what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2010-10-27 to 2010-10-28

Secunia Security Advisory 42000
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP Insight Control, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting and cross-site request forgery attacks, cause a DoS (Denial of Service), and bypass certain security restrictions.

tags | advisory, denial of service, vulnerability, xss, csrf
SHA-256 | 6d6c98d82f95c252d76d14cb832297c4c4114a7c9e16c6524f45db629738b55b
Secunia Security Advisory 41956
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in CometBird, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing attacks, bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability, xss
SHA-256 | fb97f1a7581962f3c6ea880236b748012fb89be3d6815623304db70fce9bf787
Secunia Security Advisory 41983
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Operations Orchestration, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0cd27a9ee0e29a124608864d1e94ffd66933d70cb7a11f36dccd5fa4cf844e40
Secunia Security Advisory 41998
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Version Control Repository Manager, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4e013df8dde82eca3025a10bcec78cd07f1eb4a1345fcc26348c5038e5633a1a
Secunia Security Advisory 41993
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere MQ, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 8389aee87b1001b6b7f68dfeba5d5800dfd3c490c5fc661c130189892ab6e6c7
Secunia Security Advisory 41957
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5e2feaddf7d92a216e11b695c5f49c65ac76219813c408e01f87a53536ab35c7
Secunia Security Advisory 41999
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Insight Dynamics - VSE, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 21b7a020ca8277e47c3217735d5085521357cce656d49d00da4231af0a1b7e4d
Secunia Security Advisory 41953
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in various Fujitsu Interstage products, which can be exploited by malicious people to compromise a vulnerable system

tags | advisory, vulnerability
SHA-256 | 0b723c43f3899b5a9d9a3f164f7f32e85c4342daab09c990227c674c982349b6
Secunia Security Advisory 41963
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in DZCP, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 4600d6f380c15fb374d0377b6260b898c6cc4e25be18e1149cb0e1b84a5a9b67
Secunia Security Advisory 41959
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Symantec IM Manager, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 2127465906a978252c58dc4dfe5db17b2b2c8eb20cb0c073a33ebb2539b28339
Secunia Security Advisory 41933
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in NinkoBB, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 9ab1d8eda2844f59b420bbf3e8decea1642e2c84ebde7d5bc3610c4c54656e69
Secunia Security Advisory 41973
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported a vulnerability in Energine, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 07e30d19759087706b29c72641d4dde2451e44b70c4bce69dc0dc86d909d6d09
Secunia Security Advisory 41938
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in mpg123, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ea9f1d6eea58c2a974f077fd1e3cb32a28dfb0ab4d390f8553fd7b19d6d06953
Secunia Security Advisory 41977
Posted Oct 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been discovered in Apple iPhone OS, which can be exploited by malicious people with physical access to the device to bypass certain security features.

tags | advisory
systems | apple, iphone
SHA-256 | 0333deed79b4c9b2050add90a1b31cd3f875b3e569e02f417045149f7ca6204b
Clam AntiVirus Toolkit 0.96.4
Posted Oct 27, 2010
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: This is a bugfix release recommended for all users.
tags | virus
systems | unix
SHA-256 | 6ead46f6a1115f02ed14a1190a64e20d3360ef267e1aa77ede44d03c3d70ebae
HP Security Bulletin HPSBMA02597 SSRT100198
Posted Oct 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02597 SSRT100198 - A potential security vulnerability has been identified in HP Version Control Repository Manager (VCRM) for Windows. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). Revision 1 of this advisory.

tags | advisory, xss
systems | windows
advisories | CVE-2010-3994
SHA-256 | ab5dbe2f198cd43db3259b00a581d7633d5ea02461cc3d05e65ec5688dae0cd9
HP Security Bulletin HPSBMA02603 SSRT100319
Posted Oct 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02603 SSRT100319 - Potential security vulnerabilities have been identified in HP Insight Control Power Management for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS) or cross site request forgery (CSRF). Revision 1 of this advisory.

tags | advisory, vulnerability, xss, csrf
systems | windows
advisories | CVE-2010-4023, CVE-2010-4024
SHA-256 | 8b8d41a19ccc438a37085c6e9a7999abdc2976a4a3a022a57d8ca80e77cf88a9
14H28.com LES PACKS SQL Injection
Posted Oct 27, 2010
Authored by Cru3l.b0y

14H28.com LES PACKS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3a4e357884b1ab1a9157d573039a3810fa8b38f6810124c642ad8ea7db3ae4cd
Bigace 2.7.3 Cross Site Request Forgery
Posted Oct 27, 2010
Authored by Sweet

Bigace version 2.7.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 0aaeaa40222ddce3eecf56595dfc4f0b7ea7547f48deb7ebfeffb94374c65a28
HP Security Bulletin HPSBMA02601 SSRT100316
Posted Oct 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02601 SSRT100316 - Potential security vulnerabilities have been identified in HP Insight Control Server Migration for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS), privilege escalation, or unauthorized access. Revision 1 of this advisory.

tags | advisory, vulnerability, xss
systems | windows
advisories | CVE-2010-3991, CVE-2010-3992, CVE-2010-3993
SHA-256 | 3c39cc74fa381e4deaa326d9e6d67ab4d02f9af14533180f1eeac5f710c70522
Joomla Projects Local File Inclusion / SQL Injection
Posted Oct 27, 2010
Authored by jos_ali_joe

The Joomla Projects component suffers from local file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | f53c54d2bc0815983b63bcb8e7f5fc2941dfe90b05adb7dbdd782551d8d4290b
aidSQL SQL Injection Detection And Exploitation Tool 10262010
Posted Oct 27, 2010
Authored by Federico Stange | Site code.google.com

aidSQL SQL injection detection and exploitation tool is a modular PHP scanner that allows you to develop your own plugins for use.

tags | tool, scanner, php, sql injection
systems | unix
SHA-256 | bc0d80a86a9635ed3843b30483350b08c6f20ece6d815dc61ff1240502ffd601
HP Security Bulletin HPSBMA02599 SSRT100235
Posted Oct 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02599 SSRT100235 - A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to download arbitrary files. Revision 1 of this advisory.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2010-3990
SHA-256 | 595446773f62f20c8d6bcd7f9d544b2be2fd7b0cec12fef8cfb858b9ac3663c0
HP Security Bulletin HPSBMA02598 SSRT100314
Posted Oct 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02598 SSRT100314 - Potential security vulnerabilities have been identified in HP Insight Control virtual machine management for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS), privilege escalation, or cross site request forgery (CSRF). Revision 1 of this advisory.

tags | advisory, vulnerability, xss, csrf
systems | windows
advisories | CVE-2010-3987, CVE-2010-3988, CVE-2010-3989
SHA-256 | 626e7dff76b67c7403d94d4de923c9fe6b7c1b8fe82d829302e68bf8337b377c
HP Security Bulletin HPSBGN02333 SSRT080031 2
Posted Oct 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBGN02333 SSRT080031 2 - A potential vulnerability has been identified with the HPeDiag ActiveX control which is a component of HP Software Update running under windows. The vulnerability could be exploited to allow remote disclosure of information and execution of arbitrary code. Revision 2 of this advisory.

tags | advisory, remote, arbitrary, activex
systems | windows
advisories | CVE-2008-0712
SHA-256 | c10efe8f519872773f54d617961b2d62434002f28bd5ff2ca52fc80f962bd272
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close