exploit the possibilities
Showing 26 - 50 of 100 RSS Feed

Files

WordPress Track That Stat 1.0.8 Cross Site Scripting
Posted May 15, 2012
Authored by Heine Pedersen, Torben Jensen

WordPress Track That Stat plugin version 1.0.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 148509ae8edc1038128b97a56f0f73dc

Related Files

Secunia Security Advisory 49850
Posted Jul 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a security issue in the GD Star Rating plugin for WordPress, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 4b6a09fce0dc4049b096335b88e03920
Secunia Security Advisory 49836
Posted Jul 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered multiple vulnerabilities in the Mac Photo Gallery plugin for WordPress, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | e8665c81dff3f7c90e9605cadc75df4e
Secunia Security Advisory 50038
Posted Jul 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Backup plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | eaae04f23d669cad28f8297c445a9372
Secunia Security Advisory 49910
Posted Jul 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered two vulnerabilities in the Flexi Quote Rotator plugin for WordPress, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, sql injection, csrf
MD5 | 65707ad61ac31f19f97dc800f6e719a1
Secunia Security Advisory 50030
Posted Jul 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Get Off Malicious Scripts plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 88d3522399a6a74215a7f72e860b05e2
WordPress Chenpress Shell Upload
Posted Jul 21, 2012
Authored by Am!r | Site irist.ir

WordPress ChenPress plugin suffers from a remote shell upload vulnerability via a FCKEditor.

tags | exploit, remote, shell
MD5 | 4d57c5aab8a869355fa7edbf23b7fc88
Secunia Security Advisory 49996
Posted Jul 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Nmedia Users File Uploader plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, file upload
MD5 | 3decd94bc73492932f55162ea381a7b0
Ubuntu Security Notice USN-1512-1
Posted Jul 19, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1512-1 - It was discovered that KDE PIM html renderer incorrectly enabled JavaScript, Java and Plugins. A remote attacker could use this flaw to send an email with embedded JavaScript that possibly executes when opened.

tags | advisory, remote, javascript
systems | linux, ubuntu
advisories | CVE-2012-3413
MD5 | ebd60aa230dce5e5b1245cc23faea2f8
Secunia Security Advisory 49975
Posted Jul 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Cimy User Extra Fields Plugin for WordPress, which can be exploited by malicious users and malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4058b7514e58a11c64892f080e3ee003
WordPress Cimy User Extra Fields 2.3.7 Shell Upload
Posted Jul 18, 2012
Authored by Crim3R

WordPress Cimy User Extra Fields plugin version 2.3.7 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 40d87b43f69eaf6f45de5f5f14f58878
metaSSH Session Plugin For Metasploit 0.1
Posted Jul 17, 2012
Authored by dirtyfilthy | Site github.com

metaSSH is a session plugin for Metasploit that gives you a meterpreter-like interface over an ssh connection. The author original wrote this code so they could cleanly reverse pivot over ssh from within metasploit. Features include multi-channel, pivoting, post-exploitation module use, and more.

tags | tool
systems | linux, unix
MD5 | d154d6986acc7ae7bda65c447110380b
Secunia Security Advisory 49949
Posted Jul 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in the LeagueManager plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 3b646bceb7e62607f51680f9e3b9908e
WordPress Count Per Day 3.1.1 Cross Site Scripting
Posted Jul 17, 2012
Authored by Stefan Schurtz

WordPress plugin Count Per Day version 3.1.1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | c5e7b42d986ac6286c5ff34c35c54409
Metasploit pcap_log Privlege Escalation
Posted Jul 17, 2012
Authored by 0a29406d9794e4f9b30b3c5d6702c708

Metasploit plugin 'pcap_log' is vulnerable to an arbitrary file overwrite bug which can further be leveraged to insert user-controlled data resulting in potential escalation of privileges. Metasploit module included.

tags | exploit, arbitrary
MD5 | 1c1a2e4bbb8686b5a2ffe725525cb6f6
Secunia Security Advisory 49945
Posted Jul 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Post Recommendations plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | b9d3763d247e5c57590cd5e0954108be
Secunia Security Advisory 49896
Posted Jul 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Resume Submissions & Job Postings plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | f442c38d6d136b82f826f5179d3504ab
WordPress Resume Submissions / Job Postings 2.5.1 Shell Upload
Posted Jul 13, 2012
Authored by Chris Kellum

WordPress Resume Submissions and Job Postings plugin version 2.5.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | f4899f14244552c6921c182b8b197f23
Zero Day Initiative Advisory 12-125
Posted Jul 13, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-125 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within Quicktime.qts. The stack buffer overflow occurs as a result of an unbounded string copy function in Quicktime.qts, reachable through the IQTPluginControl::SetLanguage COM method exposed by the COM object QTPlugin.ocx. This vulnerability can be leveraged to execute code under the context of the user.

tags | advisory, remote, overflow, arbitrary
systems | apple
advisories | CVE-2012-0666
MD5 | 425fd990d9d1f04fa82ad12630cbfa66
Secunia Security Advisory 49630
Posted Jul 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the Paid Memberships Pro plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 76dfa34237e25a80f02a088ecfc21c2c
WordPress Generic Plugin Shell Upload
Posted Jul 13, 2012
Authored by KedAns-Dz

This Metasploit module exploits an arbitrary PHP File Upload and Code Execution flaw in some WordPress blog software plugins. The vulnerability allows for arbitrary file upload and remote code execution POST Data to Vulnerable Script/File in the plugin.

tags | exploit, remote, arbitrary, php, code execution, file upload
MD5 | 6e5db5ab504788fb9b8796603515439f
Secunia Security Advisory 49854
Posted Jul 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered multiple vulnerabilities in the Global Content Blocks plugin for WordPress, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to disclose potentially sensitive information.

tags | advisory, vulnerability
MD5 | 843e63e12f1653de4aefabb132c2ef9e
Ubuntu Security Notice USN-1503-1
Posted Jul 12, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1503-1 - Hans Spaans discovered that the Context plugin in Rhythmbox created a temporary directory in an insecure manner. A local attacker could exploit this to execute arbitrary code as the user invoking the program. The Context plugin is disabled by default in Ubuntu.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2012-3355
MD5 | c0716989e4840878823f6a253b6bbd6b
Secunia Security Advisory 49865
Posted Jul 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in The Guardian News Feed plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 546d7a6bb4eb15e4382d026b59df5fe6
Secunia Security Advisory 49506
Posted Jul 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the Sendit plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 2d04ed85f631cd21c69853910d680048
Secunia Security Advisory 49505
Posted Jul 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the A Page Flip Book plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 414728c4ffcc7c0a98a0259e2cb0e810
Page 2 of 4
Back1234Next

File Archive:

January 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    8 Files
  • 2
    Jan 2nd
    11 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    2 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    18 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    10 Files
  • 10
    Jan 10th
    13 Files
  • 11
    Jan 11th
    2 Files
  • 12
    Jan 12th
    4 Files
  • 13
    Jan 13th
    21 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    12 Files
  • 16
    Jan 16th
    18 Files
  • 17
    Jan 17th
    11 Files
  • 18
    Jan 18th
    3 Files
  • 19
    Jan 19th
    2 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    21 Files
  • 22
    Jan 22nd
    19 Files
  • 23
    Jan 23rd
    19 Files
  • 24
    Jan 24th
    11 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close