exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 61 RSS Feed

Files Date: 2010-01-05 to 2010-01-06

Secunia Security Advisory 38047
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Dating Agent PRO, which can be exploited by malicious users to conduct script insertion and SQL injection attacks, and by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | c5d7a7fc10effc29e5e7fa5d51255e21c3a6bdacd94527847edaccc206a750c3
Secunia Security Advisory 37930
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Emanuele Gentili has reported a vulnerability in My Book World Edition, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 017be041e04abfed0f81c3764f62e5a61d69b234395294f3e9a4f19005ec50ca
Secunia Security Advisory 38010
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - indoushka has reported a vulnerability in AL-Athkat, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | d88033f06c2d5db272890cf54d051871d92d117b93067f62b43e6b61b528ff43
Secunia Security Advisory 38086
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Pay Per Minute Video Chat Script, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 29f8488551b0b4440ffd0867558d47077f83b25920d29439b47da9a30bf78519
Secunia Security Advisory 38119
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in MS-Pro Portal Scripti, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 18b43e02aa182676f7b141d33a222dae56e8febe0a05a8d5131293e6997c9675
Secunia Security Advisory 38098
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in tnftpd, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 5f8d7b41c3a9de9050ea7d35f16eafdf216ddb63f4db36e46b759b23d2f9fb21
Secunia Security Advisory 37974
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Ozio Gallery component for Joomla!, which can be exploited by malicious people to manipulate certain data.

tags | advisory
SHA-256 | 2b1989386dc53c3cac90d1b549c53cf31d216b5d914ec6e71580f969a7c135db
Secunia Security Advisory 38028
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lincoln has discovered a vulnerability in Net Transport, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c7bae0281937e51ae71f1f404d4a31bff918e60f4fc555f4232b18e64e1d12f3
Secunia Security Advisory 37834
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Abbreviations Manager component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 6369782269ac7f5423a88c3df6115b815cdc0061de6d27f536e0cf320d06e630
Secunia Security Advisory 37896
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Bible Study component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 74ea51f2479554ccbed51e8b10ed38045182916317d61f3efb2cc464eda0150a
Secunia Security Advisory 38101
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for ntp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | b1cd29033f9ee3be5db51c25f4e3fcd5a5a47e250125e90e816f3f5ba6b5e5d9
Secunia Security Advisory 37868
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the BF Survey Pro component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 96c535c170809d1a342d79f5d19eedbea3b4babae6cb56ef6fc754a7b702f416
Secunia Security Advisory 38082
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for NetworkManager. This fixes two security issues, which can be exploited by malicious, local users to gain knowledge of sensitive information and by malicious people to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
SHA-256 | 92a9faec6d36c17269fa245e5edd2298de402cf4e9e268cf04f51fb78ae0bbdc
Secunia Security Advisory 38115
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IMAGIN, which can be exploited by malicious people to manipulate certain data.

tags | advisory
SHA-256 | 0701cc42c2743ce196a5492db18a0e473cc3914c4ef39b1368b5ff25ca23d972
Secunia Security Advisory 38100
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for PostgreSQL. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
systems | linux, ubuntu
SHA-256 | 2fb55791ba9ee9a5835c59f89851b0b4f5a5046bb7335b5238bd67bb817bd1c1
Secunia Security Advisory 38099
Posted Jan 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
systems | linux, debian
SHA-256 | 3c877dbec5d2c534cde8f5f1373876a29671b201fab20f005426af927d124b4a
HitNote E-Zine 0x00
Posted Jan 5, 2010
Authored by hitnote | Site hitnote.gotdns.org

HitNote E-Zine 0x00 - This issue has topics like Condannoogle, The Pizza-Floppy, and Superzoom. Written in Italian.

tags | magazine
SHA-256 | 2cbc5c571b38e443bfefc35ef013070e1351813fb4e9926249c8867c57490e5e
Netcrack Cluster Software 1.0
Posted Jan 5, 2010
Authored by Salvatore Fresta | Site salvatorefresta.net

NetCrack is cluster software developed to distribute a hashing algorithm's cracking process work using a brute force attack. Currently, it only supports the two most commonly used hashing algorithms: MD5 and SHA-1. Support is included for MySQL, safe mode, and others. It works like a client/server application, where the server is unique for each cluster network and its job is to distribute the cracking process work, coordinate the nodes, and prevent connections and data integrity errors.

tags | cracker
SHA-256 | e85abe345ad6d982c1eae2903999f97fc52fe69c0584d5175dec1b982279b240
phpAV Code Auditing Tool 1.0
Posted Jan 5, 2010
Authored by Milos Zivanovic

phpAV is a script designed to work as antivirus for malicious PHP scripts. It will search a given directory and related files for dangerous functions and provide a report.

tags | web, php
SHA-256 | 52ba58c54f23247b703f406196191b4b06961a14a63f73da8e5e630962be128a
Joomla J-Projects Blind SQL Injection
Posted Jan 5, 2010
Authored by Pyske

The Joomla J-Projects component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d65733f694e80bd16259cefd015418d9f8fc77e5d17a828e28af8cd122fc92e6
STKeys Thomson WPA Key Recovery Tool 1.0
Posted Jan 5, 2010
Authored by Kevin Devine

STKeys is a tool that will recover default WPA keys for Thomson routers using the default SSID. Works on most Thomson routers supplied by multiple ISPs in Europe.

tags | tool, wireless
SHA-256 | 47fa224515007beabfae81f17016d4ebe1626056c2cf2ae58ae59071154a45c1
Magento Community Edition 1.3.2.43 Cross Site Scripting
Posted Jan 5, 2010
Authored by Justin C. Klein Keane

Magento Community Edition version 1.3.2.43 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | dbd525978d8ace31114ca6b8b08a0aa779f3c2209c1480624da0447ea6beeb0f
ZoneEdit.com Cross Site Scripting
Posted Jan 5, 2010
Authored by discloser

ZoneEdit.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3021d52e70f41bb2aba6240e1fc91c5051cb90c755a1271dc95a93e657866ab5
KMSoft Guestbook 1.0 Database Disclosure
Posted Jan 5, 2010
Authored by LionTurk

KMSoft Guestbook version 1.0 suffers from a remote database download vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 53572c0a437759e42a066504559975991d3be1174ae878c69a2da86befbc3a31
Myteknoloji Hosting Scripti Database Disclosure
Posted Jan 5, 2010
Authored by LionTurk

Myteknoloji Hosting Scripti suffers from a remote database download vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 27ebfa6490216fc546b7a5b31dbe2eb73ce82bc3d1bee8afa98a7cc63c42a36d
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close