what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2012-02-18 to 2012-02-19

Threat Modeling Cloud Applications
Posted Feb 18, 2012
Authored by Scott Matsumoto | Site cigital.com

These are the presentation slides from a talk called Threat Modeling Cloud Applications: What You Don't Know Will Hurt You as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | ca7ed7c83b5ae0d31004acf587fa92652ec54e92efce0b74f1135654c8dcb0a8
Behavioral Security Modeling
Posted Feb 18, 2012
Authored by John Benninghoff | Site transvasive.com

These are the presentation slides from a talk called Behavioral Security Modeling: Eliminating Vulnerabilities by Building Predictable Systems as presented at the OWASP AppSec USA 2011 conference.

tags | paper, vulnerability
SHA-256 | e197238567599d0b75f2ed394737152a01c303a4b7cb4c4281a3400ab62c8ee8
Trustwave Global Security Report
Posted Feb 18, 2012
Authored by Charles Henderson | Site trustwave.com

These slides are from the Trustwave Global Security Report as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | 5ab47429503233cf331568f72c8c9012c6a1f774e9d2d77647e5d1519521f3bc
Ghosts Of XSS Past, Present, And Future
Posted Feb 18, 2012
Authored by Jim Manico

These are the slides from the Ghost of XSS Past, Present, and Future presentation given at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | 0b66340464b5fd19fc7f01d69d5ed582aa6417b0228f67241d9cd66f22e37f7c
Web Application Security Payloads
Posted Feb 18, 2012
Authored by Andres Riancho

These are the slides from the Web Application Security Payloads presentation given at the OWASP AppSec USA 2011 conference.

tags | paper, web
SHA-256 | 96859936ed7fb62fae34893a18ab9599f745d4ee65739eebcab392b9321c6777
Endian UTM Firewall 2.4.x Cross Site Scripting
Posted Feb 18, 2012
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

Endian UTM Firewall version 2.4.x suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2b5c8c7d2d61673edc12f2f3c563cd150550ebabf2d739ff844f94b505eb0fdf
Joomla Xcomp Local File Inclusion
Posted Feb 18, 2012
Authored by KedAns-Dz

The Joomla Xcomp component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | cd1de8eea256d03c454e980399eb3314f2b099fd3ff8b51f4574ff1088120184
1337 Multiple CMS Scanner Online
Posted Feb 18, 2012
Authored by KedAns-Dz

This tool is a php script that assists in finding vulnerable components in multiple CMS systems.

tags | tool, scanner, php
systems | unix
SHA-256 | 4d2492d8c0103eb62eed2ed37137e6e97badf00162448c9f8015bfeea67e820e
Joomla X-Shop SQL Injection
Posted Feb 18, 2012
Authored by KedAns-Dz

The Joomla X-Shop component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2a1da2cb26bbc9872537f3fcc9e301d5065173529e8cc82639b4990c4e7ae4ba
Rocketwebco SQL Injection
Posted Feb 18, 2012
Authored by Am!r | Site irist.ir

Rocketwebco suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b613704db62597713098ec961ed4711c009bbfe5e3941917b7416ca915dcba57
Abbott Web Experts SQL Injection
Posted Feb 18, 2012
Authored by Am!r | Site irist.ir

Abbott Web Experts suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 298f5ba26e0615469e8da23938fdddca85a62bb590240905b31865af34d139a1
Joomla XVS Local File Inclusion
Posted Feb 18, 2012
Authored by KedAns-Dz

The Joomla XVS component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 83568394e1e0d7765b6bb3a1a88a20af2661418d31092da6211c6739a9693a83
360-FAAR Firewall Analysis Audit And Repair 0.1.3
Posted Feb 18, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: Better bldobj mode and notes and zone mappings sorted in netscreen out, and groups translated. Service groups translated and odumper service group field spelling corrected.
tags | tool, perl
systems | unix
SHA-256 | 17778d746c8d1ca367879a5888a937c7c262af8d555199cc569f432cf3a5fdc4
Wiki Spot Cross Site Scripting
Posted Feb 18, 2012
Authored by Sony

Wiki Spot suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4d2b2779ee8292f917098041a48c19cf8e54bd1d6439bb1e92a49ed8615e3b03
Secunia Security Advisory 48078
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
systems | linux, ubuntu
SHA-256 | 5ec9a42f2ba5def5c4f2c3fc4a64992370ad674d06ff5d050cacd113a77d4eb1
Secunia Security Advisory 48085
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for jetty5. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
SHA-256 | b2433723b92548a1ad622a1ad839dcf0ee77af6a195d821e5499ed085a7a4a2f
Secunia Security Advisory 47922
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dell SecureWorks has reported a vulnerability in Cisco IronPort Encryption Appliance, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | cisco
SHA-256 | d5ed499f5d4dbd3bd82fa2a8e35b386b06abb9d43aaff44a2e6cd07ae084694e
Secunia Security Advisory 48073
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-sun. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 207002ae2f81cb07d5396140254807f1d74fb121b4e5c54a9df3c34baf8dbf48
Secunia Security Advisory 48042
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for texlive. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 1594326abb7ae56ebbc6e46a7551c731b6237aee6083400d27347c8cad1feabf
Secunia Security Advisory 48001
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in TeX Live, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | db0713ce237c4422d7a2b6a7fba68a04b7464b4c2264c1c7b5766503429f0cc7
Secunia Security Advisory 48086
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Roger Wemyss has reported a vulnerability in SecureSphere Web Application Firewall, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, web
SHA-256 | 8a96b8510c71baa060bfcb866ee2509dfb771e7c58c13ba040e6fd1b2743af30
Secunia Security Advisory 48002
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in TeX Live, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | b9d4d85b30893bedc619490def724d895be5bf537465e850dffeaa42939c4673
Secunia Security Advisory 48080
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for apache2. This fixes two weaknesses and some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and gain escalated privileges and by malicious people to bypass certain security restrictions, disclose potentially sensitive information, and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | 5cf9e3e76f42fed9e07a54fb876955180d8359013ee7ff7d6dc2e5d22fac09d0
SQL Buddy 1.3.3 Cross Site Scripting
Posted Feb 18, 2012
Authored by LiquidWorm | Site zeroscience.mk

SQL Buddy version 1.3.3 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6c5be0f0aa68bcc647b19be562e63c84f28743bf3a61b5fd2087caee57e029b5
Webgrind 1.0 Cross Site Scripting
Posted Feb 18, 2012
Authored by LiquidWorm | Site zeroscience.mk

Webgrind version 1.0 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 00f639df58ba9d61fae513dead87ec2a62f2cdd0588a69395d8e74e4294a8e2c
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close