f7bd4
Checkpoint Endpoint Connect VPN DLL Hijack
Posted Jun 14, 2012
Authored by Moshe Zioni

A vulnerability in Checkpoint Endpoint Connect VPN causes the client to be susceptible to an attack that result in arbitrary dynamic-library loading. A user with local disk access can carefully construct a DLL that suits a pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.

tags | advisory, arbitrary, local
systems | windows
advisories | CVE-2012-2753
SHA-256 | 4d25fbd959e5ee60f126bb396b30dab8ef0c294cb5f29ded00cd0c25b3d9e6f6
RevolutionTechnologies SQL Injection
Posted Jun 14, 2012
Authored by the_cyber_nuxbie

RevolutionTechnologies suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6cf41aefedcf0de69f59bc7ed0404f84454387b949da9993e1938bc37f925ec5
Advanced Admin Page Finder
Posted Jun 14, 2012
Authored by Ajith KP, Chaitanya Krishna

Advanced Admin Page Finder searches a site for over 800 possible administrative interfaces. Written in Python.

tags | tool, scanner, python
systems | unix
SHA-256 | 579b03498bcce05149a5c42de2dd6d0b6c95d1437440609f8d48da616759e034
Mozilla Firefox Web Browser 13.0 Remote Denial Of Service
Posted Jun 14, 2012
Authored by Ucha Gobejishvili

Mozilla Firefox version 13.0 remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | ae7f511ae4c9e3d17f34eb4e61e113606abd673ebae4661615339b1341be665c
seoPLUSteam SQL Injection
Posted Jun 14, 2012
Authored by Iranian_Dark_Coders_Team

seoPLUSteam suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7adc92ada21b2d5c1d43bcdc906519cabeed22d0562232b3ab0e223444b4ba84
BeeWeb SQL Injection
Posted Jun 14, 2012
Authored by Taurus Omar

BeeWeb suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0204704657f2f616f795be6baaa2763dec40d3be555e58780f71238f01e8a07c
Marco Valentino SQL Injection
Posted Jun 14, 2012
Authored by Taurus Omar

Websites designed by Marco Valentino appears susceptible to remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | cfe8383e708270f8806f14e704993616f1e3ad197fc401073cc7f2bcb946f30c
InternetSol SQL Injection
Posted Jun 14, 2012
Authored by Taurus Omar

InternetSol suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0aa834e22ed8076a50306ae24d67438b806e1a5a3d44dcbf63652ab6d053e1ed
Page 3 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close