exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 82 RSS Feed

Files Date: 2010-03-31 to 2010-03-31

Secunia Security Advisory 39221
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Peik CMS, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | e3cc34d6ee4cb8cde1730c5b4fa0b64af026fe8f8c287bd5cc55947060f537c2
Secunia Security Advisory 39211
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in React Forum, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 09ebaf3375597fbd524baa58ee793bea352e2c5edc38769e70c91e3d46458296
Secunia Security Advisory 39213
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pierre Nogu

tags | advisory, denial of service
SHA-256 | eb9f3195e680ab5215cea25bd0200737601311abe90a8ac7980bf2a2eda42919
Secunia Security Advisory 39242
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to manipulate certain data and potentially compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 504cb890548152270c51471f2fecbbd31ac554916c79a3392d7cde024a50fcfe
Secunia Security Advisory 39199
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pierre Nogu

tags | advisory
SHA-256 | f89152bff987b99ea19e7efee9150e1907b09c33624e2fdcf4609b6b89016a77
Secunia Security Advisory 39156
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in KimsQ, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | a2d4acfa31397b35031180052e8bdcd67a73bf3c30b0f889b129b16aabf4b6e8
Secunia Security Advisory 38566
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to manipulate certain data, bypass certain security restrictions, and potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 90c9a7207ec6c44919a5b7abc31f2ced8d40c74280bea915ee635830728bb7dc
Secunia Security Advisory 39224
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Mueller has reported some vulnerabilities in OXID eShop, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct session fixation attacks.

tags | advisory, vulnerability
SHA-256 | 35c254374aca4b4ef136d3f3a10b03bec514a046ecdc6f057275333ea4c24d4f
Secunia Security Advisory 39117
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | f1a5eca6f60a711e6b9ca6c959a284ea72ef28657661e791dee8e35859e4959d
Secunia Security Advisory 39236
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Centreon, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d118d6a692eb2e06c9458e6adb9a24ba0f2bd8a2424c5d33ffcac142bbd254fd
Secunia Security Advisory 39205
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Yamamah, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 15e641263dadc68dd95386ce7bf2b3439287b5bdc21ebea16570c5ef1c8dff58
Secunia Security Advisory 39214
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Irmin CMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 8f827e3288618e030f99589973dd03c7b1a979967ffb6bfe6ed918dd3d259275
Secunia Security Advisory 39193
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Free MP3 CD Ripper, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1cd95d10145a53fcb5926317be477693141dfe8689d98e1bd760cb0632b7191d
Secunia Security Advisory 39146
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apache CouchDB, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 1b1c9c4af7823c34b0612b87dfa2576fba418c7c51a97544779b627201754144
Secunia Security Advisory 39231
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for brltty. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local
systems | linux, redhat
SHA-256 | c16a0f620fa05111e1a61ca4f1c7bb3c551e4959ac4c4ac1120e34caf9844277
Secunia Security Advisory 39191
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in CompleteFTP Server, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory
SHA-256 | 778b29bf86514935cea61784c16b81673f1c55932bb84d0ef3eec4e3f25eb9ed
Secunia Security Advisory 39200
Posted Mar 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the DW Graph component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 83211ecbf2cb5afe16c99f1329cc23099fedf58fae05e7149cef55fa8ee3492b
Joomla Actions SQL Injection
Posted Mar 31, 2010
Authored by DevilZ TM

The Joomla Actions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0b9442f5f44f157f50f280f02270a0e236fde3f8b5405795ca708a92c9400f90
Free MP3 CD Ripper 2.6 Buffer Overflow
Posted Mar 31, 2010
Authored by Richard Leahy

Free MP3 CD Ripper version 2.6 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 4cafe26e5776de3cb50f893f1685e2f16b965f987abc2f4dc26f298f46bc3980
HP Security Bulletin HPSBMA02490 SSRT090222
Posted Mar 31, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP SOA Registry Foundation. The vulnerabilities could be exploited remotely to gain unauthorized access to data, for cross site scripting (XSS), or to escalate privileges.

tags | advisory, registry, vulnerability, xss
advisories | CVE-2010-0448, CVE-2010-0449, CVE-2010-0450
SHA-256 | bbda352244788e6afcab64cbca7d44c84fac053e9dc79db7d466c06de38d3c1e
OpenSSL Toolkit 1.0.0
Posted Mar 31, 2010
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Connection renegotiation was vastly improved to overcome protocol weaknesses. A recently introduced "Record of death" vulnerability was resolved. A possible crash, reported as CVE-2010-0433, was fixed. Some memory leaks were resolved. Initial TLSv1.1 support was added. Handling of TLS versions 2.0 and later was improved, and the highest version is now selected. Support for MD2 has been deprecated. Support for companion-algorithm specific ASN1 signing routines was added. Signature dumping was improved. Many other improvements and minor bugfixes were made.
tags | encryption, protocol
advisories | CVE-2010-0433
SHA-256 | 1bbf9afc5a6215121ac094147d0a84178294fe4c3d0a231731038fd3717ba7ca
Buck-Security Debian / Ubuntu Scanner 0.5
Posted Mar 31, 2010
Site buck-security.sourceforge.net

Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages. It also checks your umask and checks if the sticky bit is set for /tmp, among other checks.

tags | tool, scanner
systems | linux, unix, debian, ubuntu
SHA-256 | 6f0b6570b71e89d68444a6a2f870753a998c2b2e17c4a1c37ef3deaaf5e7b406
HP Security Bulletin HPSBMA02513 SSRT090110
Posted Mar 31, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with Insight Control for Linux (IC-Linux). The vulnerabilities could be remotely exploited to allow remote execution of arbitrary code, local unauthorized elevation of privilege.

tags | advisory, remote, arbitrary, local, vulnerability
systems | linux
advisories | CVE-2009-2288, CVE-2010-1031
SHA-256 | d4109e5d9a36b472ebc75df6b4a9306be7b8adb9a7212fb743bcf9a50f32a689
React Software Local File Inclusion
Posted Mar 31, 2010
Authored by Sebastian Biele

React Software suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 74ec6780339d84683f4a0bf8307897d93ea393d77ecd997ec07c1be1b88519f7
Joomla Television SQL Injection
Posted Mar 31, 2010
Authored by DevilZ TM

The Joomla Television component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 59081456b80f2a69688e7b69a240458175661a2ad903f643c7a2e538f633fd21
Page 2 of 4
Back1234Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close