exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 33 RSS Feed

Files Date: 2010-05-11 to 2010-05-12

Secunia Security Advisory 39723
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Mereo, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | d17d0ab0cd249bfb33a00695770616937af9775769111c787573f4742a181486
Secunia Security Advisory 39797
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for irssi. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain security restrictions.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | f0ebc45779b299999d890d9026a295ed8d365db3b12d6d29041c9080dbac3d37
Secunia Security Advisory 39796
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for amsn. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, fedora
SHA-256 | 364da3dd4ca4855028325d5ae83d4fb7685f2d1d6ad203e126f448913ac9be94
Secunia Security Advisory 39783
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Esser has reported some vulnerabilities in Serendipity, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | d46eb52f9152c7791c02fe83c4f269a5a8cc7fa905384cf57923d0da71ac7219
Secunia Security Advisory 39771
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes multiple vulnerabilities where some have an unknown impact and others can be exploited by malicious, local users to bypass certain security restrictions and cause a DoS (Denial of Service), by malicious users to conduct script insertion and SQL injection attacks and cause a DoS (Denial of Service), and by malicious people to conduct spoofing, cross-site scripting, and SQL injection attacks, manipulate certain data, disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, spoof, vulnerability, xss, sql injection
systems | linux, suse
SHA-256 | 5fa95392b3e1e766d5be2ab49778229fc34751364b09f2f317975c0ff07aeca3
Secunia Security Advisory 39794
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 124d801d9d499456decf6535d155a4aec53765b621011bafbaa2c8abaf571e30
Secunia Security Advisory 39768
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Advanced Poll, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 58a273f5a86d02b6699c902327e7c8530b1f435da95b6ba8ddc3d3acc1db4c07
Secunia Security Advisory 39789
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 2bcd785b7d5fc83d3cfbc6fecbca9d8a07847aef75708b118471971b8d3890b6
Secunia Security Advisory 39772
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported a vulnerability in Affiliate Store Builder, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 2654d04855e0f9f467bf5ce6b29f50becebbd50192e220a54f295ae795d73b81
Secunia Security Advisory 39766
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in Microsoft Outlook Express and Windows Mail, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 15879cbeb82f803e03191b6594e48cbea94dd6465cd367c0d573ac50cfb77cec
Secunia Security Advisory 39663
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Visual Basic for Applications (VBA), which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | b5b779f072d00763199410aee8291f8183a358fe895907d0dcb6e2df34ea64fe
Secunia Security Advisory 39782
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Esser has discovered some vulnerabilities in Xinha, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 744a918079c7179941ab5af0a0537d756f2e7c4d2519d1090652bccb49d26f2f
Secunia Security Advisory 39781
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM HTTP Server, which can be exploited by malicious people to manipulate certain data, conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), or to potentially compromise a vulnerable system.

tags | advisory, web, denial of service, vulnerability, xss
SHA-256 | e2d952d3b3a581604ad17eca2b3dad850230a0c9e8f18af33b87eda4ef35dfb5
MOPS-2010-019 - Serendipity WYSIWYG Editor Plugin Configuration Injection
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - Serendipity WYSIWYG Editor Plugin Configuration Injection Vulnerability. Versions 1.5.2 and below are affected.

tags | exploit, php
SHA-256 | d7cff96350fb0bbba4a2906fcf98f4a29c9f8b294849fdf0eae4b4c47cca9052
MOPS-2010-020 - Xinha WYSIWYG Plugin Configuration Injection
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - Xinha WYSIWYG Plugin Configuration Injection Vulnerability. Versions 0.96 Beta 2 and below are affected.

tags | exploit, php
SHA-256 | c66014e0c6768bd3c9c1aa70a314d4064c4c0468b8bf98545b2f42a206c4e70b
MOPS-2010-018 - EFront ask_chat chatrooms_ID SQL Injection
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - EFront ask_chat chatrooms_ID SQL Injection Vulnerability. Versions 3.6.2 and below are affected.

tags | exploit, php, sql injection
SHA-256 | bd70db2bcd76336b6a4f5c231f16033f042aefde8dc98f8e10731ab10ccba7c9
MOPS-2010-017 - PHP preg_quote() Interruption Information Leak
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - PHP preg_quote() Interruption Information Leak Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | e515968ea6988e8d0807efab6970363eaf0993abc5894542f5986b54ff16775a
MOPS-2010-015 - PHP ZEND_SL Opcode Interruption Address Information Leak
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - PHP ZEND_SL Opcode Interruption Address Information Leak Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | 2907e511f86cca7358b45fea35061b6efab3d3f08dabede076d55e375e76e680
MOPS-2010-016 - PHP ZEND_SR Opcode Interruption Address Information Leak
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - PHP ZEND_SR Opcode Interruption Address Information Leak Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | 5b99778ede255d29c72816503ca902ab9c5dd9959bcb79a46e5a309a31cfa132
MOPS-2010-014 - PHP ZEND_BW_XOR Opcode Interruption Address Information Leak
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - PHP ZEND_BW_XOR Opcode Interruption Address Information Leak Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | ee2f34c9c80af2c8f60fb317ecffe89f45b2e012058e8906eeac7a6b4ecb2e11
MOPS-2010-013 - PHP sqlite_array_query() Uninitialized Memory Usage
Posted May 11, 2010
Authored by Mateusz Kocielski | Site php-security.org

Month Of PHP Security - PHP sqlite_array_query() Uninitialized Memory Usage Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | e088169632635e105d95ac223539fe367c19525b8665f77eafa9aaad7d54e5f4
MOPS-2010-012 - PHP sqlite_single_query() Uninitialized Memory Usage
Posted May 11, 2010
Authored by Mateusz Kocielski | Site php-security.org

Month Of PHP Security - PHP sqlite_single_query() Uninitialized Memory Usage Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | 61cdbfcea6f345bf6762fe58f9dd5df64288bbcea21da5a89e112f929fe3421e
MOPS-2010-011 - DeluxeBB newthread SQL Injection
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - DeluxeBB newthread SQL Injection Vulnerability. Versions 1.3 and below are affected.

tags | exploit, php, sql injection
SHA-256 | d69337c26c2a6c3970dd5fd8963e5d44313915ca5b8cedf37d5ab51d48d75d52
MOPS-2010-010 - PHP html_entity_decode() Interruption Information Leak
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - PHP html_entity_decode() Interruption Information Leak Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | 05d20cc7a50287ac2532f5c71d9fe20888f9ec171855cca57c63e139215aaefa
MOPS-2010-009 - PHP shm_put_var() Already Freed Resource Access
Posted May 11, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - PHP shm_put_var() Already Freed Resource Access Vulnerability. PHP versions 5.2.13 and below and 5.3.2 and below are affected.

tags | exploit, php
SHA-256 | c9357ce50f070bf1ad0f6cfd9433075d4b5babdaae0bd5ec73aa09d6988c02b1
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close