exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 28 RSS Feed

Files Date: 2012-02-09

Shell Code Injection To Process
Posted Feb 9, 2012
Authored by Turkeshan

Whitepaper called Shell Code Injection To Process. Written in Turkish.

tags | paper, shell
SHA-256 | fba9caeb2eb8c95ed9608a1aff5cf93b1e8a07d62825f455dea832f94471570d
Secunia Security Advisory 47894
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | f92dad8f6a94b39d9b375572256db8ae61749dcd3c26106224bb8fb97c6955d4
Secunia Security Advisory 47940
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for xulrunnner. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 58ca5c1282426913309fba3ce850802e4eadf66b998ae7ce665f402ea8c1f060
Secunia Security Advisory 47939
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for thunderbird. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | e3ea102a09643ddb20d30fd7f38cc38f4339020ff1c19bcb74410deeebf25275
Secunia Security Advisory 47938
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 7178cb81ba6a5dfa587a1cb4975579f602cecc5eb429fbadb0346fb2c5bfe89c
Secunia Security Advisory 47933
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Wonderware HMI Reports, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 40dda32e635a98dc18b25c89c6d5e8b613dd3fdd48db2cc2ac9dee1017da7176
Secunia Security Advisory 47883
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in CA Total Defense, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | e8f38e7ecb3b4f8385bb95c39e40cca844621225400f6f4089e1f4cd18eef20c
Secunia Security Advisory 47921
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Zero Science Lab has reported a vulnerability in SciTools Understand, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5587107ef238a7cdc734028c14f123e4f97c8b66b4f53cc05a9155bb8d9cd304
Secunia Security Advisory 47862
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apache APR, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 40c76d70af7175ee32c1e40a48e000391c05794e4bb3dcb8feb4f5fd4b17d7bb
Secunia Security Advisory 47867
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 431813bf9ac13089654ca80d3a4da4fce3a6f9ebbf1c6cecb7dc36b1ef60fef3
Secunia Security Advisory 47875
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in zenphoto, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 98bd27e56a83072d0577e0865af49eda8879b252705139b6d489ac978a64074a
Secunia Security Advisory 47838
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a security issue in 360 MobileSafe for Android, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | b2b970b72a6842ccee89646fbdc80711b30b99e0e8257035df02147163839ffc
Secunia Security Advisory 47766
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability Lab has reported multiple vulnerabilities in freelancerKit, which can be exploited by malicious users to conduct script insertion and SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 88fc359de3e76fb7cb7e736ff4e1c5e047b1565567b9118836dee7ade6178aa8
Secunia Security Advisory 47869
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cvs. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 5b8ba745cce0b79db905d7a35ea16c28e55bd346bfb6ab1e2cc1eafde572c2ce
Secunia Security Advisory 47931
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Revisioning module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | d7d83d357d4cbc4bdddbbf27e43f339b10ea9c1ed91dfb98fccc473e552b9f00
Secunia Security Advisory 47930
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for squirrelmail. This fixes some weaknesses and multiple vulnerabilities, which can be exploited by malicious users to disclose certain system information and conduct script insertion attacks and by malicious people to conduct script insertion and cross-site scripting attacks, bypass certain security restrictions, or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
systems | linux, redhat
SHA-256 | 356f1fff2f2967acb74e37944065875839ce924d2c2c7a9c1dc5bb9b55bd607c
Secunia Security Advisory 47880
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for icedove. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | c6c62da05a5669dacc700d65f595dbc9bb835835ebec95699455ab83c2d28cd0
Secunia Security Advisory 47944
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in HP System Management Homepage, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.

tags | advisory
SHA-256 | 6f4ffe7867b64e669dc003d756b79991de68d820877f7a8486123f21de2a7e13
Secunia Security Advisory 47928
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain knowledge of sensitive information and manipulate certain data, by malicious users to gain knowledge of sensitive information, manipulate certain data, or cause a DoS (Denial of Service), or by malicious people to cause a DoS.

tags | advisory, denial of service, local, vulnerability
systems | linux, redhat
SHA-256 | 5830e5a1788efda3c6eeda997fe123afab156259b2ae097d524e68e433c359c1
Secunia Security Advisory 47477
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in PhotoLine, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3fb7810d51a392cbf35f8fa5b1e91ffabef8854ea6430ac19bd0a3da6a2747c7
Secunia Security Advisory 47829
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a security issue in MobileQQ for Android, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | a23dbceddce1521116843a1a3eafc48923e7fdcd0af12820d855ebdbced94209
Secunia Security Advisory 47836
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a security issue in QQPhoto for Android, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 3196101012218c3c370ee606e6a953f1805264037cb1904ee71291e0b55fedc3
Secunia Security Advisory 44063
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AbdulAziz Hariri has discovered a vulnerability in Avaya Interaction Center, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b0a52cefdc9acfa7c7debdb3ae66b1c0039165d38cd8cf9f230f356ceb57eb5f
Secunia Security Advisory 47886
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
systems | solaris
SHA-256 | 267848835e46747930a17703483e8a5a5b78ec854b29ba78f39b523693bf9315
Secunia Security Advisory 47884
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ISC BIND, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | ae0badcb7d6fa828e53d764c60193637fe0b324df7897bd087a50c153a21d5a0
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close