what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 39 of 39 RSS Feed

Files Date: 2008-11-26 to 2008-11-27

Secunia Security Advisory 32881
Posted Nov 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in K-Lite Codec Pack, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 018808d5c7343bcbccc05b88aa457b14c017a9ddaf36fdbed7a26cba38435992
Secunia Security Advisory 32878
Posted Nov 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mozilla-thunderbird and thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 4e312a408090637fb1c8217a232a8380b61c314497da0475d1004d6adfcaaffa
Secunia Security Advisory 32879
Posted Nov 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for gnutls12, gnutls13, and gnutls26. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | a1f3f25e04c873dfe3f59594fa23e3c5454b48d97e691d18c78fe7f82e9f54d2
Secunia Security Advisory 32797
Posted Nov 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - XaDoS has reported a vulnerability in Jamit Job Board, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | ab04de37fe16127b20f1446575026c35bd155a77865825e56194b791448c74f9
Secunia Security Advisory 32866
Posted Nov 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ZoRLu has discovered a vulnerability in Clean CMS, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
SHA-256 | 144782469916abe9fbfd648fd588381bc327ac7295c9aea91e123e9b28c9bdfc
Secunia Security Advisory 27805
Posted Nov 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Groupware Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 7e5e2038e9c1a21e23b468d2e2c09f7f12d6df4d5d9e0714d9b85f0dac419f39
Secunia Security Advisory 32853
Posted Nov 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | e6b8d7d52bb5a612604c036c4daef144fb575693a04217747ea995f2518cbff4
frhack2009-cfp.txt
Posted Nov 26, 2008
Site frhack.org

FRHACK 01 Call For Papers - FRHACK is the First International IT Security Conference, by hackers - for hackers, in France! The FRHACK Team (TFT) encourages speakers to present new and interesting projects for FRHACK 01 and will give preferential treatment to submissions that have not been presented at other conferences. The conference takes place September 7th and 8th, 2009.

tags | paper, conference
SHA-256 | c408ea73d97f4d934de600fe6fd3b5d93c7d32d52e6b2ace522117b027162d81
rsaenvision-disclose.txt
Posted Nov 26, 2008
Authored by Nicolas Viot | Site intrinsec.com

RSA EnVision suffers from a remote password hash retrieval vulnerability. Versions 3.5.0, 3.5.1, 3.5.2, and 3.7.0 are all affected.

tags | advisory, remote, info disclosure
SHA-256 | 72e46b59121bc7ea00a364a1c584cbeac02a4baf980212ce21c793f634d4b25b
cadfile.zip
Posted Nov 26, 2008
Authored by David Litchfield | Site databasesecurity.com

Orablock allows a forensic investigator the ability to dump data from a "cold" Oracle data file.There is no need to load up the data file in the database which would cause the data file to be modified, so using orablock preserves the evidence.Orablock can also be used to locate "stale" data - data that has been deleted or updated.

tags | tool, forensics
SHA-256 | c27a3adbdc20b162d44045a32dee98aa4c8cc3e34d7b97443c808d75c9a898ef
oracle-forensics-scns.pdf
Posted Nov 26, 2008
Authored by David Litchfield | Site databasesecurity.com

Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Examinations.

tags | paper
SHA-256 | 051ce7024ae89d5e1b9b1e94a3bf3171e5efbdd0947cbd1832b4846b9d8611cf
simpleblog-mdb.txt
Posted Nov 26, 2008
Authored by EL_MuHaMMeD

SimpleBlog version 3.0 suffers from a database disclosure vulnerability that allows for the retrieval of simpleBlog.mdb.

tags | exploit
SHA-256 | 8455f486862b7dd2220437bbc6ecdfc7be3742e614756c5a2075f403b13c31e9
webstudioehotel-sql.txt
Posted Nov 26, 2008
Authored by Glafkos Charalambous | Site astalavista.com

WebStudio eHotel suffers from a blind SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | d76059f2c80e1a0fa23b64dc093f0e98fef58cd278024424755a80ec55742a51
webstudioecat-sql.txt
Posted Nov 26, 2008
Authored by Glafkos Charalambous | Site astalavista.com

WebStudio eCatalogue suffers from a blind SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 1831e4b0a5850f3a129eb95d9d908986e3af252dfc943bcdb59f2cafb61867e0
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close