what you don't know can hurt you
Showing 51 - 75 of 1,000 RSS Feed

Files Date: 2010-09-01 to 2010-09-30

Secunia Security Advisory 41613
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Abhishek Lyall has discovered a vulnerability in Digital Music Pad, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4fd2af44a1289cdb9e529b491f297becebbb8dfe35a0752b61cba7dac926b925
Secunia Security Advisory 41553
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alejandro Ramos has reported some vulnerabilities in Open Text ECM, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | e3f10824e31607bb96e27d4eb1057ca316eee299217f6555de7dd4b24e903e02
Secunia Security Advisory 41608
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in PBBoard, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system, and by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 983a5fb163b4f995cf10849d226163e611b327238044e0d7177a34cb156f8901
Secunia Security Advisory 41617
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pablo G. Milano has discovered some vulnerabilities in Achievo, which can be exploited by malicious users to bypass certain security restrictions and malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | 7cad9ec5d22ded09c191c305f885d291fcc3c75c28cb6fad8d7b3b91c8138704
Secunia Security Advisory 41487
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Synology DiskStation Manager, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 21b2d4ee7647daaa7ffcab8091db5907a73f5fd8ed599d31be04d37007271f99
Secunia Security Advisory 41610
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in iWorkstation, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ea86201f4f140937c4da22597b16d5427a362a5624f7889e31209ea5361c6cbf
Secunia Security Advisory 41634
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in iBrowser, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 990cc5608ac9eb62dfd0318fcc6f6c94e76fc6342a411b05a6ef91cfacdfc08f
Secunia Security Advisory 41623
Posted Sep 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mikmod. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | af9769150268514d53de954cabcfe2bbce0fa7eab9c717c7cae4d58351831bda
UA-Tester (User-Agent Tester) 1.03
Posted Sep 28, 2010
Authored by Chris John Riley | Site blog.c22.cc

UA-Tester (User-Agent Tester) is a Python script that enables penetration testers to compare response headers from a remote server based on a list of User-Agent strings. The script allows testers to isolate differences in response depending on the browser used to access a site. This can be important as a growing number of sites are catering for mobile devices by forwarding them to alternative (browser friendly) pages, or redirecting them to alternative servers entirely.

tags | tool, remote, scanner, python
systems | unix
SHA-256 | 254676c67c7b522e642828ca8d076b317ca9957f162215e6ad765c0984d8c67c
e107 0.7.23 SQL Injection
Posted Sep 28, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

e107 version 0.7.23 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 828584f023f7a32cf3f7faae0c121d08bd38fc282cef540e2b99bfc7931cf160
Digital Music Pad 8.2.3.3.4 SEH Overflow
Posted Sep 28, 2010
Authored by Abhishek Lyall | Site metasploit.com

This Metasploit module exploits a buffer overflow in Digital Music Pad version 8.2.3.3.4. When opening a malicious pls file with the Digital Music Pad, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
SHA-256 | c83e3567292eff21aaad95afae42e3f474e2698dbe7d9a97597f09520029f64d
iWorkstation 9.3.2.1.4 SEH Overwrite
Posted Sep 28, 2010
Authored by Sanjeev Gupta

iWorkstation version 9.3.2.1.4 SEH overwrite exploit that creates a malicious .pls file.

tags | exploit
SHA-256 | 79e8b2364e81cf685b98735b3c18b202f945db70473830463f19ac0d2266464e
Entrans 0.3.2 Cross Site Scripting / SQL Injection
Posted Sep 28, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Entrans version 0.3.2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 9325d9436734ba7ef95dc7053c9ee045619e9c7633f767d7d26519089b50cabc
How To Protect Against DDoS Attacks
Posted Sep 28, 2010
Authored by Keksa | Site keksa.de

This is a whitepaper describing techniques and defenses to mitigate against distributed denial of service attacks. Written in German.

tags | paper, denial of service
SHA-256 | 628cf7ac41714d7de968568da3a07601a4d05dbbadbe6afe7d1a3d44c50da97c
Horde IMP 4.3.7 Cross Site Scripting
Posted Sep 28, 2010
Authored by Moritz Naumann

Horde IMP versions 4.3.7 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9ff41ba9177770ccbc820350c56510861d2b3872483ac859fa61a08f09314f64
Debian Linux Security Advisory 2114-1
Posted Sep 28, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2114-1 - The Debian stable point release 5.0.6 included updated packages of the Git revision control system in order to fix a security issue. Unfortunately, the update introduced a regression which could make it impossible to clone or create git repositories. This upgrade fixes this regression, which is tracked as Debian bug #595728.

tags | advisory
systems | linux, debian
advisories | CVE-2010-2542
SHA-256 | d5a562c5b0446b7ebdb0c4377c6a37f6a81cb3a7335ed9b473a406bf9aad3c2f
Car Portal 2.0 Blind SQL Injection
Posted Sep 28, 2010
Authored by RoAd_KiLlEr

Car Portal version 2.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 45c3f8330f8815ceae9c016d29eb35a24c3b2f039cb3b8170c5c447be09de562
Download Accelerator Plus DLL Hijacking
Posted Sep 28, 2010
Authored by anT!-Tr0J4n

Download Accelerator Plus DLL hijacking exploit.

tags | exploit
SHA-256 | 5dab7f07bd32161aaf2a87bb46760fda3fedc77c70377ed90ab002ed2fe947e6
Barracuda Networks Spam And Virus Firewall Configuration Retrieval
Posted Sep 28, 2010
Authored by ShadowHatesYou

Barracuda Networks Spam and Virus Firewall versions 4.1.1.021 and below remote configuration retrieval exploit.

tags | exploit, remote, virus
SHA-256 | 165ba97992e737fdb6fac9ce7c4bbf11e171a5ef6e1c4b1cdecc39389d32668d
Allpc 2.5 osCommerce Cross Site Scripting / SQL Injection
Posted Sep 28, 2010
Authored by RoAd_KiLlEr

Allpc version 2.5 osCommerce suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | be1cfff787ccfb93678910bb184d5d331a80a512fa0ace5d6ab52ab5103b6ab5
Gokhun ASP Stok 1.0 Cross Site Scripting / Database Disclosure / SQL Injection
Posted Sep 28, 2010
Authored by KnocKout

Gokhun ASP Stok version 1.0 suffers from cross site scripting, database disclosure and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, asp, info disclosure
SHA-256 | 0b014afa3ef07cc31255993d7a1d5155b464647b8e0481250366eda1b4edb3eb
Fox Audio Player 0.8.0 Denial Of Service
Posted Sep 28, 2010
Authored by 4n0nym0us

Fox Audio Player version 0.8.0 denial of service exploit that creates a malicious .m3u file.

tags | exploit, denial of service
SHA-256 | ccc14d72c8a51628fb9d768b5fe292234ac97bb8d8a4b8f1c383d6e92bcf232e
Month Of Abysssec Undisclosed Bugs - Microsoft Internet Explorer
Posted Sep 28, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Microsoft Internet Explorer suffers from a MSHTML Findtext processing issue.

tags | advisory
SHA-256 | cd2db4facf91ac2f9da02446010e8d0b786f4bd6d1515f92f509060d41aec1ce
Month Of Abysssec Undisclosed Bugs - Microsoft Internet Explorer
Posted Sep 28, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Microsoft Internet Explorer suffers from a MSHTML Findtext processing issue.

tags | exploit
SHA-256 | 82c4002637ecaabe051b8f65865135bd49c78c27e7c11535ae9e6abef23f1062
Month Of Abysssec Undisclosed Bugs - Nickel And Dime CMS 0.4rc1
Posted Sep 28, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - ndCMS (Nickel and Dime CMS) version 0.4rc1 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | a72c0a1982360127ee903348d0b8938bd690f456683ad6bf873f3abd445cf537
Page 3 of 40
Back12345Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close