exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 1,050 RSS Feed

Files Date: 2010-08-01 to 2010-08-31

Secunia Security Advisory 41169
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Seagull PHP Framework, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, php, sql injection
SHA-256 | b8800d4f69133ba765fc4e176e87586dba2768e89c2d76cad40fbcf342299bdb
Secunia Security Advisory 41212
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Microsoft Visual Studio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5ee3d87390f57852d14b0c3d9a8215e7e4b3b2aa91e8c32cbe6705014e05bf99
Secunia Security Advisory 41229
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in CDisplay, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6d5db928c2f0bb22e1e8a77de2d1c7e42ff463de4f45fb4b549cc0e0bdbf3b4e
Secunia Security Advisory 41144
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in SnackAmp Music Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 4dd7a2c34d81e59942f3c556de46a93482a459c9664bd931ab4a1f962df03dd5
Secunia Security Advisory 41051
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in uTorrent, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ee77b64663548523316fb3e216abfbd0ba67b9d1bd908d2a8d1dd5d3ece5716a
Secunia Security Advisory 41087
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | 1e667614960f71b2c9cb595f01cb8603ded2da3257a4f3a364c5e139867ceb6b
Secunia Security Advisory 41099
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for zabbix. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, fedora
SHA-256 | e76c11df9711e8bf72814167a2005c6bb7bfe242094b6a7d46b3cc717fe2bf99
Secunia Security Advisory 41064
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Wireshark, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6e986e5b10ce91182e94b24b3ccdd0f75e38cc96f4d463165ceed1b2a9fa61be
Secunia Security Advisory 41090
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Squid, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 6bcc422dc188d50ef78d612d874cec26f037c80c9c3bc34e02c49760439ad15e
Secunia Security Advisory 41060
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Adobe PhotoShop, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | b75e45afcf6b4c6dd286699166e92f959caf22d04e95fd803cc300afac87f73e
Secunia Security Advisory 40928
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in phpBugTracker, which can be exploited by malicious users to conduct SQL injection attacks and compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | ea5ed6be868abbdf6ccaad7f2cca2ffc2e0306d8a5186bc7a1c80c51a48a8403
Secunia Security Advisory 41126
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Adobe InDesign, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | cfb92ee23d757772e4af5ba4a093b15432e14e3e6a7d6f3ad0c58aab2d14e150
Secunia Security Advisory 41102
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for python-moin. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, python
systems | linux, ubuntu
SHA-256 | 749001b4ebac290575cd6e87157fe3b9de53f659f4c1b8819b5fd66777b7f3e0
Secunia Security Advisory 41165
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for mapserver. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 3ae7d139202740fd625e6b66a5a1feef42565b2cb107ffc303d7de1ab9dc7ef5
Secunia Security Advisory 41114
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | e7653186086dc114f9638a05f0de164b009d36c719e135a53a8def9f2f5cb661
Cisco Security Advisory 20100827-bgp
Posted Aug 28, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the attribute before sending it to the neighboring devices. Neighboring devices that receive this corrupted update may reset the BGP peering session.

tags | advisory, protocol
systems | cisco, osx
SHA-256 | f289418468686904e2e0ad70c7d696956365e73fe3f9d83ba0946ae893e3f353
LEADTOOLS ActiveX Raster Twain 16.5 Buffer Overflow
Posted Aug 28, 2010
Authored by LiquidWorm | Site zeroscience.mk

LEADTOOLS ActiveX Raster Twain version 16.5 remote buffer overflow proof of concept exploit that leverages LtocxTwainu.dll.

tags | exploit, remote, overflow, activex, proof of concept
SHA-256 | d621a52b3e4d10ca46462b146fbbc96a27cb4bda25c731aa2e4ea0fe565e009f
Wiccle 1.00 Cross Site Scripting
Posted Aug 28, 2010
Authored by indoushka

Wiccle version 1.00 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fd3e3923c2b75840215147cced0dcf3e0b625a1fa06262a4c0c9b2e7f7c0f004
Pixie 1.04 Cross Site Scripting
Posted Aug 28, 2010
Authored by indoushka

Pixie version 1.04 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 1c7bf772bd2679c9962e92158fadb76cee55c899649e9165089719a8f71f914a
Multiple Browser Wildcard Cerficate Validation Weakness
Posted Aug 28, 2010
Authored by Richard Moore

It appears that many browsers will gladly accept wildcard certificates for IP addresses versus expecting proper domain names for the CN. This is,.. well, very interesting and violates RFC 2818.

tags | advisory
SHA-256 | 469285a2d833d9b4bcd7b10c8a68f5c5ca09223404f03c1675b62b8780642ca2
iGaming CMS 1.5 SQL Injection
Posted Aug 28, 2010
Authored by Sweet

iGaming CMS version 1.5 suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 35f8762686a86bd9657ab5476f9cd4039a307bb034634886fea1cd604d7d4dc8
Professional Site Immobiliare SQL Injection
Posted Aug 28, 2010
Authored by Locu

Professional Site Immobiliare suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1ef6bcaf9386474e2fd4b53671de31db7030b2bfa208c9f83e83a02c604232db
Mozilla Firefox 3.6.8 Adobe Reader Plugin 9.3.4.218 DLL Hijacking Exploit
Posted Aug 28, 2010
Authored by Rh0

Mozilla Firefox version 3.6.8 with Adobe Reader Plugin version 9.3.4.218 DLL hijacking exploit that leverages CoolType.dll.

tags | exploit
SHA-256 | 99b1038919a894399559f28e22a581cef9029d7635eb4ceea25c27fb6843af9f
Pc4Uploader 9.0 Cross Site Request Forgery
Posted Aug 28, 2010
Authored by RENO

Pc4Uploader version 9.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | b4e148a748154a2c68863fd6735e6d5ec9a20ee739e0b64bedb923ec17ddc5b7
Esvon Classifieds 4.0 Command Execution / Remote File Inclusion
Posted Aug 28, 2010
Authored by Sniper Site Hacker

Esvon Classifieds version 4.0 suffers from remote command execution and remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | ba286c5b90431e63571bc153d6cd5e00797ba1cde81a804da302c50d26e143e2
Page 3 of 42
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close