what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 653 RSS Feed

Files Date: 2012-11-01 to 2012-11-30

Secunia Security Advisory 51398
Posted Nov 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and two vulnerabilities have been discovered in Greenstone, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | fe98216e4aabcacb304f411427316aa8a054cc822f15207f4e1a88716d0b8c50
Secunia Security Advisory 51368
Posted Nov 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in phpCAS, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | a5a96a7db7145f90971a55670620bc7e469891670bc59a4fa4a1c9553ee0e609
Forescout NAC 6.3.4.1 XSS / Redirection / Filter
Posted Nov 27, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

Forescout NAC (Network Access Control) version 6.3.4.1 suffers from ICMP and ARP protocols not being filtered, cross site scripting, and cross site redirection vulnerabilities.

tags | exploit, vulnerability, protocol, xss
advisories | CVE-2012-4985, CVE-2012-4982, CVE-2012-4983
SHA-256 | 90ab742926bd9cb0fc57e37ec8e11486dca2cd8c598556ffb9050f73ff6d40b3
BugTracker.Net 3.5.8 XSS / SQL Injection / File Disclosure
Posted Nov 27, 2012
Authored by DefenseCode

BugTracker.Net versions 3.5.8 and below suffer from cross site scripting, file disclosure, and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, xss, sql injection
SHA-256 | 07b4beeb256cbf8c5f0d3759fcd338c89a7c545ae95b815b4e6b4126652889be
RSA Adaptive Authentication (On-Premise) 6.x XSS
Posted Nov 27, 2012
Site emc.com

RSA Adaptive Authentication (On-Premise) version 6.x contains cross site scripting vulnerabilities that could be exploited by malicious users.

tags | advisory, vulnerability, xss
advisories | CVE-2012-4611
SHA-256 | 84f8cf21f7e1dfc3a155bca1ff11ed500da27015edcbfdf7f394bf6e738444f1
Skype Community Username Cross Site Scripting
Posted Nov 27, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

A filter and mail encoding vulnerability in the Skype Community website application allows for cross site scripting due to a lack of sanitization in the username parameter.

tags | exploit, xss
SHA-256 | 8139126dc6bd54dfa68f620141919aee07c4e0dfb91c8b9a3c0ad4c2c83d5fd4
Skype Community Body / Title Cross Site Scripting
Posted Nov 27, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

A filter and mail encoding vulnerability in the Skype Community website application allows for cross site scripting due to a lack of sanitization in the message and body parameters.

tags | exploit, xss
SHA-256 | 44fd3382c5f0a2777c58764b28b96984dab051341b8031ab27b5073128a5bedd
SoftHSM 1.3.4
Posted Nov 27, 2012
Authored by Rickard Bellgrim | Site wiki.opendnssec.org

SoftHSM is an implementation of a cryptographic store accessible through a PKCS#11 interface. You can use it to explore PKCS#11 without having a Hardware Security Module. It is being developed as a part of the OpenDNSSEC project. SoftHSM uses Botan for its cryptographic operations.

Changes: Supports an RSASSA-PSS signature scheme. The default location of the token database is now $localstatedir/lib/softhsm/.
tags | library
systems | unix
SHA-256 | f10319dfa651023dad3d0845d284ec08ef982c1fc1bdb55cf8a725f762961e97
Ubuntu Security Notice USN-1640-1
Posted Nov 27, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1640-1 - Xi Wang and Florian Weimer discovered that libssh incorrectly handled memory. A remote attacker could use this to cause libssh to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-4559, CVE-2012-4560, CVE-2012-4561, CVE-2012-4562
SHA-256 | 49a32b62fb4070d1e8aaa6c34b9e46b28acc5b05eeb6b1a378719f9edcaa254f
Seringa SQL Injection Framework
Posted Nov 26, 2012
Authored by Paraschiv Andrei | Site github.com

Seringa (Romanian for seringe) is an SQL injection framework featuring high customizability and a user-friendly interface. It is completely open source. Uses the .NET 4.0 framework and Windows Presentation Foundation (WPF) for the GUI. With regard to design it utilizes the Strategy Pattern to distinguish between various SQLi strategies whilst storing other relevant data such as exploits, payloads and patterns in xml files so that the framework can be easily customized from the outside (a manifestation of the Open-Closed Principle).

tags | tool, scanner, sql injection
systems | windows, unix
SHA-256 | 12c6c7ca253db5b9a765be47d038f7aafa4725d090e4409dd3208b0d3aa802e9
Apple QuickTime 7.7.2 TeXML Style Element font-table Field Stack Buffer Overflow
Posted Nov 26, 2012
Authored by juan vazquez, Arezou Hosseinzad-Amirkhizi | Site metasploit.com

This Metasploit module exploits a vulnerability found in Apple QuickTime. When handling a TeXML file, it is possible to trigger a stack-based buffer overflow, and then gain arbitrary code execution under the context of the user. This is due to the QuickTime3GPP.gtx component not handling certain Style subfields properly, as the font-table field, which is used to trigger the overflow in this module. Because of QuickTime restrictions when handling font-table fields, only 0x31-0x39 bytes can be used to overflow, so at the moment DEP/ASLR bypass hasn't been provided. The module has been tested successfully on IE6 and IE7 browsers (Windows XP and Vista).

tags | exploit, overflow, arbitrary, code execution
systems | windows, apple
advisories | CVE-2012-3752, OSVDB-87087
SHA-256 | ddda9ef400d14cabdbdf2f3208a25c3493b5c17111bbffef64ec3fb342b45d9d
EMC Smarts Network Configuration Manager Bypass
Posted Nov 26, 2012
Site emc.com

EMC Smarts Network Configuration Manager versions prior to 9.1 suffer from hard-coded encryption key and unauthenticated database connection vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2012-4615
SHA-256 | 439bbcd4a69b43b581354b97da8d2fc1d0f95a1a7e8f113e8b824661c159e743
Mozilla Firefox "DocumentViewerImpl" Class Remote Use-After-Free
Posted Nov 26, 2012
Authored by VUPEN, Jordan Gruskovnjak | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Mozilla Firefox. The vulnerability is caused by a use-after-free error within the "DocumentViewerImpl::Show()" function, which could allow remote attackers to execute arbitrary code via a specially crafted web page.

tags | advisory, remote, web, arbitrary
SHA-256 | 5a8e530f261da8290d43f4bfe0c239292f5ff8d72f3e1b7040beafbd9b701dff
mcrypt 2.5.8 Stack Based Overflow
Posted Nov 26, 2012
Authored by Tosh

mcrypt versions 2.5.8 and below stack based overflow exploit. Bypasses NX and ASLR protections.

tags | exploit, overflow
advisories | CVE-2012-4409
SHA-256 | 6f15e1bd074af02d183bab2a865cd5bf95ecee50e01396c6679bc20335f5266b
SmartCMS SQL Injection
Posted Nov 26, 2012
Authored by NoGe

SmartCMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8b086e2e6bc7eeb1ffd6e000847cd1748adf58f95967e0ef4dd1f7b1159e3217
PRADO PHP Framework 3.2.0 File Read
Posted Nov 26, 2012
Authored by LiquidWorm | Site zeroscience.mk

PRADO PHP Framework version 3.2.0 suffers from an arbitrary file read vulnerability.

tags | exploit, arbitrary, php
SHA-256 | fd086e67da0464ec36c572d088ffc6674ea2d174e7ab301aeecffdd832d45766
GNU Transport Layer Security Library 3.1.5
Posted Nov 26, 2012
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This release adds support for UCS-2 encoded DNs, improvements to smart card key generation, and a few bugfixes.
tags | protocol, library
SHA-256 | 2f095984dd9cbbf4dce417ecd81640fe47732322d025062b2c9a189d022de0d3
CVE Checker 3.2
Posted Nov 26, 2012
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Reports CVSS scoring when a CVE is potentially applicable to the system. Also fixes some buffer handling code and adds in checks for missing runtime dependencies in the scripts.
tags | tool, vulnerability
systems | unix
SHA-256 | d054766533535bda5c86d8650a423042fb8de3363a77ff9ebc18531177104f66
Incomedia WebSite X5 Evolution 9.0.4.1748 XSS / Bypass
Posted Nov 26, 2012
Authored by Akastep

Incomedia WebSite X5 Evolution versions 9.0.4.1748 and below suffer from bypass and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6c4adfb0b186de88cf8aa1d1d84f4ddb0f4cd1d3e8f1f19606cace93970fa3a1
WordPress Oberliga SQL Injection
Posted Nov 26, 2012
Authored by Ashiyane Digital Security Team, sil3nt

WordPress Oberliga Theme suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2d70289de97e352a135d3a3978019801c6eaea9b5dec5fae3815e1895fa50be9
PHP-Nuke 8.2 SQL Injection
Posted Nov 26, 2012
Authored by Ashiyane Digital Security Team

PHP-Nuke version 8.2 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 5bd40e5c1333df98f71396e246db2673bfba846ced867a9b077d381b492c9545
Secunia Security Advisory 51374
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for icedtea-web. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory, web
systems | linux, suse
SHA-256 | 8b11b2967d13e3ded26849ef210ba513392094241eb9abed528937a8aed5e852
Secunia Security Advisory 51329
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Tor, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ba2da04da292ff0dacb00c4df8fec6951c9f28253e4bc3dd88f6b1d54d01bad8
Secunia Security Advisory 51290
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability lab has reported two vulnerabilities in ManageEngine ServiceDesk Plus, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | f2c8ad4820af79432ab9ae3955e7ac0789beda59c53668e1c6c9b6908ab08caf
Secunia Security Advisory 51354
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Julien Cayssol has reported a vulnerability in Synology Photo Station, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 3be5b46d5361090d126ad0adbf7704a61d183dd5ce049b6472644228c0f6ed78
Page 4 of 27
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close