exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2009-01-05

Secunia Security Advisory 33324
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and a security issue have been reported in A-Emlak Pro, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information.

tags | advisory, sql injection
SHA-256 | 292bc230c8a3b91c1b1256f6d8ddde9b89776070e8f427b69c1c3a4b806ad700
Secunia Security Advisory 31523
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hector Manuel Escalona Mendoza has discovered a vulnerability in Apache Roller, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 911dd5dd60bd434467b1b12987eef8dd7b7f4da4b045b2b33c630a25a7193633
Secunia Security Advisory 33332
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SuB-ZeRo has discovered a vulnerability in PhpMesFilms, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6373819a8be573d1b9ab5c41aa8f8175445da87ea959f58e84c7638b39bec2ae
Secunia Security Advisory 33280
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some vulnerabilities and security issues, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, bypass certain security restrictions, and gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | e68808cc2ef3ec9411ca401eb19a6b98246613c7442306a15da94dbdcd1303c9
Secunia Security Advisory 33346
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - aBo MoHaMeD has discovered a vulnerability in Destiny Media Player, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 8045f100396dd7f26ea3db553973d42f8d075d9b1be8a2e34f5c9c6bc8cc5426
Secunia Security Advisory 33398
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ruby1.8 and ruby1.9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | fe3a898b25eb9eba29abf34647a491bcdba98260fa0f3e3407e5e8186c927ea1
Secunia Security Advisory 33283
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ZoRLu has reported a vulnerability in Autoreminder, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e61e0887fbed11c5d884f2c609be9444e39879b40e51ad78ed59a3d43430871c
Secunia Security Advisory 33397
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xterm. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 8d8fcc7ebe9b89bb8a81e37ea11ebecf38508ce80ba93f9fff25ef43826f3103
Secunia Security Advisory 33401
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in DotNetNuke, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 1cbf17f76b225766c8d49f4c1b1cc45afc033d065e9d0d7f51aca9f15721bf6f
Secunia Security Advisory 33379
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Samba, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | e0ec610048c2ad52ed3ea2fb9fe400e6f590eb4f627d93effca78a6741680e66
Secunia Security Advisory 33391
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Links, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 88e9e30ad835be4d43f126c3b6c440621ac7a7d80e5eec94380bdaa658710356
Secunia Security Advisory 33365
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - StAkeR has discovered some vulnerabilities in the PNphpBB2 module for PostNuke, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 31418183123947e5a94f773da188adde8e0adbeae8d444ed4e51083602162e3a
Secunia Security Advisory 33382
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ahmadbady has discovered some vulnerabilities in phpSkelSite, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | ca636aaa544d09daff4d58ff462aee0c41b227d857746bf99096a42120f97985
Secunia Security Advisory 33381
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - darkjoker has reported a vulnerability in Lito Lite CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 853eb7e48eb5299647f5e6b2d9721fee720aa3f972730f89f7598e7916d94330
Secunia Security Advisory 33305
Posted Jan 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in NPDS, which can be exploited by malicious people to disclose sensitive information or conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | d5e941871b04130dbe900ed713502b14b3b26d486b49b0979922a133d67caff2
Destiny Media Player 1.61 .lst File Buffer Overflow Exploit
Posted Jan 5, 2009
Authored by sCORPINo | Site snoop-security.com

Destiny Media Player version 1.61 .lst file local buffer overflow proof of concept exploit that spawns calc.exe.

tags | exploit, overflow, local, proof of concept
SHA-256 | ec33f13982661fa871e143c2e3f1273d816da75af4d4c4eecfa60e37333dfb6c
Ayemsis Emlak Pro Database Disclosure
Posted Jan 5, 2009
Authored by ByALBAYX | Site c4team.org

Ayemsis Emlak Pro suffers from a remote database disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 80e4cd0f7877ad67f6a613a037139dbf9ba322787cef2ae1aeac41a298f72f34
Ayemsis Emlak Pro SQL Injection
Posted Jan 5, 2009
Authored by ByALBAYX | Site c4team.org

Ayemsis Emlak Pro suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | a84998c6cb6d893d19bd8d8c257f717c4a14c0bc67846f7bea35ca334a9f31d9
Cybershade CMS 0.2b Remote File Inclusion Exploit
Posted Jan 5, 2009
Authored by JosS | Site spanish-hackers.com

Cybershade CMS version 0.2b remote file inclusion exploit that uses index.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 67c70686903f0bc41aa25d0b74c77d3c72a1b273b2666a7b085353cfd511302f
Joomla Simple Review Component SQL Injection
Posted Jan 5, 2009
Authored by EcHoLL | Site warezturk.org

The Joomla Simple Review component version 1.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e10692c22d7ad59ab1c8fb606cf9498c8b2d6ce0aceca96632af71d1a96b462a
RFIDIOt Python Library For RFID Devices
Posted Jan 5, 2009
Authored by Adam Laurie | Site rfidiot.org

RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).

Changes: Fixed ATS position and length in RFIDIOT.py. Multiple additions and a couple of other tweaks.
tags | tool, python, wireless
SHA-256 | d30b3c4f75ccb66153e2039a9b0663a4f1ce660dcab084fc5593c1cb3b1af871
Page 1 of 1
Back1Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    8 Files
  • 29
    Sep 29th
    14 Files
  • 30
    Sep 30th
    19 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close