exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2011-07-15

Net Quality Web Design SQL Injection
Posted Jul 15, 2011
Authored by Anas

Net Quality Web Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 299b3652dc3af98070032a31801541c9e0bc0fa004e28cd9c9f6d91216fc9a44
Honeycomb Creative SQL Injection
Posted Jul 15, 2011
Authored by Sideswipe

Honeycomb Creative suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d6d59d43622515f5f400ca0668a0e82245dc0c6e739d54f86bc75240d87afd3c
Joomla Newssearch SQL Injection
Posted Jul 15, 2011
Authored by Robert Cooper

The Joomla Newssearch component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e08a245d1afb0fb4e8e8b9fe2827811c26656f4f723b2a8af2930afc4eaa2a23
Protecao Client-Side: Eficacia Experimentacao de Instrumentos
Posted Jul 15, 2011
Authored by Alexandro Silva | Site alexos.org

Whitepaper called Protecao Client-side: Testando a eficacia das ferramentas de protecao Microsoft para estacoes de trabalho e desktops. It describes how to protect against malicious threats by testing some Microsoft client security tools. Written in Portuguese.

tags | paper
SHA-256 | e41f88d3cee57b501ac1371b72178ecae8c0b77e0613ee03997081844e81b28c
Red Hat Security Advisory 2011-0927-01
Posted Jul 15, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0927-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. An integer overflow flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to cause a denial of service or escalate their privileges. A race condition in the way new InfiniBand connections were set up could allow a remote user to cause a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2010-4649, CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182, CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745, CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492
SHA-256 | 2d9ca2674edbb8a07bf22fdae27723bb5205d320cbb129bbd7e4361fe73cdc7b
Red Hat Security Advisory 2011-0938-01
Posted Jul 15, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0938-01 - Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 and 6 Supplementary.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873
SHA-256 | 08255315bc5b088b0644c8873d8c34e63a243325af623d57ed713fa5a0970c06
Secunia Security Advisory 45229
Posted Jul 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | cbc73235ce175d86388511e8b2a4f8773751374029a3c81cc2cdf908d4a5d020
Secunia Security Advisory 45258
Posted Jul 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for krb5-appl. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | c72180e773501af55aaa457d1860f6048645138b91478268eb675a6c43e163f3
Secunia Security Advisory 45253
Posted Jul 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and to potentially gain escalated privileges, by malicious, local users in a guest virtual machine to cause a DoS, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | 819b206e43052a953259fad7a9c42c63cc08c5caf0010b9862ab951de1987bef
Inscribe Webmedia SQL Injection
Posted Jul 15, 2011
Authored by Netrondoank

Inscribe Webmedia suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6d585e8517b13f74314f0b61866b1cb73c428ceff8ddab4c703151fe299b1b60
Joomla Controller SQL Injection
Posted Jul 15, 2011
Authored by SOLVER

The Joomla Controller component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e888d01396ceb94d941bcd2f921047012849a712495d7b4cd987468ed2ac00e2
Joomla Foto SQL Injection
Posted Jul 15, 2011
Authored by SOLVER

The Joomla Foto component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ffd41e5ccdbd099217c0cd9399df69de8c48c5aeca3bb7f6805989abd42b2717
Joomla Hospital SQL Injection
Posted Jul 15, 2011
Authored by SOLVER

The Joomla Hospital component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dbddb562514d2965cf63d645c573cb5943c0d16969fb614a26dd9b77b362f0f7
JaydeOnline Search Engine Cross Site Scripting
Posted Jul 15, 2011
Authored by SOLVER

JaydeOnline Search Engine suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9f72a8403dcf5219473cb3d710b46a0fb4692279bacbb92958c5ec778990675b
Joomla Juicy SQL Injection
Posted Jul 15, 2011
Authored by SOLVER

The Joomla Juicy component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a324ddb9a4ef119d53f28393e246cd9c8f487bf62a283e7490de45b50f2a8cb5
Joomla Resman Cross Site Scripting
Posted Jul 15, 2011
Authored by SOLVER

The Joomla Resman component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 305893a96e49253f2c4f4f7a9dd87a2388ebe746cb29d5fc1dcdd5f9c8ff1436
Easy Estate Rental SQL Injection
Posted Jul 15, 2011
Authored by Lazmania61

Easy Estate Rental suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 644bfbd69dcaa6fea93662ef31a655341829c865741dd42a7dd7e3df5f6abacb
Auto Web Toolbox SQL Injection
Posted Jul 15, 2011
Authored by Lazmania61

Auto Web Toolbox suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 9f73592a1a24c3cc5f99c9c329541f4a055f622e0f6d9bb186322d0075147dff
Page 1 of 1
Back1Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close