what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2012-02-18 to 2012-02-19

Threat Modeling Cloud Applications
Posted Feb 18, 2012
Authored by Scott Matsumoto | Site cigital.com

These are the presentation slides from a talk called Threat Modeling Cloud Applications: What You Don't Know Will Hurt You as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | ca7ed7c83b5ae0d31004acf587fa92652ec54e92efce0b74f1135654c8dcb0a8
Behavioral Security Modeling
Posted Feb 18, 2012
Authored by John Benninghoff | Site transvasive.com

These are the presentation slides from a talk called Behavioral Security Modeling: Eliminating Vulnerabilities by Building Predictable Systems as presented at the OWASP AppSec USA 2011 conference.

tags | paper, vulnerability
SHA-256 | e197238567599d0b75f2ed394737152a01c303a4b7cb4c4281a3400ab62c8ee8
Trustwave Global Security Report
Posted Feb 18, 2012
Authored by Charles Henderson | Site trustwave.com

These slides are from the Trustwave Global Security Report as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | 5ab47429503233cf331568f72c8c9012c6a1f774e9d2d77647e5d1519521f3bc
Ghosts Of XSS Past, Present, And Future
Posted Feb 18, 2012
Authored by Jim Manico

These are the slides from the Ghost of XSS Past, Present, and Future presentation given at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | 0b66340464b5fd19fc7f01d69d5ed582aa6417b0228f67241d9cd66f22e37f7c
Web Application Security Payloads
Posted Feb 18, 2012
Authored by Andres Riancho

These are the slides from the Web Application Security Payloads presentation given at the OWASP AppSec USA 2011 conference.

tags | paper, web
SHA-256 | 96859936ed7fb62fae34893a18ab9599f745d4ee65739eebcab392b9321c6777
Endian UTM Firewall 2.4.x Cross Site Scripting
Posted Feb 18, 2012
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

Endian UTM Firewall version 2.4.x suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2b5c8c7d2d61673edc12f2f3c563cd150550ebabf2d739ff844f94b505eb0fdf
Joomla Xcomp Local File Inclusion
Posted Feb 18, 2012
Authored by KedAns-Dz

The Joomla Xcomp component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | cd1de8eea256d03c454e980399eb3314f2b099fd3ff8b51f4574ff1088120184
1337 Multiple CMS Scanner Online
Posted Feb 18, 2012
Authored by KedAns-Dz

This tool is a php script that assists in finding vulnerable components in multiple CMS systems.

tags | tool, scanner, php
systems | unix
SHA-256 | 4d2492d8c0103eb62eed2ed37137e6e97badf00162448c9f8015bfeea67e820e
Joomla X-Shop SQL Injection
Posted Feb 18, 2012
Authored by KedAns-Dz

The Joomla X-Shop component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2a1da2cb26bbc9872537f3fcc9e301d5065173529e8cc82639b4990c4e7ae4ba
Rocketwebco SQL Injection
Posted Feb 18, 2012
Authored by Am!r | Site irist.ir

Rocketwebco suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b613704db62597713098ec961ed4711c009bbfe5e3941917b7416ca915dcba57
Abbott Web Experts SQL Injection
Posted Feb 18, 2012
Authored by Am!r | Site irist.ir

Abbott Web Experts suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 298f5ba26e0615469e8da23938fdddca85a62bb590240905b31865af34d139a1
Joomla XVS Local File Inclusion
Posted Feb 18, 2012
Authored by KedAns-Dz

The Joomla XVS component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 83568394e1e0d7765b6bb3a1a88a20af2661418d31092da6211c6739a9693a83
360-FAAR Firewall Analysis Audit And Repair 0.1.3
Posted Feb 18, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: Better bldobj mode and notes and zone mappings sorted in netscreen out, and groups translated. Service groups translated and odumper service group field spelling corrected.
tags | tool, perl
systems | unix
SHA-256 | 17778d746c8d1ca367879a5888a937c7c262af8d555199cc569f432cf3a5fdc4
Wiki Spot Cross Site Scripting
Posted Feb 18, 2012
Authored by Sony

Wiki Spot suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4d2b2779ee8292f917098041a48c19cf8e54bd1d6439bb1e92a49ed8615e3b03
Secunia Security Advisory 48078
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
systems | linux, ubuntu
SHA-256 | 5ec9a42f2ba5def5c4f2c3fc4a64992370ad674d06ff5d050cacd113a77d4eb1
Secunia Security Advisory 48085
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for jetty5. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
SHA-256 | b2433723b92548a1ad622a1ad839dcf0ee77af6a195d821e5499ed085a7a4a2f
Secunia Security Advisory 47922
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dell SecureWorks has reported a vulnerability in Cisco IronPort Encryption Appliance, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | cisco
SHA-256 | d5ed499f5d4dbd3bd82fa2a8e35b386b06abb9d43aaff44a2e6cd07ae084694e
Secunia Security Advisory 48073
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-sun. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 207002ae2f81cb07d5396140254807f1d74fb121b4e5c54a9df3c34baf8dbf48
Secunia Security Advisory 48042
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for texlive. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 1594326abb7ae56ebbc6e46a7551c731b6237aee6083400d27347c8cad1feabf
Secunia Security Advisory 48001
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in TeX Live, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | db0713ce237c4422d7a2b6a7fba68a04b7464b4c2264c1c7b5766503429f0cc7
Secunia Security Advisory 48086
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Roger Wemyss has reported a vulnerability in SecureSphere Web Application Firewall, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, web
SHA-256 | 8a96b8510c71baa060bfcb866ee2509dfb771e7c58c13ba040e6fd1b2743af30
Secunia Security Advisory 48002
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in TeX Live, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | b9d4d85b30893bedc619490def724d895be5bf537465e850dffeaa42939c4673
Secunia Security Advisory 48080
Posted Feb 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for apache2. This fixes two weaknesses and some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and gain escalated privileges and by malicious people to bypass certain security restrictions, disclose potentially sensitive information, and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | 5cf9e3e76f42fed9e07a54fb876955180d8359013ee7ff7d6dc2e5d22fac09d0
SQL Buddy 1.3.3 Cross Site Scripting
Posted Feb 18, 2012
Authored by LiquidWorm | Site zeroscience.mk

SQL Buddy version 1.3.3 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6c5be0f0aa68bcc647b19be562e63c84f28743bf3a61b5fd2087caee57e029b5
Webgrind 1.0 Cross Site Scripting
Posted Feb 18, 2012
Authored by LiquidWorm | Site zeroscience.mk

Webgrind version 1.0 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 00f639df58ba9d61fae513dead87ec2a62f2cdd0588a69395d8e74e4294a8e2c
Page 1 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close