Subscribe via feed.
Posts under XSS

[remote] – Atmail Email Server Appliance 6.4 XSS – CSRF – RCE

Posted by stop4help under exploit, m$, Security, XSS (No Respond)

Atmail Email Server Appliance 6.4 XSS – CSRF – RCE

Tags: , ,

[webapps] – X-Cart Gold 4.5 (products_map.php symb parameter) XSS Vulnerability

Posted by bambiVichi under exploit, m$, Security, XSS (No Respond)

X-Cart Gold 4.5 (products_map.php symb parameter) XSS Vulnerability

Tags: , , ,

[webapps / 0day] – PBBoard v2.1.4 CMS – persistent XSS Vulnerabilities

Posted by deepcore under exploit, m$, Security, XSS (No Respond)

Read More: [webapps / 0day] – PBBoard v2.1.4 CMS – persistent XSS Vulnerabilities

Tags: , ,

Zero Day Initiative Advisory 12-125

Zero Day Initiative Advisory 12-125 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Forensic Analysis Of iPhone Backups

This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups.

Tags: , ,

strongSwan IPsec Implementation 5.0.0

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface

Tags: , ,

Apple QuickTime TeXML Stack Buffer Overflow

This Metasploit module exploits a vulnerability found in Apple QuickTime.

Tags: , ,

Zero Day Initiative Advisory 12-108

Zero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Zero Day Initiative Advisory 12-109

Zero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file

Tags: , , ,

Zero Day Initiative Advisory 12-107

Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file

Tags: , ,