what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 133 RSS Feed

Files Date: 2010-01-04 to 2010-01-05

Secunia Security Advisory 38070
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for slim. This fixes a security issue, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
systems | linux, fedora
SHA-256 | 7b43590fbc4adafe7cc143349acb46553dd83f8395077ced055ef4b3bc9fd92c
Secunia Security Advisory 38022
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - indoushka has reported a vulnerability in phpBannerExchange, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 69fca39cff628dad6da98658ab32d9240fda466af1de3ff5f965e9b118dc108b
Secunia Security Advisory 38067
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for automake. This fixes a security issue, which can be exploited by malicious, local users to manipulate certain data.

tags | advisory, local
systems | linux, fedora
SHA-256 | 0f06c77f9cbd9c4ed5329016c82941f1495df186395934fa789da5d51fc09352
Secunia Security Advisory 38075
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - e.wiZz! has discovered a vulnerability in Weatimages, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 612fd4df96caf3e0fe335ecf6e0f055ef1bf4f68bb3b666aa1f8f68084458888
Secunia Security Advisory 38052
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Hit Counter, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | be189d79cd3ebeae9d965b2151c2bd1dc6e0c6d43915fafb3caa7b633830e198
Secunia Security Advisory 37966
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francois Ropert has discovered a vulnerability in BLOG:CMS, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 95b7750f95147988252d2a3c70baeab8514d9d636ea958ccda1308cbef2a1b85
Secunia Security Advisory 38043
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VisionGate, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | b04351fc66437d68d663d25930cdff133dc9e814061be6fe2b920c9e8186aa97
Secunia Security Advisory 38071
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Imagevue Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 072018ca161e445bc7fce1a8edbe38d1fb66030316d20550004dfd0e1946577d
Secunia Security Advisory 37866
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the BF Survey component for Joomla, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 9e0441232053fae8b3cd51281f76e9ec67f3f0d74bc09cb9194e72b542e982fd
Secunia Security Advisory 38063
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - indoushka has reported a vulnerability in phpYellow, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 1e86eae30c81c8babce1bf0cc3cd9390e1cf7205cf46a275ad918430ab77105a
Secunia Security Advisory 38084
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LionTurk has discovered a security issue in Acidcat CMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | fd6b348fcbbf6ce44dd4d68423cd32382de246e6a2c7a08a5dae3beb459e3ab9
Secunia Security Advisory 38102
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for adobe-flash. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 0be342ddac487949b1ad3b300bfab37414a7389936087deb249dc4a670e7e896
Secunia Security Advisory 37926
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Memory Book! component for Joomla!, which can be exploited by malicious users to conduct SQL injection attacks and potentially compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | ef290411a9c70c79ecaafe717696ddfb5eedc6377075b744f656419f99fed242
Secunia Security Advisory 37917
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the CARTwebERP component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | a5086ddf13f8b403ba8627eae6d47fe5eb535aee0ae32175c87829ecf6b00fb8
Secunia Security Advisory 37920
Posted Jan 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefano Angaran has discovered two vulnerabilities in Xoops, which can be exploited by malicious people to conduct cross-site scripting attacks and by malicious users to conduct SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | ffa918db6ed2fe5b1c6306599caa81141285c33cf7cafcee15215faddef266e1
Packet Storm New Exploits For 2009
Posted Jan 4, 2010
Authored by Todd J. | Site packetstormsecurity.com

Complete comprehensive archive of all 4,006 exploits added to Packet Storm in 2009.

tags | exploit
SHA-256 | eb89bbff95b8ba691b547a4614080e2038915ca73fba39c5405ff43771b17f08
Packet Storm New Exploits For December, 2009
Posted Jan 4, 2010
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 599 exploits added to Packet Storm in December, 2009.

tags | exploit
SHA-256 | b88b903b298d166d5f936fcd628f44bef605c83459966f1dfe34469c4c502f8e
DeepToad Fuzzy Hash Tool 1.1.0
Posted Jan 4, 2010
Authored by Joxean Koret | Site code.google.com

DeepToad is a tool for computing fuzzy hashes from files. DeepToad can generate signatures, clusterize files and/or directories and compare them. It's inspired in the very good tool ssdeep and, in fact, both projects are very similar. The complete project is written in pure python and is distributed under the LGPL license.

tags | python, fuzzer
SHA-256 | 195b3d4c57d15a6fee7b7136f3351f12f13fb9a8144df5002b92a4485043bd1a
Ubuntu Security Notice 876-1
Posted Jan 4, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 876-1 - It was discovered that PostgreSQL did not properly handle certificates with NULL characters in the Common Name field of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. It was discovered that PostgreSQL did not properly manage session-local state. A remote authenticated user could exploit this to escalate privileges within PostgreSQL.

tags | advisory, remote, local
systems | linux, ubuntu
advisories | CVE-2009-4034, CVE-2009-4136
SHA-256 | c0bf32c9c4f0f579575541a0fecf59aa77cf52cd7c9ebbdd7ac766b9ac5dee35
Gentoo Linux Security Advisory 201001-2
Posted Jan 4, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201001-2 - Multiple vulnerabilities in Adobe Flash Player might allow remote attackers to execute arbitrary code or cause a Denial of Service. Versions less than 10.0.42.34 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800
SHA-256 | 7d8603b58d6f0757e1152c996976c2ddd7d0b17d537faaa63a02d9830c7c9b77
Blocking Common Web Attacks
Posted Jan 4, 2010
Authored by Sora

Whitepaper called Blocking Common Web Attacks.

tags | paper, web
SHA-256 | 259e9e275105cef9d8e57da54d438055f0988b9ee4e47b8a4f896b378bf02608
Joomla BF Survey Local File Inclusion
Posted Jan 4, 2010
Authored by Fl0riX

The Joomla BF Survey component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 4b5007a22dc9f153bd19790fdcf048d3aaa331bef8e1c3f4af751eb352b507f5
Football Pool 3.1 Database Disclosure
Posted Jan 4, 2010
Authored by LionTurk

Football Pool version 3.1 suffers from a remote database disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | b60785e752b08b43d4911149ce8a59c8321844967f951e627b45213d481edde0
Discuz 2.0 Cross Site Scripting
Posted Jan 4, 2010
Authored by indoushka

Discuz version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | caa995957db1facf2261eb826d830e957cc0e68b6ad6f651ee21ac6b3c02455a
SLAED CMS 2.0 XSS / Backup
Posted Jan 4, 2010
Authored by indoushka

The Arabic version of SLAED CMS version 2.0 suffers from cross site scripting and backup related vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 1b5f266412210a6fc519b330f13ee674bea02e443a4009a2cd0dd7a50e2cf3ff
Page 2 of 6
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close