exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 82 RSS Feed

Files Date: 2010-05-19 to 2010-05-20

Secunia Security Advisory 39527
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Orbit Downloader, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f73ef8f9f3fbee299bf6e56cf352f9ec026356733d647052086b4239eefceb75
Secunia Security Advisory 39877
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrea Bocchetti has reported a vulnerability in Shopzilla Affiliate Script PHP, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, php, xss
SHA-256 | 71045bbee6336540080eaf191e1c8a0f3674bcfc95b57dfc9b69ae845cf59312
Secunia Security Advisory 39842
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in the JComments component for Joomla, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | d00e013a9bc16c08b5bbe99e3570c4e266a9e65f4fb3669b6dcfaed6ffde246c
Secunia Security Advisory 39819
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued an update for Java for Mac OS X. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, disclose potentially sensitive information, cause a DoS (Denial of Service), or to compromise a user's system.

tags | advisory, java, denial of service, vulnerability
systems | apple, osx
SHA-256 | 57dc459d4ff535e919398d6830c5f1d44bb39b4ae375bc83d317b8cbc97c9031
Secunia Security Advisory 39863
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Lokomedia CMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | ef05c4f5300206a0e0a6c168e615ef2d90f762270d44542e27a87000d094af08
Secunia Security Advisory 39871
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the SimpleDownload component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 651feb656fdba5e381b378091d2708d653f6110b683126549a84ddfd1592fbe5
Secunia Security Advisory 39875
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Russ McRee has reported a vulnerability in dradis, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 21e612e613ded1f1ebc07d61e157532dffbc31ce42365a482bdf4720a3c763b3
Secunia Security Advisory 39876
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Rad L. Sneak has discovered a vulnerability in ManageEngine ADAudit Plus, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 2492b74a3710004905172af20f0e1bfe8a7e205ecc087d1eaa2c61ae2b2fd9f5
Secunia Security Advisory 39868
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in DataTrack System, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | faca34ef4171bfc32303b10251cbd40bc2631baf652c8e9b5c9a10736c0bc11d
Secunia Security Advisory 39879
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Rad L. Sneak has discovered a weakness in Dell OpenManage, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | d61094eacb46cfbaa87f95dadb10870dc0b61d1d4b6cee43e41be799dc7b121d
Secunia Security Advisory 39835
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | hpux
SHA-256 | 933653684d10889923f97a17404e4c9cb27ed2958d6603d48806d9617b130893
B-Hind CMS Remote File Upload
Posted May 19, 2010
Authored by h00die

B-Hind CMS suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 97ed6c0cf971ffd8874955c3bae801f0b8abdec48bef8aefbbae98eba7c9bd3c
Fortitude HTTP 1.0.1.6 Denial Of Service
Posted May 19, 2010
Authored by AutoSec Tools

Fortitude HTTP version 1.0.1.6 remote denial of service exploit.

tags | exploit, remote, web, denial of service
SHA-256 | 8a507b77c752cc83f7b3f71f892d4a3fbee10ce5212658dc045d1c1f9f9edf95
DataTrack System 3.5 Cross Site Scripting
Posted May 19, 2010
Authored by AutoSec Tools

DataTrack System version 3.5 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b26e431c41faa90e692db047d4babce4e4f22b4a3f9015b26d0c293b9a73e8f9
Webloader 7 / 8 SQL Injection
Posted May 19, 2010
Authored by ByEge

Webloader version 7 and 8 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5eeadd6b2f607177bc3128d697032fdf9d0711541953b3e23ed997eae72a6d1c
HP Security Bulletin HPSBMA02534 SSRT090180
Posted May 19, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP System Management

tags | advisory, vulnerability
advisories | CVE-2009-3555
SHA-256 | 57b58afca6b833214fff0eba151eaca14aefb11c59d785093f3f8e150ff9bae7
WebJaxe 1.01 SQL Injection
Posted May 19, 2010
Authored by IHTeam

WebJaxe version 1.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | baf76c8040676580965fd4bafce665fcdeb81996c205eb23fb1738f37dde0430
ChillyCMS Blind SQL Injection
Posted May 19, 2010
Authored by IHTeam

ChillyCMS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 980b85d1f7afe339d2817dd89e7104b182c21a62aeb259f2c75e6d8082c63503
TS Special Edition 7.0 Disclosure
Posted May 19, 2010
Authored by IHTeam

TS Special Edition versions 7.0 and below suffer from multiple disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | a8f644205955ebcb8f55e9fd34e72fb520b99c78fdc7c8ba13630a092451e3ab
Linux/x86 execve("/usr/bin/wget","aaaa"); Shellcode
Posted May 19, 2010
Authored by Jonathan Salwan | Site shell-storm.org

42 bytes small Linux/x86 execve("/usr/bin/wget","aaaa"); shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 4f28ade719844d3175c926a102509862dcf892f296efb022e1caddea183500d6
Hashkill 0.2.0
Posted May 19, 2010
Authored by gat3way | Site gat3way.eu

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 3 attack methods (dictionary, bruteforce, hybrid) and has 16 plugins for different types of hashes (md5, sha1, phpbb3, mysql, md5 (unix), des(unix), sha(unix), vbulletin, smf, etc). It is multithreaded and supports session save/restore.

tags | cracker
systems | linux, unix
SHA-256 | 882a5f6502a84fee46fd70955c408f0c583fa9627f49ef7df8ba913764abf3fc
Debian Linux Security Advisory 2038-2
Posted May 19, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2038-2 - The packages for Pidgin released as DSA 2038-1 had a regression, as they unintentionally disabled the Zephyr instant messaging protocol. This update restores Zephyr functionality.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2010-0420, CVE-2010-0423
SHA-256 | 8844b20d4a2a86a5a509370b6538ede44062796995993449ec93b7d1753b774a
Apple 10.6.3 chpass BSD Insecure Temp File Creating In /etc
Posted May 19, 2010
Authored by prdelka | Site prdelka.blackart.org.uk

Apple Mac OS X versions 10.6.3 and below suffer from a chpass BSD insecure temp file creation in /etc vulnerability. A user can create a file with rw perms in /etc as owner and populate it with arbitrary data. This could be utilized to fill the disk or write configuration file information that could be combined with another flaw to elevate local privileges.

tags | exploit, arbitrary, local
systems | bsd, apple, osx
SHA-256 | 7612d1322811886943d0e1ba838ed0c5d2209c568bc240a49eeb336f0af2080c
Joomla Event SQL Injection
Posted May 19, 2010

The Joomla Event component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7cdc2b00c9df9b41f2861c625b7e0904956dffbe726b6312d9e12a203909245d
Caucho Resin Web Server 3.1.2 Cross Site Scripting
Posted May 19, 2010
Authored by flyh4t

Caucho Resin Web Server version 3.1.2 admin login digest_username and digest_realm suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 6d42bedf7be5c06abf88b0b274e6db3a90c034907170162e85a05c49e62a9a77
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close