exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2009-05-10

Secunia Security Advisory 34966
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.tro0oqy has discovered a vulnerability in TCPDB, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 8c35664b3a6d00ffaadcaaf5b143f4b1e7b2f442c6236a192783588227f92294
Secunia Security Advisory 35025
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libwmf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 94ceae80157b4d6e36809955e74ebf3d2259c41c3d7fd01e6e17468f3bf9b01f
Secunia Security Advisory 35016
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - DNX has reported some vulnerabilities in webSPELL, which can be exploited by malicious people to bypass certain security restrictions and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 7569f6acc941119193f4d2c99010b1403e081572f495cbf986a4372aee52d031
Secunia Security Advisory 35005
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Chinagames iGame 2009, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 156a095e71a1b257da79aec385e0eda35107ec1d82ec52c8338aaafb1f98103a
Secunia Security Advisory 35026
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libmodplug. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | ef505ac7421a478b1668ceb41846c7e4f721e09508bdea78396b8369988fc7c5
Secunia Security Advisory 35029
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - TiGeR-Dz has reported a vulnerability in Job Script Job Board Software, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | e1bb0578f612bba109d3ea284a513f1ccc81893f3a81ef340af093a337ad5e31
Secunia Security Advisory 35028
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mpfr. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 856be3470f28824cdc064c15e5ae4cfcb9965a4e4a6209e7c9df478a10e66d56
Secunia Security Advisory 35030
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ahmadbady has discovered a vulnerability in Simple Customer, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | d9ccada02d0f3486be8c4bc5a61a4a5ff4db7defd1f8b0176ca6583b587806e3
Secunia Security Advisory 35021
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Pango, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
SHA-256 | 141b0ceb3feca072ec85c46c34de44883a71894c1e9c92bedb0c974b6078071e
Secunia Security Advisory 34996
Posted May 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - TiGeR-Dz has reported a vulnerability in Techno Dreams Job Career Package, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 22e87a1eed2548e51f9852ecb54a3f84da4bb327c70a49393360ffe6072941b4
Advchk Advisory Checking Tool
Posted May 10, 2009
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

Changes: Windows environments can now be monitored via advchk-win32helper.bat. Seven new feeds have been added to advchk-addfeeds.sh (making 45 in total).
systems | unix
SHA-256 | e15c7a0da8ef8fdcdf7fcb6d5bb624de69b7827ad7ba5c98d47817cbf5a46cc1
Debian Linux Security Advisory 1797-1
Posted May 10, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1797-1 - Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2009-0652, CVE-2009-1302, CVE-2009-1303, CVE-2009-1304, CVE-2009-1305, CVE-2009-1306, CVE-2009-1307, CVE-2009-1308, CVE-2009-1309, CVE-2009-1311
SHA-256 | a304be926b1da77721827a7cc3ba161384c0847453345b1d59e8ad2a08a5554e
F-Prot CAB Bypass
Posted May 10, 2009
Authored by Thierry Zoller

The F-Prot parsing engine can be bypassed by a specially crafted and formatted CAB archive.

tags | advisory
SHA-256 | 77841a27d8754fba599c35e59f6a1993d8b7e9688fe7c6cbb6d1ba67295bcb2f
AVG Generic ZIP Bypass
Posted May 10, 2009
Authored by Thierry Zoller

The AVG parsing engine can be bypassed by a specially crafted and formatted ZIP archive.

tags | advisory
SHA-256 | 78ba2d958676f1093de1a3b7ea680a645c2d7465b65693c1fd0ed5118e9ef9fd
Google Cross Site Scripting
Posted May 10, 2009
Authored by Inferno from Secure Thoughts

Google's support script suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1d010b79e728d81bf2c0d6728e888de7cc31e005fec3c20aa0746faa9664cf9f
Team Shatter - Oracle SQL Injection
Posted May 10, 2009
Authored by Esteban Martinez Fayo | Site appsecinc.com

Team SHATTER Security Advisory - Oracle Database provides the "LT" PL/SQL package that is part of the Oracle Workspace Manager component (DBMS_WM public synonym). This package has a SQL Injection instance in ROLLBACKWORKSPACE procedure.

tags | advisory, sql injection
advisories | CVE-2009-0978
SHA-256 | e58d43cc719d94ffa023b3e9e25d0e5d73c84c6baf695f9d1e1172a8cbfa95dd
Drupal 5.17 Cross Site Scripting
Posted May 10, 2009
Authored by Justin C. Klein Keane

The Drupal version 5.17 Taxonomy module suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 370aabef5c4af9438df80c44664a3200682fb331ba7c56d05ad8272f76d117e6
Vpopmail / QmailAdmin Integer Overflows
Posted May 10, 2009
Authored by Jacobo Avariento Gimeno

Vpopmail and QmailAdmin are prone to several integer overflows related to quotas.

tags | advisory, overflow
SHA-256 | 3ae67e29f30c5c88ee23c1b3fb7614eee4d7c2f24fb9d30828dae15db1d02410
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close