exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 43 RSS Feed

Files Date: 2010-09-28

Secunia Security Advisory 41641
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libmspack and cabextract. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 0b36b7e70e30e623d530fa4d5cdabfc0cc3d8a09c75ccce1f7483f5316ea6679
Secunia Security Advisory 41614
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in SLURM, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 10de0e7614b32c96502927130a20561b2c7e47c06929af126bf5adc5d97e24e5
Secunia Security Advisory 41643
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Digital Music Pad, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a17037bed69babf2be6b0aabe1b29f1bcf72a0e2af35fab29fecbd357cd823fc
Secunia Security Advisory 41568
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Nero, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 3ab6e83db2dfd9102b7dcfc8864226bde6b3cf70b030853cf149579a78081a27
Secunia Security Advisory 41612
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Nero, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 30ed506924f64c0360bba00978bcb0337c05992e413bbdf5b990be8883142cb0
Secunia Security Advisory 41613
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Abhishek Lyall has discovered a vulnerability in Digital Music Pad, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4fd2af44a1289cdb9e529b491f297becebbb8dfe35a0752b61cba7dac926b925
Secunia Security Advisory 41553
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alejandro Ramos has reported some vulnerabilities in Open Text ECM, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | e3f10824e31607bb96e27d4eb1057ca316eee299217f6555de7dd4b24e903e02
Secunia Security Advisory 41608
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in PBBoard, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system, and by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 983a5fb163b4f995cf10849d226163e611b327238044e0d7177a34cb156f8901
Secunia Security Advisory 41617
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pablo G. Milano has discovered some vulnerabilities in Achievo, which can be exploited by malicious users to bypass certain security restrictions and malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | 7cad9ec5d22ded09c191c305f885d291fcc3c75c28cb6fad8d7b3b91c8138704
Secunia Security Advisory 41487
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Synology DiskStation Manager, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 21b2d4ee7647daaa7ffcab8091db5907a73f5fd8ed599d31be04d37007271f99
Secunia Security Advisory 41610
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in iWorkstation, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ea86201f4f140937c4da22597b16d5427a362a5624f7889e31209ea5361c6cbf
Secunia Security Advisory 41634
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in iBrowser, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 990cc5608ac9eb62dfd0318fcc6f6c94e76fc6342a411b05a6ef91cfacdfc08f
Secunia Security Advisory 41623
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mikmod. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | af9769150268514d53de954cabcfe2bbce0fa7eab9c717c7cae4d58351831bda
UA-Tester (User-Agent Tester) 1.03
Posted Sep 28, 2010
Authored by Chris John Riley | Site blog.c22.cc

UA-Tester (User-Agent Tester) is a Python script that enables penetration testers to compare response headers from a remote server based on a list of User-Agent strings. The script allows testers to isolate differences in response depending on the browser used to access a site. This can be important as a growing number of sites are catering for mobile devices by forwarding them to alternative (browser friendly) pages, or redirecting them to alternative servers entirely.

tags | tool, remote, scanner, python
systems | unix
SHA-256 | 254676c67c7b522e642828ca8d076b317ca9957f162215e6ad765c0984d8c67c
e107 0.7.23 SQL Injection
Posted Sep 28, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

e107 version 0.7.23 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 828584f023f7a32cf3f7faae0c121d08bd38fc282cef540e2b99bfc7931cf160
Digital Music Pad 8.2.3.3.4 SEH Overflow
Posted Sep 28, 2010
Authored by Abhishek Lyall | Site metasploit.com

This Metasploit module exploits a buffer overflow in Digital Music Pad version 8.2.3.3.4. When opening a malicious pls file with the Digital Music Pad, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
SHA-256 | c83e3567292eff21aaad95afae42e3f474e2698dbe7d9a97597f09520029f64d
iWorkstation 9.3.2.1.4 SEH Overwrite
Posted Sep 28, 2010
Authored by Sanjeev Gupta

iWorkstation version 9.3.2.1.4 SEH overwrite exploit that creates a malicious .pls file.

tags | exploit
SHA-256 | 79e8b2364e81cf685b98735b3c18b202f945db70473830463f19ac0d2266464e
Entrans 0.3.2 Cross Site Scripting / SQL Injection
Posted Sep 28, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Entrans version 0.3.2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 9325d9436734ba7ef95dc7053c9ee045619e9c7633f767d7d26519089b50cabc
How To Protect Against DDoS Attacks
Posted Sep 28, 2010
Authored by Keksa | Site keksa.de

This is a whitepaper describing techniques and defenses to mitigate against distributed denial of service attacks. Written in German.

tags | paper, denial of service
SHA-256 | 628cf7ac41714d7de968568da3a07601a4d05dbbadbe6afe7d1a3d44c50da97c
Horde IMP 4.3.7 Cross Site Scripting
Posted Sep 28, 2010
Authored by Moritz Naumann

Horde IMP versions 4.3.7 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9ff41ba9177770ccbc820350c56510861d2b3872483ac859fa61a08f09314f64
Debian Linux Security Advisory 2114-1
Posted Sep 28, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2114-1 - The Debian stable point release 5.0.6 included updated packages of the Git revision control system in order to fix a security issue. Unfortunately, the update introduced a regression which could make it impossible to clone or create git repositories. This upgrade fixes this regression, which is tracked as Debian bug #595728.

tags | advisory
systems | linux, debian
advisories | CVE-2010-2542
SHA-256 | d5a562c5b0446b7ebdb0c4377c6a37f6a81cb3a7335ed9b473a406bf9aad3c2f
Car Portal 2.0 Blind SQL Injection
Posted Sep 28, 2010
Authored by RoAd_KiLlEr

Car Portal version 2.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 45c3f8330f8815ceae9c016d29eb35a24c3b2f039cb3b8170c5c447be09de562
Download Accelerator Plus DLL Hijacking
Posted Sep 28, 2010
Authored by anT!-Tr0J4n

Download Accelerator Plus DLL hijacking exploit.

tags | exploit
SHA-256 | 5dab7f07bd32161aaf2a87bb46760fda3fedc77c70377ed90ab002ed2fe947e6
Barracuda Networks Spam And Virus Firewall Configuration Retrieval
Posted Sep 28, 2010
Authored by ShadowHatesYou

Barracuda Networks Spam and Virus Firewall versions 4.1.1.021 and below remote configuration retrieval exploit.

tags | exploit, remote, virus
SHA-256 | 165ba97992e737fdb6fac9ce7c4bbf11e171a5ef6e1c4b1cdecc39389d32668d
Allpc 2.5 osCommerce Cross Site Scripting / SQL Injection
Posted Sep 28, 2010
Authored by RoAd_KiLlEr

Allpc version 2.5 osCommerce suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | be1cfff787ccfb93678910bb184d5d331a80a512fa0ace5d6ab52ab5103b6ab5
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close