what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 936 RSS Feed

Files Date: 2012-08-01 to 2012-08-31

Express Burn Plus 4.58 Buffer Overflow
Posted Aug 28, 2012
Authored by LiquidWorm | Site zeroscience.mk

Express Burn Plus version 4.58 suffers from a vulnerability that is caused due to a boundary error in the processing of a project file, which can be exploited to cause a unicode buffer overflow when a user opens e.g. a specially crafted .EBP file. Successful exploitation could allow execution of arbitrary code on the affected machine.

tags | exploit, overflow, arbitrary
SHA-256 | 08e7ff9e01fa59fc164d33e4e3df8f5a40ec708c92dcabf0c5283bfdfa23259a
Sage 50 Payroll 2012 Authentication Bypass
Posted Aug 28, 2012
Authored by Richard Davy

This is a whitepaper detailing how to perform authentication bypass against Sage 50 Payroll 2012 version 18.00.031 using Immunity Debugger.

tags | exploit, paper, bypass
SHA-256 | bf9e32ff6711bdd25f0473894bee2ccf852a964b8f3280f156abf18fd8f4ec99
Wiki Web Help 0.3.9 Cross Site Scripting
Posted Aug 28, 2012
Authored by Shai rod

Wiki Web Help version 0.3.9 suffers from a stored cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | e68fce127757a39e865dc1d2314d2b2291059f24abc8dca32bd3b811ac595f4e
Conceptronic Authentication Bypass
Posted Aug 28, 2012
Authored by Mattijs van Ommeren

Conceptronic Grab’n’Go Network Storage and Sitecom Home Storage Center suffers from an authentication bypass vulnerability due to doing all cookie validation in javascript.

tags | exploit, javascript, bypass
SHA-256 | a8ced793b1d6580a69a234553e0bfa276e70ddada5bbd956902b6b3f8cdbd9b9
XWiki 4.2-milestone-2 Cross Site Scripting
Posted Aug 28, 2012
Authored by Shai rod

XWiki version 4.2-milestone-2 suffers from multiple stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | c25959b05ad0c3c4ffa247f3a057eebafca9fa9ae6be574d7c1032d7c874d265
VLinks 2.0.3 SQL Injection
Posted Aug 28, 2012
Authored by jiko

VLinks version 2.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b23c5588697d4e2b9fed3c47f1cc90d681247e484cbd8dd9bc6554bd7c96e605
CommPort 1.01 Authentication Bypass
Posted Aug 28, 2012
Authored by Jean Pascal Pereira

CommPort version 1.01 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | f452f7ccb48a60edc5d99a67b983276202b6fae18cf2d19313b49d3c85e0732c
Silly Fellow Cross Site Scripting
Posted Aug 28, 2012
Authored by cr4wl3r

Silly Fellow suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0bf829fa089cb8954d682d2197a17e2c1bf6350d1c309d3ef4c73776304764e2
CommPort 1.01 SQL Injection
Posted Aug 28, 2012
Authored by Jean Pascal Pereira

CommPort version 1.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6721f54935455b70225444dccf2aed30092482422ee8ee5cc79fd86e61bd132e
Red Hat Security Advisory 2012-1208-01
Posted Aug 28, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1208-01 - The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function properly. Multiple integer overflow flaws, leading to stack-based buffer overflows, were found in glibc's functions for converting a string to a numeric representation, strtof(), and strtold()). If an application used such a function on attacker controlled input, it could cause the application to crash or, potentially, execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-3480
SHA-256 | 38c44f4e936f0865b778142043b48db215db036dcbf8504a5069e55ff3a39a6f
Red Hat Security Advisory 2012-1207-01
Posted Aug 28, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1207-01 - The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function properly. Multiple integer overflow flaws, leading to stack-based buffer overflows, were found in glibc's functions for converting a string to a numeric representation, strtof(), and strtold()). If an application used such a function on attacker controlled input, it could cause the application to crash or, potentially, execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-3480
SHA-256 | b5de128de66826d4c69f820bb04f1b9544c7f8570dc56e96ecddcddd2799a810
Red Hat Security Advisory 2012-1206-01
Posted Aug 28, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1206-01 - Python Paste provides middleware for building and running Python web applications. The python-paste-script package includes paster, a tool for working with and running Python Paste applications. It was discovered that paster did not drop supplementary group privileges when started by the root user. Running "paster serve" as root to start a Python web application that will run as a non-root user and group resulted in that application running with root group privileges. This could possibly allow a remote attacker to gain access to files that should not be accessible to the application.

tags | advisory, remote, web, root, python
systems | linux, redhat
advisories | CVE-2012-0878
SHA-256 | 5c66d2db6e0682e8949f723061869cb26e0e9f0ed046838762d25a4250496f11
Chamilo 1.8.8.4 XSS / File Deletion
Posted Aug 27, 2012
Authored by beford

Chamilo version 1.8.8.4 suffers from cross site scripting and file deletion vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2012-4029, CVE-2012-4030
SHA-256 | f6702243903936cbaa2e98f608ae5a643d456a1e780d4347484c278c5840d79e
Slackware Security Advisory - dhcp Updates
Posted Aug 27, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New dhcp packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2012-4539, CVE-2011-4868, CVE-2012-3954
SHA-256 | a0be7f8440d79d39d97fd1aeb24830064dff9c06fada48bb6c8e52e85f74c1a2
DNS-Based Phishing Attack In Public Hotspots
Posted Aug 27, 2012
Authored by John Jeffrey

This document gives a brief practical insight on how to carry out a DNS-based phishing attack in public Wi-Fi hotspots to trick users into sharing their personal information such as passwords, credit card details etc.

tags | paper
SHA-256 | dd9e8c0dd25eee649722c257d7f84bad82c374c3bf2c461cfa58657d5ad5b83d
Internet Explorer MSXML MS12-043
Posted Aug 27, 2012
Authored by Senator of Pirates

Whitepaper detailing the Microsoft Internet Explorer MSXML vulnerability as detailed in MS12-043. Written in Arabic.

tags | paper
SHA-256 | bbcca47f94b388b571cd17325f08a2e5c0f7e08c14596c91a9db391a76d83227
WordPress Simple Forum Shell Upload
Posted Aug 27, 2012
Authored by Mr.Cicili

The WordPress Simple Forum third party plugin suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e1e39658b33451a7ab77fc9db250112689f1bfa7d4de2a6796d81114c8d1a500
Mihalism Multi Host 5.0 Cross Site Scripting
Posted Aug 27, 2012
Authored by Explo!ter

Mihalism Multi Host version 5.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a1d8ecc401363d01dd82498c1cf7cc2cb8ee11beda361dd2366c89cdde8fc3f2
Silentblast Interactive Shell Upload
Posted Aug 27, 2012
Authored by FarbodEZRaeL

CMS systems provided by Silentblast Interactive suffer from a remote shell upload vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, shell
SHA-256 | d76c471e226222540778870b238689c3374f836beaebb441943379bcfe6a0741
Dark D0rk3r 0.8
Posted Aug 27, 2012
Authored by baltazar

Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.

Changes: Various updates.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
SHA-256 | d5e18476351c15cadf4a4c449aee566b2e265d0424264cd5d1d72bcd319463cd
IBN Cross Site Scripting
Posted Aug 27, 2012
Authored by Net.W0lf

IBN suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | eccf3f90f95136a98a4ec6854e23d967e583a5087f812cbd32d9bcb9e530382d
Paliz CMS Path Disclosure
Posted Aug 27, 2012
Authored by HighSecure.ir

Paliz CMS suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 9259858bb11827528747b0365f0ef19b3803a6504756306efea494d6897e279a
Khorshid Chehr SQL Injection
Posted Aug 27, 2012
Authored by Jasper Koehorst

Khorshid Chehr suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4bb49f76fdf9ac4a71bc4e6ae9a4d64b6379bddbd30b88a257473a59a6264a25
Douran CMS Path Disclosure
Posted Aug 27, 2012
Authored by HighSecure.ir

Douran CMS suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 14e9166604e1c8932bbb85c6279444ac8580e5616b6d3b7a8a0b589be580b699
Smartd0rk3r Scanner 0.2
Posted Aug 27, 2012
Authored by baltazar, levi

Smartd0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors. It is based on darkd0rk3r.

Changes: Added various changes and bug fixes.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
SHA-256 | 05aec84072b9046e3fb81624c82100eff40f19cf90bb26d9aa1ce4a4ce8aca3c
Page 7 of 38
Back56789Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close