exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 34 RSS Feed

Files Date: 2013-02-01

Masked Rom Data Extractor
Posted Feb 1, 2013
Authored by Adam Laurie

This python script provides a semi-automatic extraction of data from microscopic images of Masked ROM.

tags | tool, python
systems | unix
SHA-256 | c1972936349e2753620a2549d50d14097ad81805d202cd1b84ebea347a41b247
HostBox SSH 0.2
Posted Feb 1, 2013
Authored by Oskar Stridsman | Site stridsmanIT.wordpress.com

HostBox SSH is a SSH password/account scanner written in python.

Changes: Various updates.
tags | tool, scanner, python
systems | unix
SHA-256 | 36d0695c3fcf2240852de6eb7a08d01edaa9bc4492c28e29d3b4d044c37e3e6d
Packet Storm New Exploits For January, 2013
Posted Feb 1, 2013
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 172 exploits added to Packet Storm in January, 2013.

tags | exploit
systems | linux
SHA-256 | 74fea4a019701a031dbee29df1744b162ea82c0d2f2a57756440daa357692b8a
DataLife Engine preview.php PHP Code Injection
Posted Feb 1, 2013
Authored by EgiX, juan vazquez | Site metasploit.com

This Metasploit module exploits a PHP code injection vulnerability DataLife Engine 9.7. The vulnerability exists in preview.php, due to an insecure usage of preg_replace() with the e modifier, which allows to inject arbitrary php code, when the template in use contains a [catlist] or [not-catlist] tag.

tags | exploit, arbitrary, php
advisories | CVE-2013-1412
SHA-256 | 50f8efbcf7eeeb9778960d972ce5de90e0aadc26bfd2b879e8e78dbcd0d82f9c
Secunia Security Advisory 52019
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Smart Analytics System and IBM InfoSphere Balanced Warehouse, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | 416145cd298b3f3de1f0d9c1afd540c6f44ce33466d2d4874a4be681ea243ebf
HP Security Bulletin HPSBST02839 SSRT101077
Posted Feb 1, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBST02839 SSRT101077 - A potential security vulnerability has been identified with HP XP P9000 Command View Advanced Edition. The vulnerability could be remotely exploited to create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2012-3281
SHA-256 | 79ba9c5386d95204caed5c10767f09b9c939d40d3aecffc1558d4ab60294e0de
Drupal Drush Debian Packaging 7.x Information Disclosure
Posted Feb 1, 2013
Authored by jiri-catalyst | Site drupal.org

Drupal Drush Debian Packaging third party module version 7.x suffers from an information disclosure vulnerability.

tags | advisory, info disclosure
systems | linux, debian
SHA-256 | 1015e0e169a63db65a92dde56297d650742c8bc7274ed4640cf9b4f20cd7af6e
Oracle Automated Service Manager 1.3 Local Root
Posted Feb 1, 2013
Authored by Larry W. Cashdollar

Oracle Automated Service Manager version 1.3 suffers from a local root privilege escalation vulnerability during install.

tags | exploit, local, root
SHA-256 | 541a2508bc332207de3f68c469abd43870d40347d9628cf361e59c570beb5ac0
Secunia Security Advisory 52030
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the yolink Search plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 895b59956d4d4930e7e8c486dc4c10e8905cc1952e67a5213056948ba3869b92
Secunia Security Advisory 52029
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Messner has reported a vulnerability in Netgear SPH200D, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ed0ef72508e5261680131b459c6408d9944a0db49dc967c54f384620725fc68e
Secunia Security Advisory 52063
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Vaadin, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | e09ba00f769c526ca9f502365238f5f9e6f62aa3c0e9b889e568073532cd3257
Secunia Security Advisory 52062
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VMware ESXi, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 025e2b1081807d2f340d5b486198fc979fff79fcb03caa17f3f57f2315419613
Secunia Security Advisory 52057
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Snorby, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
SHA-256 | 86d1626ec35e7a5e4ba682afd5082aad48a29ba82efb45e1141fb9fcb2102adb
Secunia Security Advisory 52027
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the WP-Table Reloaded plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 136582c5624eab2a75892d16cf835e2f26743dccdbdd501e58f5d25b77a8adce
Secunia Security Advisory 52047
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in some VMware vSphere products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 77ee9a8f83bc855bbef3237a7f58542e9e662e57521f3897d11db4ed17eea414
Secunia Security Advisory 52061
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VMware ESX Server, which can be exploited by malicious people to disclose system information, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 953dee5e6abc26924a2fd985788ab7acdf1deeaa18ad0809ab8c2dd868722d3c
Secunia Security Advisory 52054
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for JBoss Enterprise BRMS Platform. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, by malicious users to bypass certain security restrictions, and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, local, vulnerability, xss
systems | linux, redhat
SHA-256 | 2b78ec7a6e4bcb2cda04243487c24bbc9bed84a76881606da49ae230e50aa9e8
Secunia Security Advisory 51987
Posted Feb 1, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the Google Authenticator Login module for Drupal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 93c830b14bf2f5dadff678ecdfd8f372297dc21c07d537324bf4cb4972973381
Drupal Boxes 7.x Cross Site Scripting
Posted Feb 1, 2013
Authored by Laura Dickinson | Site drupal.org

Drupal Boxes third party module version 7.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 883a4855cbe5b68c7f54caefb15b3b044b789ba54d8823042e000abfd3f9f6ed
Drupal Google Authenticator Login 7.x Access Bypass
Posted Feb 1, 2013
Authored by Patrick C. | Site drupal.org

Drupal Authenticator Login third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 196fe3285bd557e9dac596528d26eeda59453b191a34820fed2989c9a2b6a0f3
Drupal email2image 6.x Access Bypass
Posted Feb 1, 2013
Authored by Ayesh Karunaratne | Site drupal.org

Drupal email2image third party module version 6.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 253a1d07bf7853d8fcca6279e9031e0aab18b3b2f2fe8e53a3abeeb3b53944f5
Zed Attack Proxy 2.0.0 Windows Installer
Posted Feb 1, 2013
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.

Changes: An integrated add-ons marketplace, a new Ajax spider, Session scope, and various other features and improvements have been added.
tags | tool, web, vulnerability
systems | windows
SHA-256 | 0273201ad390567013a7d95589a6a4ca77c93de84fb049727d37f21c65a757b5
Zed Attack Proxy 2.0.0 Mac OS X Release
Posted Feb 1, 2013
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.

Changes: An integrated add-ons marketplace, a new Ajax spider, Session scope, and various other features and improvements have been added.
tags | tool, web, vulnerability
systems | apple, osx
SHA-256 | d091f28bd386982bd2634e3e7c5f5e630969cbbc6459cae1d41323ca641f3986
Red Hat Security Advisory 2013-0220-01
Posted Feb 1, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0220-01 - Red Hat OpenShift Enterprise is a cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-5658, CVE-2012-6072, CVE-2012-6073, CVE-2012-6074, CVE-2012-6496, CVE-2013-0158, CVE-2013-0164
SHA-256 | d7f14ab1a119bc24c7fd61b05a6f487c5d3f17fa00f6f512435c0f936d885cd7
Red Hat Security Advisory 2013-0219-01
Posted Feb 1, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0219-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. These updated packages upgrade MySQL to version 5.1.67.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2012-0572, CVE-2012-0574, CVE-2012-1702, CVE-2012-1705, CVE-2013-0375, CVE-2013-0383, CVE-2013-0384, CVE-2013-0385, CVE-2013-0389
SHA-256 | 6a09812c7d36ec90bc178719a89dff8edfe1f59e96c597bf01b100781b36899b
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close