exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 62 RSS Feed

Files Date: 2010-11-02

Secunia Security Advisory 42092
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Advantage Data Architect, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | b4a7c0fd09d7daa6e67c4544650672c69d9c03484846272b0b4d77bdace2e717
Secunia Security Advisory 42077
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for thunderbird and sunbird. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, and by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability
systems | linux, fedora
SHA-256 | a9be00ffe47e9036671e1acf8b77287c55dedd9d592c7e984bbee32d6bc14e27
Secunia Security Advisory 42045
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for nss. This fixes two vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
systems | linux, debian
SHA-256 | 01f94bb7df86d912bb5ac2493a57f00e59d82ecd51084c0d5669f61f938ad092
Secunia Security Advisory 42059
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Intel Xeon 5500 and 5600 Series BMC Firmware, which can be exploited by malicious users to gain escalated privileges.

tags | advisory
SHA-256 | 01e20d92ef50436b1c0eef5c25bdb74ed3a2e0277f94650daf9927dd6874e094
Debian Linux Security Advisory 2124-1
Posted Nov 2, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2124-1 - Several vulnerabilities have been discovered in Xulrunner, the component that provides the core functionality of Iceweasel, Debian's variant of Mozilla's browser technology.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-3765, CVE-2010-3174, CVE-2010-3176, CVE-2010-3177, CVE-2010-3178, CVE-2010-3179, CVE-2010-3180, CVE-2010-3183
SHA-256 | 63d61427844f29c8b6e7dc2bb27976f5d4dd7c9f8fd7a49ed4c6645fc811806c
Mandriva Linux Security Advisory 2010-219
Posted Nov 2, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-219 - Unspecified vulnerability in Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, when JavaScript is enabled, allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in October 2010 by the Belmoo malware.

tags | advisory, remote, arbitrary, javascript
systems | linux, mandriva
advisories | CVE-2010-3765
SHA-256 | 9b70dec8d866610bd7ce7df037c81c52319f063903cb26ecf3ca4fd6e63ffa76
The International Conference on Cyber Conflict 2011 Call For Papers
Posted Nov 2, 2010
Site ccdcoe.org

The Call For Papers for the International Conference on Cyber Conflict has been announced. It will take place June 7th through the 10th, 2011 in Tallinn, Estonia.

tags | paper, conference
SHA-256 | ef5781aebbfe360f1f9dbfa51b9604382ffe4c98760fe411f63f106be21ec49f
YSTS 5th Edition Call For Papers
Posted Nov 2, 2010
Site ysts.org

The 5th edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 16th, 2011.

tags | paper, conference
SHA-256 | 4d64620ede19521174781f25f42ab936918733fb0f942e60ef758545df968376
BroadWorks Arbitrary Call Detail Record Eavesdropping
Posted Nov 2, 2010
Authored by Nick Freeman | Site security-assessment.com

BroadWorks suffers from an arbitrary call detail record eavesdropping vulnerability. Versions R16 and below are affected.

tags | exploit, arbitrary
SHA-256 | f587e153f0630c9df6b06ef804794f88c6cb8f35b7c444fc320f6d63f1e519c3
Douran Portal 3.9.7.55 Cross Site Scripting / Shell Upload
Posted Nov 2, 2010
Authored by ItSecTeam

Douran Portal versions 3.9.7.55 and below suffer from information disclosure, cross site scripting and shell upload vulnerabilities. The vendor has notified Packet Storm that everything has been fixed as of version 3.9.8.0 in June, 2011.

tags | exploit, shell, vulnerability, xss, info disclosure
SHA-256 | 90d3218d6c7e198e85c53ccc414184159561f5cc9458e34945e363e5cb51b9b7
Paypal.com Cross Site Scripting
Posted Nov 2, 2010
Authored by sqlhacker

Paypal.com suffers from header injection and cross site scripting vulnerabilities. The cross site scripting works against Chrome and Safari but not Internet Explorer 8.

tags | exploit, vulnerability, xss
SHA-256 | 34df326662e37124a69232c034611719bc24fe687fe186213c04c2af98781253
ITSecTeam Shell 2.1
Posted Nov 2, 2010
Authored by ItSecTeam

This is a backdoor PHP shell from ITSecTeam. It can execute system commands, bypass various controls, connects to common databases and edits files and directories.

Changes: Various clean-up. Added server information, system drive listing and more.
tags | tool, shell, php, rootkit
systems | unix
SHA-256 | ae3a70be5946b093e55e474cf25408d6390702e587d8d5b24404f442be5ddbd5
Front Accounting 2.3RC2 SQL Injection
Posted Nov 2, 2010
Authored by Juan Manuel Garcia | Site cybsec.com

CYBSEC Security Advisory - Front Accounting version 2.3RC2 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 81d88966250c41cecf79b33cbd6fc40a46a5940bab00e06766d6bcab25fce20d
Debian Linux Security Advisory 2123-1
Posted Nov 2, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2123-1 - Several vulnerabilities have been discovered in Mozilla's Network Security Services (NSS) library.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-3170, CVE-2010-3173
SHA-256 | 1159efd66bdc07507b0193831b687d83442325603c2069e54b17584e72db4175
Home File Share Server 0.7.2.32 Directory Traversal
Posted Nov 2, 2010
Authored by AutoSec Tools

Home File Share Server version 0.7.2.32 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 27be96680c7e13d030a5fae4d6be617be074de118c54ab2cc5fc7ab7df18ec9e
CMS WebManager-Pro Cross Site Scripting / SQL Injection
Posted Nov 2, 2010
Authored by MustLive

CMS WebManager-Pro suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 00c231c6e8eeaede03c73c2f90e8e88879d64cf3e284160fdd2fc4ce84d3efa2
Secunia Security Advisory 42089
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in MemHT Portal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 826ed94b3e1ff8d9e719fc509fbea2e10485659ba6d8eee5cc9afcf37580d0d3
Secunia Security Advisory 42062
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in WSN Links, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 108b94841ba2b7d4658f81dfe48399edc283afcc7cbe7f6084dc22071df6c3f3
Secunia Security Advisory 42026
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 2571d7676be8ce1bb4b787eaa6b56a264ff50cca7a8c230f1920fdd413841d3e
Secunia Security Advisory 42050
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Kandidat CMS, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
SHA-256 | a95d63cadf795975c1e6279b0555dae91db281f82d3216da5e6828b98caae5e1
Secunia Security Advisory 42046
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AVG Internet Security, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 68d4b78d168ee670968700795fda3612ddf7dc812271afd5aa9fcf27464e5d3d
Secunia Security Advisory 42057
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MemHT Portal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1514b78f15c1cd50446a856378f898056cfd46db84bfa8a4aae05c1b928372c8
Secunia Security Advisory 42067
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Monkeysphere, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | d36f725399e018a734d7dd530196fb3b0fd39fa573ed6c2e23869c8a2c9c324f
Secunia Security Advisory 42065
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and a weakness have been reported in Douran Portal, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 84e1ae4913eddd8c214989e0db55a8ec6e181c17e4f01b74ad71d7fb2786cb68
Secunia Security Advisory 42090
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - icetek has discovered some vulnerabilities in XWiki Watch, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
SHA-256 | 3630a4df9ed74f8303a333b7ff32b63fd60fb7416a12ec9bbf3faee21d056edd
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close