exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2009-06-17 to 2009-06-18

Secunia Security Advisory 35448
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Recipe Script, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 01599c942967520db6369c9eef70460413b02dcf733fa82104e968716674c396
Secunia Security Advisory 35462
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cscope. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | b8caeff744281d21d9656b685571ee16a14f271f0f7801aaa10ffb204a5d8c43
Secunia Security Advisory 35452
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SirGod has discovered a vulnerability in phpCollegeExchange, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 3bd233d745a73178f350adc29e619c638b52c966a6afd1ae4b8acf6cef3b90fd
Secunia Security Advisory 35450
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kacper has discovered a vulnerability in the Photoracer plugin in WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 08a938fd2e100a1182513f6e553ce7649c00460d7ff3e517fee726d1eaee8bb2
Secunia Security Advisory 35464
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for wireshark. This fixes some vulnerabilities, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 689df18daf06f3163ce2564e2345a3b81e7598a477e348cab9f070125dcd7c99
Secunia Security Advisory 35463
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP OpenView SNMP Emanate Master Agent, which can be exploited by malicious people to spoof authenticated SNMPv3 packets.

tags | advisory, spoof
SHA-256 | 672815bf04d977d3b6248d19a66f659e8457d1fa4231c55fee3d4e3d4b7921a3
Debian Linux Security Advisory 1816-1
Posted Jun 17, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1816-1 - It was discovered that the Apache web server did not properly handle the "Options=" parameter to the AllowOverride directive.

tags | advisory, web
systems | linux, debian
advisories | CVE-2009-1195
SHA-256 | f481cb1d57b719487008c76e6c82018b67522e8df574fcfe60b4624260c4a8b3
Zero Day Initiative Advisory 09-043
Posted Jun 17, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-043 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Java HotSpot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the undocumented apple.laf.CColourUIResource(long, int, int ,int, int) constructor. When passing a long integer value as the first argument, the value is interpreted as pointer to an Objective-C object. By constructing a special memory structure and passing the pointer to the first argument an attacker may execute arbitrary code.

tags | advisory, java, remote, arbitrary
systems | apple
advisories | CVE-2009-1719
SHA-256 | 5facd277a7e3c9290288470e2853e5bdee3fef07cf9b1e04a967318eab053b92
Cyclic Redundancy Check (CRC)
Posted Jun 17, 2009
Authored by Livewire

Whitepaper called Cyclic Redundancy Check (CRC).

tags | paper
SHA-256 | ee9f36d6c109460e8f2bea61ca55ae7b54e4f0c5fd5a039cb22a03686686788c
Assault On PHP Applications
Posted Jun 17, 2009
Authored by Aelphaeis Mangarae

Whitepaper called Assault on PHP Applications.

tags | paper, php
SHA-256 | ef5875a096fda4f0ad831297a054b2161f778201984c4392ea88e6e2b6f69209
Linux x86 Shellcode
Posted Jun 17, 2009
Authored by blue9057

Linux x86 setreuid(geteuid(),geteuid()),execve("/bin/sh",0,0) 34 bytes universal shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 808f1d01ba025223e6efe5f3705c3a887caf3397ecc4fe4a03383b3cd49815aa
Solaris x86 Portbinding Shellcode
Posted Jun 17, 2009
Authored by Jonathan Salwan | Site shell-storm.org

Solaris x86 portbinding TCP shellcode generator.

tags | x86, tcp, shellcode
systems | solaris
SHA-256 | 230744b84b6f7e60ccd26a70589da276754ed6f6e289798b095b034d38023ef2
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close