accept no compromises
Showing 101 - 125 of 936 RSS Feed

Files Date: 2012-08-01 to 2012-08-31

Secunia Security Advisory 50452
Posted Aug 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in op5 Monitor, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 2138128ee102dd01ae0ae1b2925c8c45
Secunia Security Advisory 50393
Posted Aug 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC Cloud Tiering Appliance, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 8b81504b7ce9e6c9f6e25adfaf044008
Secunia Security Advisory 50371
Posted Aug 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability have been reported in IBM Infosphere Guardium, which can be exploited by malicious users to disclose certain sensitive information and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 1ca7a294672c8342b102fc0ec91a7f89
Secunia Security Advisory 50444
Posted Aug 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BalaBit has acknowledged two vulnerabilities in syslog-ng Premium Edition, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 0d934280b043e371afde1705ae06899c
Secunia Security Advisory 50449
Posted Aug 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in PrestaShop, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 4966d078931265529380a10be2e46768
Secunia Security Advisory 50445
Posted Aug 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Phorum, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 6d3ba4d7224ef7a6a5fc36949449e561
EMC Cloud Tiering Appliance (CTA) Authentication Bypass
Posted Aug 29, 2012
Site emc.com

A vulnerability in EMC Cloud Tiering Appliance aka CTA (formerly EMC FMA) could allow an unauthorized user to log in to the affected system as a GUI user with full administrative privileges by providing a specifically crafted malicious file during authentication process.

tags | advisory
advisories | CVE-2012-2285
MD5 | 69334d272a8dd560867896107eef11ab
ActFax 4.31 Local Privilege Escalation
Posted Aug 29, 2012
Authored by Craig Freyman

ActFax version 4.31 local privilege escalation exploit that spawns cmd.exe.

tags | exploit, local
MD5 | ae9567a53527830bd97ba50d5c8c0da8
Mandriva Linux Security Advisory 2012-144
Posted Aug 29, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-144 - Multiple vulnerabilities has been found and corrected in tetex. The Gfx::getPos function in the PDF parser in poppler, allows context-dependent attackers to cause a denial of service via unknown vectors that trigger an uninitialized pointer dereference. The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in poppler, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a PDF file with a crafted Type1 font that contains a negative array index, which bypasses input validation and which triggers memory corruption. Various other issues have also been addressed. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2010-3702, CVE-2010-3704, CVE-2011-0433, CVE-2011-0764, CVE-2011-1552, CVE-2011-1553, CVE-2011-1554
MD5 | 07a1d1e4f42dbf305a836a901fd380de
IMF 2013 Call For Papers
Posted Aug 29, 2012
Site imf-conference.org

IMF 2013 Call For Papers - The International Conference on IT-Incident Management and IT-Forensics invites submissions for IMF 2013 being held from March 12th through the 14th in Nuremberg, Germany.

tags | paper, conference
MD5 | f7089c9ed3c46f9f4f309196c7456be7
Plogger 1.0 RC1 Cross Site Scripting
Posted Aug 29, 2012
Authored by HTTPCS

Plogger version 1.0 RC1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 7392dc1f7eb268d36a8b7babc01e09e0
Technical Cyber Security Alert 2012-240A
Posted Aug 29, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-240A - A vulnerability in the way Java 7 restricts the permissions of Java applets could allow an attacker to execute arbitrary commands on a vulnerable system.

tags | advisory, java, arbitrary
MD5 | e5e5cd52692029936f512b51ebde7cb5
RV Shopping Cart Cross Site Request Forgery
Posted Aug 29, 2012
Authored by DaOne

RV Shopping Cart suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 188ee01428444d462acfc6dd33536e9e
RV Article Publisher Cross Site Request Forgery
Posted Aug 29, 2012
Authored by DaOne

RV Article Publisher suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 6cac3195b6cefb1e106ece3b8f83e3e8
Simple Web Server 2.2-rc2 Code Execution
Posted Aug 29, 2012
Authored by Dhruval

Simple Web Server version 2.2-rc2 remote code execution exploit with egghunting and ASLR bypass.

tags | exploit, remote, web, code execution
MD5 | 8361ddc7efb40cc50927786cf8abf91b
HP Security Bulletin HPSBUX02805 SSRT100919 3
Posted Aug 29, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02805 SSRT100919 3 - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other exploits. Revision 3 of this advisory.

tags | advisory, java, remote, vulnerability
systems | hpux
advisories | CVE-2012-0551, CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1720, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725, CVE-2012-1726
MD5 | b1063e3233016b8ef9ad240bbaa4f307
WordPress Cloudsafe365 Local File Inclusion
Posted Aug 29, 2012
Authored by Jan van Niekerk

WordPress Cloudsafe365 third party plugin suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | ab6468d84d722716385baae52768e63f
Apache OpenOffice 3.4.0 Logic Errors
Posted Aug 29, 2012
Authored by Timo Warns | Site openoffice.org

When OpenOffice reads an ODF document, it first loads and processes an XML stream within the file called the manifest. Apache OpenOffice 3.4.0 has logic errors that allows a carefully crafted manifest to cause reads and writes beyond allocated buffers.

tags | advisory
advisories | CVE-2012-2665
MD5 | 4a1eecc2fd43210f99fc9fdafd3fd83f
Ubuntu Security Notice USN-1547-1
Posted Aug 29, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1547-1 - Vreixo Formoso discovered that the libGData library, as used by Evolution and other applications, did not properly verify SSL certificates. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter data transmitted via the GData protocol.

tags | advisory, remote, protocol
systems | linux, ubuntu
advisories | CVE-2012-1177
MD5 | a74f0aaab1cc8128ef7472f38a47d4e6
Ubuntu Security Notice USN-1546-1
Posted Aug 29, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1546-1 - It was discovered that multiple integer overflows existed in the malloc and calloc implementations in the Boehm-Demers-Weiser garbage collecting memory allocator (libgc). These could allow an attacker to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-2673
MD5 | af13ec9ccfad89c0d28de967ebccf041
Arihant Infotech CMS Cross Site Scripting
Posted Aug 29, 2012
Authored by Crim3R

Arihant Infotech CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | d3e3da2c65442493489d7cae73c5ace8
MTV.com Cross Site Scripting
Posted Aug 29, 2012
Authored by TayfunBasoglu

MTV.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 9360fbbf901e746f9d95c1d5ee1a8823
JQuery Tooltip Cross Site Scripting
Posted Aug 28, 2012
Authored by Claudio Contin

JQuery Tooltip suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0e56f4144065cbfeec94cf151d92981f
Mieric AddressBook 1.0 SQL Injection
Posted Aug 28, 2012
Authored by Jean Pascal Pereira

Mieric AddressBook 1.0 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
MD5 | 2ab156ea777daef079814a354a395001
ANGLER Technologies CMS Cross Site Scripting
Posted Aug 28, 2012
Authored by Am!r | Site irist.ir

ANGLER Technologies CMS suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | c036c87fbcbe832004ad090a426eaffe
Page 5 of 38
Back34567Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close