what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Video Whisper Conference 1.01 Cross Site Scripting
Posted Aug 8, 2023
Authored by indoushka

Video Whisper Conference version 1.01 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b40ba81d48018c21e4e30b598f994c663576e363ae861549806e4e66a2267a20

Related Files

Hashdays 2012 Call For Papers
Posted Jun 25, 2012
Site hashdays.ch

Hashdays 2012 Call For Papers - Hashdays is an international security technology and research conference offering both trainings/workshops and traditional presentation tracks. The event features many international IT security experts sharing their deep technical knowledge in an open environment and takes place October 31st to November 3rd, 2012 in Lucerne.

tags | paper, conference
SHA-256 | 6e0ac8238a53b8ebe88af5e47d06f685e8e944f0c7bdf03885eef4a921bcec0d
WordPress VideoWhisper Video Conference 4.51 Shell Upload
Posted Jun 12, 2012
Authored by Sammy FORGIT

WordPress VideoWhisper Video Conference plugin version 4.51 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e5f9a1ad6acf756adea2060e21fd61f9a83c06d977aa326984636e5bfaedfcfd
EUSecWest 2012 Call For Papers
Posted Jun 4, 2012
Site eusecwest.com

The seventh annual EUSecWest applied technical security conference - where the eminent figures in the international security industry get together share best practices and technology - will be held in downtown Amsterdam near Leidseplein Square on September 19/20, 2012. The most significant new discoveries about computer network hack attacks and defenses, commercial security solutions, and pragmatic real world security experience will be presented in a series of informative tutorials. This is the Call For Papers.

tags | paper, conference
SHA-256 | 73ac8a41554f9ccb3147b8d66807d54eb71c1fb95d025fa3bfdc12562e584f7b
Security Vulnerabilities Of Digital Video Broadcast Chipsets
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Vulnerabilities of Digital Video Broadcast Chipsets. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper, vulnerability
SHA-256 | b5085e8431fb1a7e2bbeb1de39c969addc0919c9cb22fbe8c72602adfcfcf41b
Security Threats In Digital Satellite Television
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Threats in the World of Digital Satellite Television. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper
SHA-256 | 61103d4ce9bcf58777deab4ee4ff4c33b39828de0f9c1efaefc51fa159e8fffc
Ekoparty 8 Call For Papers
Posted May 27, 2012
Site ekoparty.com.ar

Call For Papers for the 8th edition of the Ekoparty Security Conference being held from September 17th through the 21st, 2012, in Latin America.

tags | paper, conference
SHA-256 | 0e6960c915fe88a3c48c983799dbcf704c4709d8d50d7518ec37e942ecbf9f37
7th ICITST Call For Papers
Posted May 19, 2012
Site icitst.org

The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) Call For Papers has been announced. It will be held December 10th through the 12th, 2012, in London, United Kingdom.

tags | paper, conference
SHA-256 | c791793c87de3a8c911dbcc3147c6c70f0263c3df33aac921b6f65cb2a93c7ad
Hackers 2 Hackers 9 Call For Papers
Posted May 18, 2012
Site h2hc.com.br

The Hackers 2 Hackers Conference (H2HC) 9th edition call for papers has been announced. It is being held in Sao Paulo, Brazil from October 18th through the 23rd, 2012.

tags | paper, conference
SHA-256 | c492a7230258756f220963ea3a248fac8910a3a97fdbd5f340dfd5fc5c789b9d
The Hackers Conference 2012 Call For Papers
Posted May 12, 2012
Site thehackersconference.com

The Hackers Conference 2012 Call For Papers has been announced. It will take place in New Delhi, India on July 29th, 2012.

tags | paper, conference
SHA-256 | 2df905cfab372c60d91883baf18207d362798725de61105f13e35ec782b04499
Breakpoint 2012 Call For Papers
Posted May 10, 2012
Authored by bpx | Site ruxconbreakpoint.com

The Breakpoint 2012 Call For Papers has been announced. It will take place at the Intercontinental Rialto in Melbourne, Australia on October 17th through the 18th, 2012. Breakpoint is organized by the Ruxcon conference team and will offer a specialized and more professional security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint will cater towards security researchers and industry professionals alike, with a focus on cutting edge security research.

tags | paper, conference
SHA-256 | a25e1d3ca8e692e5a312cab2b84061b369bb7f4085db5d4e48d3205efe73846c
Ruxcon 2012 Call For Papers
Posted Apr 19, 2012
Site ruxcon.org.au

Ruxcon 2012 Call For Papers - Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. This year the conference will take place over the weekend of 20th and 21st of October at the CQ Function Centre, Melbourne, Australia.

tags | paper, conference
SHA-256 | 967b14c2cc86eb829ac73a7d5559ae16ecaeaee7a00dda16841f0629ce75679a
OWASP Global AppSec Research (EU) Conference 2012 Call For Papers
Posted Mar 29, 2012
Site easychair.org

In 2012, OWASP is holding its Global AppSec Research (EU) Conference in Athens, Greece! The OWASP AppSec Research conference is a premier gathering for Information Security leaders and researchers. It brings together the application security community to share cutting-edge ideas, initiatives and technology advancements. The Call For Papers is now open.

tags | paper, conference
SHA-256 | b67ff68635b0da527a9389e954b4fa15fc435fa409b274cf649d45bc21db5d36
Secunia Security Advisory 48467
Posted Mar 22, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Public Knowledge Project Open Conference Systems, which can be exploited by by malicious people to conduct cross-site scripting attacks and manipulate certain data.

tags | advisory, vulnerability, xss
SHA-256 | 0259134c173ffd693e56930cf7f0e1da09f21a8063f02c75a4b23d4feb6a76f0
GrrCON 12 Call For Papers
Posted Mar 13, 2012
Site grrcon.org

GrrCON is an information security and hacking conference held annually in the Midwest. This conference was put together to provide the information security community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere. It will take place September 27th through the 28th, 2012 in Grand Rapids, MI, USA.

tags | paper, conference
SHA-256 | c10fc8f54afc04f8551c1bdf5575e9141c59fce332c5fa9a6dd487d0543e2719
Hackademic Call For Papers
Posted Mar 13, 2012
Site hackademic.info

The Hackademic Call For Papers has been announced. Hackademic is a three day security conference that aims to bring together the hacking community and members from the academic community in order to learn from each others successes and failures. Hosted by the IEEE Reliability Society, this innagural event will be held in the Clayton Hall conference facility at the University of Delaware in Newark DE. Everything about the conference, from the venue to the speakers to the schedule, is structured to facilitate collaboration and information sharing between attendees.

tags | paper, conference
SHA-256 | 5a88ec9adde7999975d27221f31798ffdcfa01d28f4b5c830356377cb44f8332
XCon 2012 XFocus Call For Papers
Posted Mar 7, 2012
Site xcon.xfocus.net

Call For Papers for XCon 2012. This conference will take place from August 14th through the 16th, 2012 in Beijing, China.

tags | paper, conference
SHA-256 | 45bdc46d0347c62dd83cbbf9a35e84518e9aa61dc4dc344a96efe7beaa3e0161
Threat Modeling Cloud Applications
Posted Feb 18, 2012
Authored by Scott Matsumoto | Site cigital.com

These are the presentation slides from a talk called Threat Modeling Cloud Applications: What You Don't Know Will Hurt You as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | ca7ed7c83b5ae0d31004acf587fa92652ec54e92efce0b74f1135654c8dcb0a8
Behavioral Security Modeling
Posted Feb 18, 2012
Authored by John Benninghoff | Site transvasive.com

These are the presentation slides from a talk called Behavioral Security Modeling: Eliminating Vulnerabilities by Building Predictable Systems as presented at the OWASP AppSec USA 2011 conference.

tags | paper, vulnerability
SHA-256 | e197238567599d0b75f2ed394737152a01c303a4b7cb4c4281a3400ab62c8ee8
Trustwave Global Security Report
Posted Feb 18, 2012
Authored by Charles Henderson | Site trustwave.com

These slides are from the Trustwave Global Security Report as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | 5ab47429503233cf331568f72c8c9012c6a1f774e9d2d77647e5d1519521f3bc
Ghosts Of XSS Past, Present, And Future
Posted Feb 18, 2012
Authored by Jim Manico

These are the slides from the Ghost of XSS Past, Present, and Future presentation given at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | 0b66340464b5fd19fc7f01d69d5ed582aa6417b0228f67241d9cd66f22e37f7c
Web Application Security Payloads
Posted Feb 18, 2012
Authored by Andres Riancho

These are the slides from the Web Application Security Payloads presentation given at the OWASP AppSec USA 2011 conference.

tags | paper, web
SHA-256 | 96859936ed7fb62fae34893a18ab9599f745d4ee65739eebcab392b9321c6777
Secunia Security Advisory 47888
Posted Feb 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Netragard has reported a vulnerability in Sonexis ConferenceManager, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | e7316ea9a949c93000bf0f98f59eb5b7d4a4f3adc55f37f93aa47b2e39c6bb38
Sonexis ConferenceManager Information Disclosure
Posted Feb 14, 2012
Authored by Netragard | Site netragard.com

Netragard, L.L.C Advisory - Sonexis ConferenceManager versions up to 10.x suffer from multiple information disclosure and lack of authentication vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 0187c6fccee74ba3fb6221abae73c77e6c4eedd2deda0b9b3c2c76138719014d
ASE/IEEE 2012 Call For Papers
Posted Feb 3, 2012

The 2012 ASE/IEEE International Conference on Privacy, Security, Risk, and Trust and the 2012 ASE/IEEE International Conference on Cyber Security have both announced their call for papers.

tags | paper, conference
SHA-256 | 8f3b5fef1f57432bb9dea01720771eaf58f7263653e0c4ed8b9718a0570dfc9d
Nuit Du Hack 2012 Call For Papers
Posted Jan 24, 2012
Authored by Nuit Du Hack CFP

The Nuit Du Hack Call For Papers has been announced. It will be held June 23rd, 2012 at the Disneyland Paris Conference Centre.

tags | paper, conference
SHA-256 | a0f919adae1a937df9ef4d9001bdfa8f3d03517f6313946efff965263f7b0f8a
Page 1 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close