accept no compromises
Showing 1 - 25 of 33 RSS Feed

Files Date: 2008-10-16

ipreg04-sql.txt
Posted Oct 16, 2008
Authored by JosS | Site spanish-hackers.com

IP Reg versions 0.4 and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 11c291f41dbf0fa60ee569bfcb04f7e5
myevent-sql.txt
Posted Oct 16, 2008
Authored by JosS | Site spanish-hackers.com

myEvent version 1.6 suffers from a remote SQL injection vulnerability in viewevent.php.

tags | exploit, remote, php, sql injection
MD5 | d30ab7c3b454f8d9249f99f73c0f27e8
kure-lfi.txt
Posted Oct 16, 2008
Authored by JosS | Site spanish-hackers.com

Kure version 0.6.3 suffers from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
MD5 | 196181b8904eb288522633db7d65dc00
astrospaces-sql.txt
Posted Oct 16, 2008
Authored by TurkishWarriorr | Site 1923turk.org

AstroSPACES suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7998fd0f32e4920f2fbea48e2b405999
hummingbird-poc.txt
Posted Oct 16, 2008
Authored by Thomas Pollet

Hummingbird versions 13.0 and below Active-X remote buffer overflow exploit.

tags | exploit, remote, overflow, activex
MD5 | d99ef5723e4dfd30ebf71adfd4f85d5b
hackers-rfc.txt
Posted Oct 16, 2008
Authored by fckD

The Hacker's RFC - This document introduces best practices a computer hacker should know about and implement for his own safety.

tags | paper
MD5 | 7bcf0701c8097dac62f535cb9feb45eb
Secunia Security Advisory 32152
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Node clone module for Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 348882004515add64574d619efc78e09
Secunia Security Advisory 32236
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the System Requirements Lab ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
MD5 | ab0a7a2b4188158c1f6d4d33618c83f7
Secunia Security Advisory 32246
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Adobe Flash CS3, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | f3ffdaa225d2acd5631067851c52ada7
Secunia Security Advisory 32258
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - saxdax and drpepperONE have reported a vulnerability in various Telecom Italia Alice routers, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 903e09c15205361af0bf44c824b10046
Secunia Security Advisory 32270
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in Adobe Flash Player, which can be exploited by malicious people to bypass certain security restrictions or manipulate certain data.

tags | advisory
MD5 | 7f277c0409d806abe0b286832e6d0d9b
Secunia Security Advisory 32275
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for drupal. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 653d68bf6980b186fecfe23e8c8ee2bd
Secunia Security Advisory 32276
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Node Vote module for Drupal, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 356e2cf5ff04984a976cbbd4a7570a4a
Secunia Security Advisory 32279
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for bluez-utils and bluez-libs. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system.

tags | advisory, denial of service
systems | linux, fedora
MD5 | 634f070d930357f82eae87bf0be655fb
Secunia Security Advisory 32284
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cups. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 0c12bc083bb41e9de7ea2a9160cdc62b
Secunia Security Advisory 32285
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Shindig-Integrator module for Drupal, where some have an unknown impact, and others can be exploited by malicious users to conduct script insertion attacks, and by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | b11b7f1d9bcfb7ff2120959feb60611c
Secunia Security Advisory 32286
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for neon. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | 6954654045a595c45dd2f615e74d4643
Secunia Security Advisory 32287
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Systems Insight Manager (SIM), which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | efc7cb63af000d2a0627076e9a4f033c
Secunia Security Advisory 32289
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - JosS has discovered two vulnerabilities in myWebland myStats, which can be exploited by malicious people to bypass certain security restrictions and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | d458cb42c020af61e770317121333bf6
Secunia Security Advisory 32292
Posted Oct 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for cups. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | 948c5d04f428caf7fb3f46262a335c6e
Mandriva Linux Security Advisory 2008-213
Posted Oct 16, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The D-Bus library did not correctly validate certain corrupted signatures which could cause a crash of applications linked against the D-Bus library if a local user were to send a specially crafted D-Bus request. The updated packages have been patched to prevent this issue.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2008-3834
MD5 | c8d33b85c7f33e61117c7cc6b518665c
Mandriva Linux Security Advisory 2008-212
Posted Oct 16, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - libxml2 version 2.7.0 and 2.7.1 did not properly handle predefined entities definitions in entities, which allowed context-dependent attackers to cause a denial of service (memory consumption and application crash) via certain XML documents. The updated packages have been patched to prevent this issue.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2008-4409
MD5 | dc01d24b422f5426093f04c3aa097be0
Ubuntu Security Notice 656-1
Posted Oct 16, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 656-1 - It was discovered that the SGI image filter in CUPS did not perform proper bounds checking. If a user or automated system were tricked into opening a crafted SGI image, an attacker could cause a denial of service. It was discovered that the texttops filter in CUPS did not properly validate page metrics. If a user or automated system were tricked into opening a crafted text file, an attacker could cause a denial of service. It was discovered that the HP-GL filter in CUPS did not properly check for invalid pen parameters. If a user or automated system were tricked into opening a crafted HP-GL or HP-GL/2 file, a remote attacker could cause a denial of service or execute arbitrary code with user privileges. In Ubuntu 7.10 and 8.04 LTS, attackers would be isolated by the AppArmor CUPS profile.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2008-1722, CVE-2008-3639, CVE-2008-3640, CVE-2008-3641
MD5 | 621b6f35079dd2658957b84709207997
adobe-heap.txt
Posted Oct 16, 2008
Authored by Paul Craig | Site security-assessment.com

During analysis of the SWF file format used by commercial Flash authoring applications multiple heap overflows were discovered within Adobe Flash CS3 Professional, and Adobe Flash MX 2004.

tags | advisory, overflow
MD5 | fcce1ca4b7c42d64566164c020e47a86
HP Security Bulletin 2008-00.43
Posted Oct 16, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to gain unauthorized access to data.

tags | advisory
advisories | CVE-2008-0068
MD5 | 01ff146694a6f01f080404b23becd29f
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close