exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 911 RSS Feed

Files Date: 2010-11-01 to 2010-11-30

Secunia Security Advisory 42387
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Jurpopage, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | cbcad6d05529f38f485963c504180ed2d42791daa51d5edef621d01a145c59c4
Secunia Security Advisory 42404
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Solaris and OpenSolaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | solaris
SHA-256 | 5d0398ab2bfa6047dd2ecd3e129ca40c91e6e33161bfe77b2bb6d2830ea1297d
Secunia Security Advisory 42403
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Solaris and OpenSolaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
SHA-256 | cf70ad943f0876168f16fd2e8805b6ccae7f68e6cbda9c8cf2931ab47f5f0880
Secunia Security Advisory 42393
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in collectd, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 4141ef45279058179546b33835de0998fa20d754c675241101eefd870a45e8f2
Secunia Security Advisory 41482
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in McAfee VirusScan Enterprise, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1794870421cefb5e9c3193fe41edb66ae29cbac37ed10e2f5cfa0a83c69d42e9
FloppyFW Router/Firewall On A Disc 3.0.14
Posted Nov 28, 2010
Authored by Thomas Lundquist | Site zelow.no

Floppyfw is a router and firewall in one image. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy. This is the iso version.

Changes: VLAN support and better DMZ support. The latest 2.4 kernel.
tags | tool, firewall
systems | linux
SHA-256 | b7142e9a63474752a6984ebdad22fc58cd0680114f5119ae4d49fd6452cb83df
CA Internet Security Suite 2010 KmxSbx.sys Kernel Pool Overflow
Posted Nov 28, 2010
Authored by Nikita Tarakanov

CA Internet Security Suite 2010 KmxSbx.sys kernel pool overflow exploit.

tags | exploit, overflow, kernel
systems | linux
SHA-256 | 45cfd15c0d06529b52ab386688566f0e8278373a75d9c5eb2be383fe50071a20
Site2Nite Big Truck Broker SQL Injection
Posted Nov 28, 2010
Authored by Underground Stockholm | Site underground-stockholm.com

Site2Nite Big Truck Broker suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 305617eed1cdd5c15b4bcdc1771216ab35536e8d1410f4cdd95ab1991e92c326
Hanso Player 1.4.0 Denial Of Service
Posted Nov 28, 2010
Authored by anT!-Tr0J4n

Hanso Player version 1.4.0 denial of service exploit that creates a malicious .m3u file.

tags | exploit, denial of service
SHA-256 | e7897eae7f4113c7acd79071cebf91fc0e7cb7cdf2cb632dd38b105b54a1631c
MD5 Decrypter PHP Script
Posted Nov 28, 2010
Authored by Bob Smith

This is a simple php script that takes a set of MD5 sums and checks them against md5-decrypter.com and md5decryption.com.

tags | encryption, php
SHA-256 | 7357299298193cb34d03faec7fb2a8d6f64eadd69933f494f1a98e70606e3a9d
Joomla Contact Missing CAPTCHA
Posted Nov 28, 2010
Authored by MustLive

The Joomla Contact component does not use a CAPTCHA on the contact page and allows arbitrary spamming.

tags | advisory, arbitrary
SHA-256 | c46dbcd32ecb0e08ab6ddc360405b65cc96548369e17eb9e6510cfd89f18ead1
Joomla Competitions SQL Injection
Posted Nov 27, 2010
Authored by XroGuE

The Joomla Competitions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 30901c8cfdffe01be58d376462e1efec3a1ee4e52fff12adef6d4cd9aa8daf80
Joomla Jeajaxeventcalendar Blind SQL Injection
Posted Nov 27, 2010
Authored by XroGuE

The Joomla Jeajaxeventcalendar component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6bc220c736620ed2d543a7c42c9297063fbb4e977b9b4e74156ac96c2e9eabb2
Joomla Jeajaxeventcalendar Local File Inclusion
Posted Nov 27, 2010
Authored by XroGuE

The Joomla Jeajaxeventcalendar component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | def823bcca0ed66d7edfe1a603a0ed529c32576b6793cb2c739a4e54986ae907
Skeletonz CMS Cross Site Scripting
Posted Nov 27, 2010
Authored by Jbyte

Skeletonz CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7b0d5972a2141da273a81c260667bdf1646f1f5d6a76bce90aaf952730c82ec0
Joomla Competitions Cross Site Scripting
Posted Nov 27, 2010
Authored by XroGuE

The Joomla Competitions component suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 372f4d308d36ed97a7aa75300b7d563ef2615b6c32662a0111e4c317066d3670
eSyndiCat Directory Software 2.3 Cross Site Scripting
Posted Nov 27, 2010
Authored by d3v1l

eSyndiCat Directory Software version 2.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8b2717c28189ea42188d89f8f06e9f783e9c0cee8b726c0f1302297ccc5824c0
Google Desktop DLL Hijacking
Posted Nov 27, 2010
Authored by APA IUTCERT

Google Desktop suffers from an insecure library loading vulnerability.

tags | advisory
SHA-256 | a0e38694df48ffd32c97c13abf0b424918fa754d5b9be3dae452e848ca6442f0
jQuery Lightweight Rich Text Editor Shell Upload
Posted Nov 27, 2010
Authored by Underground Stockholm | Site underground-stockholm.com

jQuery Lightweight Rich Text Editor version 1.2 suffers from a shell upload vulnerability.

tags | advisory, shell
SHA-256 | 04271654082f91c9a90c0df1853e3b247d5142737c1463f935cb655980dbf67b
4Images 1.7.x SQL Injection
Posted Nov 27, 2010
Authored by ahmed atif

4Images version 1.7.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3e1e5e91c69e622826ad46127e0acfdceb2cdff1a42ffaefa428d8ff993069fb
Joomla Catalogue Local File Inclusion
Posted Nov 27, 2010
Authored by XroGuE

The Joomla Catalogue component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 102fcb3d55b50df86a72bee07adaaa94c76577f09626b30e46335924e946b3dc
Shoutcaststats 0.5 Cross Site Request Forgery
Posted Nov 27, 2010
Authored by anT!-Tr0J4n

Shoutcaststats suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 1a42a416ba392d6bfc34a87b372ccd9cd03e1df34a3d87d04efdaca725e28108
Frog CMS 0.9.5 Cross Site Request Forgery / Cross Site Scripting
Posted Nov 27, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Frog CMS version 0.9.5 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 84e2ce0b2967c2b4e00ea633898eebc4766f543187caf6c124ba56b2ca04c512
NoScript Cross Site Scripting Via SQL Injection
Posted Nov 27, 2010
Authored by Aditya K Sood

NoScript versions prior to 2.0.5.1 suffer from a reflective cross site scripting vulnerability via SQL injection.

tags | exploit, xss, sql injection
SHA-256 | 53211eb119f27445999f7b2d4d02258857dbf572c53a1603288f91e1b535c5c5
Ubuntu Security Notice USN-1022-1
Posted Nov 27, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1022-1 - It was discovered that APR-util did not properly handle memory when destroying APR buckets. An attacker could exploit this and cause a denial of service via memory exhaustion.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2010-1623
SHA-256 | c1255d7af3e921c0d673f881ad8630e7ab45029bd46a3ea6c371455300377c0f
Page 2 of 37
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close