exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 107 RSS Feed

Files Date: 2008-12-09 to 2008-12-10

Secunia Security Advisory 33069
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in PhPepperShop Webshop, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | de79be65c8ab9e95aab882d28e546f78b11b03b3723a20d3cff566507fdc9f6d
Secunia Security Advisory 33034
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Bernhard Mueller has discovered a vulnerability in Microsoft SQL Server 2000, which can be exploited by malicious users to gain escalated privileges.

tags | advisory
SHA-256 | c69d30dfdf89afafd5c039eaa39a474c2cf3ab47f52420435862475ee23e4752
Secunia Security Advisory 33078
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux
SHA-256 | 1024bdd4a7af9adc75cd976a3103a38ef4f776721be9effc4ebcb1182cdad7ac
Secunia Security Advisory 33059
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in PunBB, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | fbbfbbfbcaba19f80e79fe771136832f6855b069bbad731dd9408e574c65de2c
Secunia Security Advisory 33031
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Athos has discovered a vulnerability in the Tag Board module for phpBB, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 81e8cd2653490ce9e9237a899aa5e33e124101ada083bc7c0f859a8b81067bd3
Secunia Security Advisory 32983
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dun has discovered some vulnerabilities in WebCAF, which can be exploited by malicious people and users to disclose sensitive information

tags | advisory, vulnerability
SHA-256 | c15368e97d9c4ec3911d75621ea18d69c4f16afef37adb59bf24ecf09fc47450
Secunia Security Advisory 33035
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 326a46f0ccbd907d6866c9bee71681ce752bc87d3ce96100889b258689852877
Secunia Security Advisory 30285
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office Word, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 39fb5a45fb7de58b8289dce679bdc19c78fd5a9b10518c6117cff2ccd9fa47a4
Secunia Security Advisory 33063
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Office SharePoint Server, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | c4240911a8a8d9beb8f147b81d204a4ca248c68a289abfa6970546a9afe53869
Secunia Security Advisory 33049
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BMC PATROL, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 5ff7b45cf1efc1f4db82a7a80e030dab8069720b7a0c53321d49fd4877b1420a
Secunia Security Advisory 26534
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in various Microsoft products, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 8347c81b10ff57aa7bc7eeee6d6c7b07cf185c0c1393461d5df42d44cae0d8b6
Secunia Security Advisory 32997
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 22b96fbb4b9d95e3e23b0cb375f552dc0e5db62e21ae73759e4c2bec924c951f
Secunia Security Advisory 33053
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | windows
SHA-256 | e626b9a26b9c66bba35e445898f6742bc4ca3726425ad04f0c21db5ec7dff693
Secunia Security Advisory 33020
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | windows
SHA-256 | c02416acc27233030e42b65f645edd9c36aed439f4785df0d20e432f6859cdff
Secunia Security Advisory 33058
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in several Microsoft Windows Media products, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system.

tags | advisory, vulnerability
systems | windows
SHA-256 | d3344bd12d8a079531ceb1bc43a2ab7a1763c68a21c3b89bfc71555f77c97cde
Secunia Security Advisory 31593
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Excel, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 08ca66e47de0ed2d64d4450020bd59080ee189d54d04f9f0b8c9cc8f5bfdabe0
Secunia Security Advisory 33044
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Poll Pro, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | f2260a0a7ced334876837f798f27762fad5649cfec10aebe75542e30c4f938dc
Secunia Security Advisory 33030
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and some vulnerabilities have been discovered in Professional Download Assistant, which can be exploited by malicious people to disclose sensitive information and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 7b54a00e0bac0fe6ea3974784a2d62946a1538d6362e08c0ca0794910b861369
Secunia Security Advisory 33008
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in QMail Mailing List Manager, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 11dc9fadacebb84dabd4d07a97e46b077e2db6628a0627727cf934951ae97ce8
Poll Pro 2.0 SQL Injection
Posted Dec 9, 2008
Authored by AlpHaNiX | Site offensivetrack.org

Poll Pro version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | c5c6ec7da0d037bd9cf9e87e76f2531c8118c0b412577f1472410a3750485414
PHPmyGallery 1.0beta2 RFI/LFI Vulnerabilities
Posted Dec 9, 2008
Authored by ZoRLu

PHPmyGallery version 1.0beta2 suffers from remote and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | bfaa0739303805dcd7e94fda73c049d0c48b2fca7348dd2b83591aae39e48635
Professional Download Assistant 0.1 SQL Injection
Posted Dec 9, 2008
Authored by ZoRLu

Professional Download Assistant version 0.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 5ec56c6b772b946a8eac068eca37a490d430cab116373a697829eb76aeca6af9
LFI To RCE Exploit With Perl Script
Posted Dec 9, 2008
Authored by CWH Underground | Site citecclub.org

Local File Inclusion to Remote Code Execution with a perl script.

tags | paper, remote, local, perl, code execution, file inclusion
SHA-256 | e40ca4dee137297ed80a811afaad0726c6618222b1a3547a89d1db2abcd4e560
Mandriva Linux Security Advisory 2008-236
Posted Dec 9, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2008-236-1 - A number of input sanitization flaws were found in various vim system functions. These issues have been corrected with these updated packages.

tags | advisory
systems | linux, mandriva
advisories | CVE-2008-2712, CVE-2008-2953, CVE-2008-3074, CVE-2008-3075, CVE-2008-3076, CVE-2008-4101, CVE-2008-4677
SHA-256 | 2c1199851c002a7cd04b032aaaf3dd54259a8d7854bc08944eec2cc34af18b5f
Ubuntu Security Notice 688-1
Posted Dec 9, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-688-1 - It was discovered that the Expo plugin for Compiz did not correctly restrict the screensaver window from being moved with the mouse. A local attacker could use the mouse to move the screensaver off the screen and gain access to the locked desktop session underneath. Default installs of Ubuntu were not vulnerable as Expo does not come pre-configured with mouse bindings.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | 6795df72a82d5d9476e53a1edeb7816403388f7794dc04c705ab80cdc9a017a9
Page 2 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close