what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2011-04-21 to 2011-04-22

Secunia Security Advisory 44313
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in SocialCMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | a8a2d3e982eeb08eed9ffdd443186c1db2ceeb3a9c4d1189361e20fb3ff65b72
Secunia Security Advisory 44231
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP System Management Homepage, which can be exploited by malicious users to compromise a vulnerable system and malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 161d72db9f6daccb4d2254f786e9b7f7b69741fc467ba6935dcb96fa9ad5e30e
Secunia Security Advisory 44204
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Atlassian Confluence, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | a9fb4217bb10cd39c2971647d95d049534724dff0af3968445824f242d82721a
Secunia Security Advisory 44227
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Virtual Server Environment, which can be exploited by malicious users to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 038d85f57b955bdc6ab63c19980f5b38bafd79e477850630b9c116f839da78c0
Secunia Security Advisory 44211
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Pragyan CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | fd43f7e2423f38db87c7ab9cd359d9d7da2f6b0b4a557c8d8688f6293942d965
Secunia Security Advisory 44216
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in HP Insight Control Performance Management, which can be exploited by malicious users to potentially compromise a vulnerable system and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | aeb91e2520c1f9327748823aa136c0758e71b642c89fd3d354b5136c2a810ae7
Secunia Security Advisory 44316
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for JBoss Enterprise SOA Platform and JBoss Enterprise Application Platform. This fixes a weakness, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
SHA-256 | cf9655e07123a9cdae5d62236bca7acccfa1a86c486e0cb42180967648470ccc
Secunia Security Advisory 44229
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM DB2, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | 080dc61dbaa8262d3095dfbea15d58f9a04742445ac996ac46bf0291f14b3e95
Secunia Security Advisory 44194
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Atlassian Confluence, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5c84ed2fcb316a097b5c1d01c9dac4fe64ac467074ba6089e1dd3530dd1a388f
Secunia Security Advisory 44275
Posted Apr 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues and two vulnerabilities have been reported in WooThemes Bueno, City Guide, Coffee Break, Daily Edition, Delegate, Fresh News, Headlines, Inspire, Optimize, Over Easy, and The Station ExpressionEngine themes, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 56adfd5fea63167983051b1869f7693780828dcbb7e2a6893b95bf628381f594
OracleJSP Demos Cross Site Scripting
Posted Apr 21, 2011
Authored by Nahuel Grisolia | Site cybsec.com

CYBSEC Security Advisory - OracleJSP Demos suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5bfefcb5481f824b3423f3f289aad12f9df050127d36eb394de6d3da4757b8b7
Oracle JD Edwards EnterpriseOne Cross Site Scripting
Posted Apr 21, 2011
Authored by Juan Manuel Garcia | Site cybsec.com

CYBSEC Security Advisory - Oracle JD Edwards EnterpriseOne suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2011-0836
SHA-256 | 05f55347e4939f432d7d01092337a7d25c54a9e7944c00d9c62b75f158fa4c08
Nic.cl Cross Site Scripting
Posted Apr 21, 2011
Authored by Zerial

NIC Chile suffered from a cross site scripting vulnerability. This was immediately fixed.

tags | exploit, xss
SHA-256 | 18f8576ee42824d07fd5dd1c562751fa1624fa8b6f02a134d03a12705a7086db
SSH2FTPCrack FTP / SSH Brute Forcer 0.2
Posted Apr 21, 2011
Authored by GhOsT-PR

ssh2ftpcrack is a simple FTP and SSH dictionary brute force cracking tool written in Perl.

Changes: Modularized the cracking methods.
tags | cracker, perl
systems | unix
SHA-256 | 32cfdd4217149b746fae688a7362d29d10b8532eb41ca35c4b0d30bab04993b1
Malware Analyser 3.0
Posted Apr 21, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added banking trojan traces and dynamic register analysis. Improved traces signatures. Various other updates.
tags | tool, forensics
SHA-256 | f0441c544a8826462e893ab8a63bb69a28c9d6e665cbbe115dcd76279374aa05
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close