exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 43 RSS Feed

Files Date: 2010-05-21

Mastering Trust In Security Assessments
Posted May 21, 2010
Site isecom.org

Presentation called Mastering Trust in Security Assessments.

tags | paper
SHA-256 | ac3fbf76141eb06a2daef00b4cfcbdb64a64a356e4fbb9559ef8f39b5f683ae5
NPDS REvolution 10.02 Cross Site Request Forgery
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

NPDS REvolution version 10.02 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 7e1d60a4fe9c51e1054335c5792007fbc3d4ec22dc722edc96e389cf7a22d9df
LiSK CMS 4.4 list_content.php Cross Site Scripting
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

LiSK CMS version 4.4 suffers from a cross site scripting vulnerability in list_content.php.

tags | exploit, php, xss
SHA-256 | afaa4830b8992f10f98768035bc8fd36c5d8d2ab51a17573dd61a1817c0603b4
LiSK CMS 4.4 edit_email.php Cross Site Scripting
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

LiSK CMS version 4.4 suffers from a cross site scripting vulnerability in edit_email.php.

tags | exploit, php, xss
SHA-256 | 06e785b7d55cfbbf90211db0f9c913ebbcf46437b0a6e4896d0761ec65239e93
LiSK CMS 4.4 cp_messages.php SQL Injection
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

LiSK CMS version 4.4 suffers from a remote SQL injection vulnerability in cp_messages.php.

tags | exploit, remote, php, sql injection
SHA-256 | 95334fe6ae6f88c5d8abbdf81c34c8ad16237450739a8e9dcead05e85f622ace
LiSK CMS 4.4 edit_email.php SQL Injection
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

LiSK CMS version 4.4 suffers from a remote SQL injection vulnerability in edit_email.php.

tags | exploit, remote, php, sql injection
SHA-256 | bef058b4b4597cd82ee0a8a22171679d35c35682e9d6417e164def33c842f1e2
gpEasy CMS 1.6.2 Cross Site Scripting
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

gpEasy CMS version 1.6.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 69deed0215b6b97ab6d69c3b6f505ffbcac647738a722528c40e29616dabd118
ocPortal 4.3.2 Cross Site Request Forgery
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

ocPortal version 4.3.2 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 4fa71979e23135bb64b20a1994998792bcf476f88fe344baebfc0ffa6681d6ab
Flash Tag Cloud Control Cross Site Scripting
Posted May 21, 2010
Authored by MustLive

Flash Tag Cloud for Blogsa and other ASP.NET engines suffers from cross site scripting and html injection vulnerabilities.

tags | exploit, vulnerability, xss, asp
SHA-256 | b2d0ff0da1d8dcb4d4af860905723bdfc28504ace1f75938c0141fe1e3da26bb
Secunia Security Advisory 39873
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Percha Multicategory Article component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 23441d3c696c35bd3fd74cf815286fb6b0520bdc2caa1934f79ce476aa932623
Secunia Security Advisory 39887
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for moin. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | cda8d6b02f4fdc673b362d895458fd67785962709b36155e0c8a292f2a90606e
Secunia Security Advisory 39869
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - fl0 fl0w has discovered a vulnerability in TeamViewer, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 286801583182ccb9c60ba49292f04871689672ebd928bd0b43b3edeb161bd6fe
Secunia Security Advisory 39891
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in 3Com Intelligent Management Center (IMC), which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or disclose sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | 38f1cafdf1bb8977be1b3eb6e028cf11a69538fb89d65ca1df84c21cd7a656bd
Secunia Security Advisory 39843
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sow Ching Shiong has discovered a vulnerability in FileCOPA, which can be exploited by malicious users to disclose potentially sensitive information or manipulate certain data.

tags | advisory
SHA-256 | e9c0602b8d1f29d16d068234bdf8cf8357146c840d6cfad45f188d01f03e0843
Secunia Security Advisory 39866
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sow Ching Shiong has discovered a vulnerability in SnugServer, which can be exploited by malicious users to disclose potentially sensitive information or manipulate certain data.

tags | advisory
SHA-256 | 2c2aac8adbf0552609d6d2e48d350bfad7fdb4e99af989ac5cd175d444209948
Secunia Security Advisory 39897
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi TP1/Message Control, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 549c777b4eab901d98fa2ef06e101c7c03bdd3226944aa1dbaaddafe209696f5
Secunia Security Advisory 39912
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported some vulnerabilities in Lisk CMS, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | b54e2677e52b55509c80c28971c979333728c26fa21858fa55ee5a252435b93c
Secunia Security Advisory 39895
Posted May 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 51952b857d5963ba96e4002141bef51c3febe792bdea1b29295ab3aa12d467b4
Linux IPTables Firewall 1.4.8
Posted May 21, 2010
Site iptables.org

iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.

Changes: Support for new features in the 2.6.34 kernel, documentation updates, and bugfixes.
tags | tool, firewall
systems | linux
SHA-256 | b8ab75b9fc6b3748071ffd771b640cab2afbda2bf54e35c085008a1efef4dcb4
Snipe Gallery 3.1.5 Local File Inclusion / SQL Injection
Posted May 21, 2010
Authored by eidelweiss

Snipe Gallery version 3.1.5 suffers from remote SQL injection and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 23e9c9e5fce80e64c30c7cde3540398ee2180151fd050c3176a39fa75db9ffab
Mandriva Linux Security Advisory 2010-103
Posted May 21, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-103 - Multiple vulnerabilities were discovered and corrected in postgresql. Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. This update provides a solution to these vulnerabilities.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2010-0442, CVE-2010-1169, CVE-2010-1170, CVE-2010-1975
SHA-256 | dae56ddac2b338c1704ebf1658f6ad703dfa0a1e741f2de8039c4ee98eedbcbd
Interactive Forum Script Remote File Inclusion
Posted May 21, 2010
Authored by Ma3sTr0-Dz

Interactive Forum Script suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 49eec42bbd8a65ff0f0178fbf69a23ab370755a4878fe6be7449b200d25809eb
Mandriva Linux Security Advisory 2010-082
Posted May 21, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-082 - ClamAV before 0.96 does not properly handle the (1) CAB and (2) 7z file formats, which allows remote attackers to bypass virus detection via a crafted archive that is compatible with standard archive utilities. The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka.Q) compression format. NOTE: some of these details are obtained from third party information. This update provides clamav 0.96, which is not vulnerable to these issues. Packages for 2009.0 are provided due to the Extended Maintenance Program.

tags | advisory, remote, denial of service, virus
systems | linux, mandriva
advisories | CVE-2010-0098, CVE-2010-1311
SHA-256 | 01916f1257f5750f983fb3c22bd70d378c39701cb1ea591bfd03313e40e54003
USR5463 802.11g Wireless Router Cross Site Scripting
Posted May 21, 2010
Authored by SH4V

The USR5463 802.11g wireless router suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a96243ac6d9222260d18b62398b6c9130b47c7173b66bd072f4ed1152abf34f7
Open-AudIT SQL Injection / Cross Site Scripting / Local File Inclusion
Posted May 21, 2010
Authored by Sebastien Duquette

Open-AudIT suffers from lack of authentication, cross site scripting, local file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | ada5689bf8a196f63f76812397276af55dd7c49e5e7a79928d91220f8d891627
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close