Exploit the possiblities
Showing 1 - 25 of 987 RSS Feed

Files Date: 2011-08-01 to 2011-08-31

Debian Security Advisory 2298-1
Posted Aug 30, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2298-1 - Two issues have been found in the Apache HTTPD web server.

tags | advisory, web
systems | linux, debian
advisories | CVE-2010-1452, CVE-2011-3192
MD5 | 3220e84d3e0e501fdc6a31fa69d52bd0
Webyuss SQL Injection
Posted Aug 30, 2011
Authored by Ehsan_Hp200

Sites Powered By webyuss suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6db19ba139436051c4964b66ddd59958
bizConsulting SQL Injection
Posted Aug 30, 2011
Authored by Ehsan_Hp200

Sites Powered By bizConsulting suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | f395baf862fb89734bca387515ba5f49
WordPress Advertizer 1.0 SQL Injection
Posted Aug 30, 2011
Authored by Miroslav Stampar

WordPress Advertizer plugin versions 1.0 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a166bd654ac2cd37510ad3a0427854fe
DVD X Player 5.5.0 Pro / Standard Buffer Overflow
Posted Aug 30, 2011
Authored by sickness

DVD X Player version 5.5.0 Pro / Standard buffer overflow universal exploit with DEP and ASLR bypass.

tags | exploit, overflow
MD5 | 012c7f717d92e217110e8ee5b698992f
vAuthenticate 3.0.1 SQL Injection
Posted Aug 30, 2011
Authored by bd0rk

vAuthenticate version 3.0.1 suffers from an authentication bypass vulnerability when using SQL injection inside of a cookie.

tags | exploit, sql injection, bypass
MD5 | e98b4e600fcc6bb19e7b2bc44991f748
WordPress Event Registration 5.4.3 SQL Injection
Posted Aug 30, 2011
Authored by Miroslav Stampar

WordPress Event Registration plugin versions 5.4.3 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 9a6941e375a92e7dc375bb5a490c76c4
Anti-Debugging With Exceptions
Posted Aug 30, 2011
Authored by AutoSec Tools | Site autosectools.com

Whitepaper call Anti-Debugging with Exceptions. Several techniques for detecting exception swallowing debuggers have been documented. The concept is simple: by design, debuggers handle certain kinds of exceptions. If such an exception is wrapped in a try block, the exception handle is only executed if a debugger is not attached. Hence it can be inferred that a debugger is attached whenever the exception block is not executed.

tags | paper
MD5 | 6df664f50473c74a1b7c3dafb9eccf59
FileBox File Hosting And Sharing Script 1.5 SQL Injection
Posted Aug 30, 2011
Authored by SubhashDasyam

FileBox File Hosting and Sharing script version 1.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e68a881db4ff6e141d8c252a38fb90d4
Secunia Security Advisory 45749
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Application Server, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
MD5 | ad28b6e58bb74fccc947dc0139c6f494
Secunia Security Advisory 45831
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | d9921c3957e63c3952aac519cdda0196
Secunia Security Advisory 45802
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox, MozillaThunderbird, and seamonkey. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | 24c55c4bdda47f025d65dddb48d3881e
Secunia Security Advisory 45825
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaThunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | 8b0534eb4db3dcdc031bf6cf6bf15174
Secunia Security Advisory 45794
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for java-1_4_2-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, suse
MD5 | 89e7e699443db51eda64f1e382934b7f
Secunia Security Advisory 45785
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a user's system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | bf18f2330b4703d7301336729ebe3980
Secunia Security Advisory 45759
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Miroslav Stampar has discovered a vulnerability in the SH Slideshow plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | d8e36a7e9c3d1ba6b37dabc4afc59281
Secunia Security Advisory 45804
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in the Almond Classifieds component for Joomla!, which can be exploited by malicious, local users to manipulate certain data and potentially gain escalated privileges.

tags | advisory, local
MD5 | de106e36ec809f0d59cc6f2680ff67ba
Secunia Security Advisory 45626
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in babelweb, which can be exploited by malicious, local users to potentially perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 46e48e20f871c0b709485f7d86d0684e
Secunia Security Advisory 45696
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for apache2. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | dc7540656f6b6250e64e09312e9e9b79
Secunia Security Advisory 45754
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for SUSE Studio Onsite, which can be exploited by malicious people to conduct script insertion attacks and compromise a vulnerable system.

tags | advisory
systems | linux, suse
MD5 | e6f0e9502c97dc086cf93ce571157fe0
Secunia Security Advisory 45806
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba. This fixes a weakness and multiple security issues and vulnerabilities, which can be exploited by malicious local users to cause a DoS (Denial of Service), disclose potentially sensitive information and potentially gain escalated privileges and by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, denial of service, local, vulnerability, xss
systems | linux, redhat
MD5 | 9890eaf58480ee625aa2343a00eb04a5
Secunia Security Advisory 45798
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba3x. This fixes multiple security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, denial of service, local, vulnerability, xss
systems | linux, redhat
MD5 | 6396f04a0e4190d10b196d1f608b8713
Secunia Security Advisory 45735
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jose Carlos de Arriba has reported a vulnerability in JAMF Casper Suite, JAMF Recon Suite, and JAMF Imaging Suite, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | e9a85292eb2477b260d7980c813bbe92
Mobius Forensic Toolkit 0.5.9
Posted Aug 30, 2011
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: The new extension Datasource Dossier handles Logicube Dossier imagefiles. The Hive Report features 3 new reports: LSA secrets, Protected storage, and Cached Credentials, and both user password report and email accounts report show the passwords when available. The Part Catalogue has been improved. Several other improvements were made.
tags | tool, python, forensics
systems | unix
MD5 | c04c404be974d7afa76459c6abfd2ff2
Malheur Malware Analyzer 0.5.2
Posted Aug 30, 2011
Authored by Konrad Rieck | Site mlsec.org

Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.

Changes: Another major bug due to libconfig changes has been fixed.
tags | tool, forensics
systems | unix
MD5 | 5f18467577c2390745aba99335a3b344
Page 1 of 40
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close