exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 1,165 RSS Feed

Files Date: 2010-06-01 to 2010-06-30

Secunia Security Advisory 40282
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Citrix XenServer, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 5d853100f7c599a153ee4bd143e9e6d14fc0838b9ef0336f6932de514e27f351
Secunia Security Advisory 40404
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Rent vs. Buy Calculator Script, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 9c3d42b10120d2a1707efbf9133d62b0bcb2cd2cd89a1c69566da046ea3381ee
Secunia Security Advisory 40341
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in IBM Rational ClearQuest.

tags | advisory, vulnerability
SHA-256 | 07f0b53261d8722d4dcb60b25790156ba75b2efa01a928f2012f5fdebe42db41
Secunia Security Advisory 40403
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in ARSC Really Simple Chat, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 33d915a86fbe15d7c6ea3656c72308f20bb6b88c9a97770f5d40353d63788679
Secunia Security Advisory 40388
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Kingsoft Office, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 031b9c6c85a0606f5ce2ae9f291e83e7f81de534cf6fca85539ab2512e810424
Secunia Security Advisory 39562
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Russ McRee has discovered a vulnerability in various Snare Agents, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | c0aa9e13d7b014d55f7339157cbbc7bca2bf82dbe350d786dd97a8cc64f06887
Secunia Security Advisory 40387
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in CMSQLite, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 19497f97dfd2dc546a126884824fbb3c4370c93e1567a4d6ed668fd5679e7d72
Secunia Security Advisory 40386
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and a security issue have been reported in 2daybiz E-mail Portal Script which can be exploited by malicious users to conduct SQL injection attacks and manipulate certain data.

tags | advisory, sql injection
SHA-256 | fa3a755f99272b5b8738685e370f25da9861d3972d501accf32ac403ae9de13d
Secunia Security Advisory 40367
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and a security issue have been reported in PageDirector CMS, which can be exploited by malicious people to bypass certain security restrictions and conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1ba2b86075b4396fa14c18cd6dede6fc33f86f68f6e2343e754882ab5334e6ea
Secunia Security Advisory 40402
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MetInfo, which can be exploited by malicious people to conduct cross-site scripting attack.

tags | advisory, xss
SHA-256 | 36f73b06573bd9d254a7366872ca2516eff4a3774e8f2dfb083aa37ce0dd678c
Secunia Security Advisory 40382
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Markot has discovered a vulnerability in various MemDB products, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 5b7aecb78b7a7cb76949fc5b9386d54f056eaa85f74b28ccbaf0d61603da4052
EncFS Encrypted Filesystem 1.6-1
Posted Jun 29, 2010
Authored by Valient Gough | Site arg0.net

EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.

Changes: Support was added for boost 1.42 and 1.43. Modtime is maintained during rename. Fixes were made for gcc 4.x and Mac OS X builds.
tags | kernel, encryption
systems | linux
SHA-256 | bc02036e3fe123742a3a2fb711f3f7000321b5a9b82517e34b6b456f0b8ba04c
How Much House Can I Afford 1.0 Cross Site Scripting
Posted Jun 29, 2010
Authored by Th3 RDX

How Much House Can I Afford version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e7eb2764fcfd078c031607db851387aee40d4999a94ad074754aa393c4efb27e
IFP Group SQL Injection
Posted Jun 29, 2010
Authored by dev!l ghost

IFP Group suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f640fcad4994eb9baf73baf17dc97664f523de9ff02e9a48b609bd6e7983e992
IDA Pro Denial Of Service
Posted Jun 29, 2010
Authored by Jason Geffner | Site ngssoftware.com

IDA Pro versions 3.76 through 5.6 suffer from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 2312ad3fbc5c71eaf35c920665767a7d5c578e7e24370998326a07ac96c04087
Cheats With ELF - Code Injecting Into ELF Headers
Posted Jun 29, 2010
Authored by murderkey | Site tcc.hellcode.net

Whitepaper called Cheats with ELF - Code Injecting into ELF Headers.

tags | paper
SHA-256 | 2737a2b61dd3e9303deffc4c5ed16acb439de026f629f5909b558e4d76f6372b
Rent Vs. Buy Calculator Cross Site Scripting
Posted Jun 29, 2010
Authored by Th3 RDX

Rent vs. Buy Calculator suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | cadd2c90d19669535b6ba4197d50afee1b7fdf6e425b4f01363994f620e8dc44
MetInfo Enterprise WMS Cross Site Scripting
Posted Jun 29, 2010
Authored by Th3 RDX

MetInfo Enterprise WMS suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | e65db3e06fca1816dbce0589cf74daad1e6b82a46fc47316ff323278bcb7e1ec
PTCPay GEN4 SQL Injection
Posted Jun 29, 2010
Authored by Dark.Man

PTCPay GEN4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7df138f59e9dedfa3eab77e4f7c5616a0e80098c9836d8cfd279dc24f772c0e8
iNet Online Community Blind SQL Injection
Posted Jun 29, 2010
Authored by JaMbA

iNet Online Community suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 16c0d553c4df824f411bff8a37f350e48d205191dc1c41662797015df6f6ee09
Debian Linux Security Advisory 2065-1
Posted Jun 29, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2065-1 - Two security issues have been discovered in the DCC protocol support code of kvirc, a KDE-based next generation IRC client, which allow the overwriting of local files through directory traversal and the execution of arbitrary code through a format string attack.

tags | advisory, arbitrary, local, protocol
systems | linux, debian
advisories | CVE-2010-2451, CVE-2010-2452
SHA-256 | ee68d95eff02ceeb8f54b145ee6c8cf081a921614423ada1a899b9b5f962977c
Myspace Clone 2010 Cross Site Scripting / SQL Injection
Posted Jun 29, 2010
Authored by L0rd CrusAd3r

MySpace Clone 2010 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 5f9d495a5dd278639e4c313cf34968629f211bdd9aa7cf5418af06dfc0247069
Swoopo Clone 2010 SQL Injection
Posted Jun 29, 2010
Authored by L0rd CrusAd3r

Swoopo Clone 2010 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | db8b3ea4b5466f9ad6f4b32c6003be954d2ab7ce128aad954c7bedc793b36c84
Clix'N'Cash Clone Script SQL Injection
Posted Jun 29, 2010
Authored by L0rd CrusAd3r

Clix'N'Cash Clone 2010 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b7c8833b1cff44b5923466782d497955266d6ec241bc58c2ec6abb80606fe144
eBay Clone Script 2010 SQL Injection
Posted Jun 29, 2010
Authored by L0rd CrusAd3r

eBay Clone Script 2010 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e8d74ab85958a6702c901d617db60a40a5cb3d4423278fc487fa977c9bcaf03e
Page 2 of 47
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close