exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 83 RSS Feed

Files Date: 2010-04-27 to 2010-04-28

Secunia Security Advisory 39602
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in CMScout, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6f3eead784db80175f9285f02ad2d934100fba38696ac68f6bd23aa6c462816c
Secunia Security Advisory 39594
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in IDEAL Administration 2010, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5cd71e8d3bed87598752c8208a2660c0e81657b66c62923883324fbb96295601
Secunia Security Advisory 39611
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Alstrasoft EPay Enterprise, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1e84e30c7d87af2ebfadefd923433d8849ed9b4429066b8bca80d095bfb5257e
Secunia Security Advisory 39616
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and a vulnerability have been reported in Joomla, which can be exploited by malicious people to disclose sensitive information and conduct session fixation attacks.

tags | advisory
SHA-256 | 200088d4f9c748b1b96a9d97893355a2b7732907b1a05aa1dda3f74e0290ccb0
Secunia Security Advisory 39613
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HTML Purifier, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 62e6a482e2041d73e1b7e4954df82249e09a16288204214d064171d609c95d69
Secunia Security Advisory 39563
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three security issues have been reported in Red Hat JBoss Enterprise Application Platform, which can be exploited by malicious people to bypass certain security restrictions or disclose sensitive information.

tags | advisory
systems | linux, redhat
SHA-256 | eab551773af9ae0099c57559ce9313af0a9377c61f5470a7866fd38d6f051c5d
Secunia Security Advisory 39593
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for ntp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
SHA-256 | 5e1d8be28f331acd2ec1586a903e1d31372ed5a49ce39edfb2e468531f1f8fb7
Secunia Security Advisory 39620
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for irssi. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain security restrictions.

tags | advisory, denial of service, vulnerability
systems | linux, slackware
SHA-256 | 95fd2668c063058ec558b04f5143b446676aa73e685e3455f82a4f99658498b3
Secunia Security Advisory 39627
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - liscker has reported a vulnerability in PowerEasy SiteWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 1a5cca5609f5005e6581ed05079cb8b0050c4f184a3ea7b9ad8c09f865d87e97
33 Bytes Linux / x86_64 sethostname() And killall Shellcode
Posted Apr 27, 2010
Authored by zbt

33 bytes small Linux / x86_64 sethostname() and killall shellcode.

tags | shellcode
systems | linux
SHA-256 | f4eb2be4e4b279407995999d923a03d98acdd0315610e6324b68696da65a6dc0
Smart Blog 1.3 Directory Traversal / SQL Injection / Cross Site Scripting / File Inclusion
Posted Apr 27, 2010
Authored by indoushka

Smart Blog 1.3 suffers from cross site scripting, file inclusion, remote SQL injection and directory traversal vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, file inclusion
SHA-256 | a065a8dbbed20132927af3b7b57b3ec7456af26837aa74cae19e80c346f51ace
eSyndiCat 2.3.03 Backup Disclosure
Posted Apr 27, 2010
Authored by indoushka

eSyndiCat version 2.3.03 suffers from a remote backup disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 70446b0f7615fc22d9cfa3ab76a056170c0bc3889204ce27e4d34e8d11240ad4
60 Bytes Phuck3d! Shellcode
Posted Apr 27, 2010
Authored by condis

60 bytes small Linux/x86 shellcode that send "Phuck3d!" to all terminals.

tags | x86, shellcode
systems | linux
SHA-256 | 222bcd93231be03d8446d74896dc2dff4386ef4ba1d7da74f7643266b106a418
30 Bytes Linux / x86_64 execve("/bin/sh"); Shellcode
Posted Apr 27, 2010
Authored by zbt

30 bytes small Linux / x86_64 execve("/bin/sh"); shellcode.

tags | shellcode
systems | linux
SHA-256 | 157f66edfd08be1a3c8a966827ece567ea085fd32848c087d101f7838e9abb13
19 Bytes Linux / x86_64 reboot(POWER_OFF) Shellcode
Posted Apr 27, 2010
Authored by zbt

19 bytes small Linux / x86_64 reboot(POWER_OFF) shellcode.

tags | shellcode
systems | linux
SHA-256 | 89c6ad674181b68f9e1ee97100f163622188cf3b1f3b93a5abe8d653965af630
Whitepaper Called Flag Execution For Easy Local Privilege Escalation
Posted Apr 27, 2010
Authored by Jelmer de Hen | Site h.ackack.net

Whitepaper called Flag execution for easy local privilege escalation.

tags | paper, local
SHA-256 | 0304c7b0387b6acdbfddaf7c2a56bffac2f64c1f292208f6ddad65ba9303aee3
Hash Collision Attack Vectors On The eD2k P2P Network
Posted Apr 27, 2010
Authored by Lital Porat, Uzi Tuvian

Whitepaper called Hash Collision Attack Vectors on the eD2k P2P Network.

tags | paper
SHA-256 | 0232a6532405a09cb7c603fefacfd54a63d899fdbd1b48c09d856b8d607fad84
Whitepaper On DNS Enumeration
Posted Apr 27, 2010
Authored by Mohd Izhar Ali | Site johncrackernet.blogspot.com

Whitepaper that is a How-to on DNS enumeration.

tags | paper
SHA-256 | 285fe6b6c0b43221e845dcfcc4f0b438ee1d9ae049fa1993961fd2c8f74114a9
Secunia Security Advisory 39614
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA reported two vulnerabilities in Zikula Application Framework, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 1874d97044f66b06512795b596825d2db936e38e2a4307e8dc9e087518e7f6bf
Secunia Security Advisory 39625
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Infocus Real Estate Enterprise Edition, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | ecb5d14577fcef9b53642174ebc9ea51da2bdb53e8371fcad73d47d5337b8e93
Secunia Security Advisory 39590
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Opera, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a2c75b06735e6ce569ee59b9f1964299b5116f16bdccc861dc354a502672fb52
Secunia Security Advisory 39457
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Amiro.CMS, where one has an unknown impact and others can be exploited by malicious users to disclose sensitive information or compromise a vulnerable system and by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | bd30615985c360864f05882b083affa8545978191b043708ab1c09c936750011
Secunia Security Advisory 39587
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses have been reported in gitolite, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | cc57be5363f50372c285d1228cd36e1ffbf9c33ca1f275d76d39f6e0687aaa97
Secunia Security Advisory 39599
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Valentin Hoebel has reported a vulnerability in G5-Scripts Auto-Img-Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 86d649bcedefa6d2ed35bdfd7ec7f09663932a73c3d96836d5e1859e7c93a9fa
Secunia Security Advisory 39586
Posted Apr 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Wing FTP Server, which can be exploited by malicious users and malicious people to disclose potentially sensitive information.

tags | advisory, vulnerability
SHA-256 | bbb49c07348b9a4899a1462b29e202a4dc2f3edb1d1fff82de70f6c5c3218d76
Page 2 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close