what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 48 RSS Feed

Files Date: 2010-04-23

Secunia Security Advisory 39567
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Apache ActiveMQ, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | ed156c3f274885b7eda139ab125b1b5b53f4a2a3e2d0fea79c3695620bdd23de
Secunia Security Advisory 39479
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3Com H3C SR6600 Series Routers, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 6b763c3e58c3a80a7e1c761cb9e59e55fa1be91e1627d6fbba8d90d98c478c8f
Secunia Security Advisory 39574
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apache Tomcat, which can be exploited by malicious people to disclose certain system information.

tags | advisory
SHA-256 | 6762e0419f3db9b9885eecc07dd86df23556298f852374201c2cb4e5b86204ad
Secunia Security Advisory 39500
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM DB2, which can be exploited by by malicious users to cause a DoS (Denial of Service) and by malicious people to manipulate certain data.

tags | advisory, denial of service, vulnerability
SHA-256 | 0ffc09f31adefb97d7926b603f501236cb30e242167b64a9620de4016ec87297
Secunia Security Advisory 39551
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AJ Shopping Cart, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 7794e93f74a7195faff93bf4de7e406b399701ad41e089b5fe0e3d69757fbc6b
Secunia Security Advisory 39582
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for BIND. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | 1d7e9c8d9d393b7a21a8617e1d734f31812f1d1c18ba101c0784cc41bae8f2f8
Secunia Security Advisory 39511
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsh Ray has discovered a security issue in Intel C++ Compiler Professional Edition, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 9c45a95138daa8489cbef730947a2e480bf45a3cba8f2175026067389a9dc163
Secunia Security Advisory 39542
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in MDaemon, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 718ee95763bdd10c38613bad714ae174acfc8c2625f2e49361c03365137fe2b0
Secunia Security Advisory 39559
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in In-portal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 14d943bee62ad2eedbf9bdcb9b2417cddb2f5ca08b4854a6e52326d436d02737
Secunia Security Advisory 39583
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP Insight Control, which can potentially be exploited by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | b64f91650f5440a1bb0e758d5e5b8940671607456ef07c4ae6649c02c5b8b508
Secunia Security Advisory 39456
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | windows
SHA-256 | 48f64e867db70a15732d7a38a0b2ef51e4e46fdac095e9d97f1d239a88d5f918
Secunia Security Advisory 39576
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in libESMTP, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
SHA-256 | 03a725c0d8c83ba06d4545dd077f7c282dda2c5d16b19c4875810a7245137dd1
Secunia Security Advisory 39464
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in GetSimple CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 36878aa4abb8b8e901a22aa1880bb908fc5bdca4fdc4d29c43fa7be86041b27f
Secunia Security Advisory 39579
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Memorial Web Site Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, web, sql injection
SHA-256 | 8ca7e04ea1aa1be10d4b637119eb14ceee5be23d5f5b6a73dea3ebc7c0b3c590
Secunia Security Advisory 39484
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Valentin Hoebel has discovered a vulnerability in FlashCard, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | f8480262996de45ba8e4c0d984de11fc001718f7f38e932874c9c739352b9fe9
ZeusCart 3.0 SQL Injection
Posted Apr 23, 2010
Authored by v3n0m

ZeusCart version 3.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4adb92542944a5399ab34b694fa93713a8c543a9985c8af95e7c5b79df074409
Aanval Intrusion Detection Tool 5.5
Posted Apr 23, 2010
Site aanval.com

Aanval is the industry's most comprehensive snort and syslog intrusion detection, correlation and management console. Aanval is designed specifically to scale from small single sensor installations to global enterprise deployments. Aanval is browser based and designed to work on all current variants of UNIX, Linux and Mac OS X.

Changes: Dozens of bug fixes, all new look and feel, new collection system, new notes system, new syslog filter system, upgraded compatibility and more.
tags | tool, sniffer
systems | linux, unix, apple, osx
SHA-256 | cf8ec1138ff5907bcfd8a9ff0872dc2f331ad612083825554ff792eda9eda325
Process Dumper 1.1 Windows Version
Posted Apr 23, 2010
Authored by Tobias Klein

Process Dumper is able to make a dump of a running process in a forensical manner. Windows version.

tags | tool, forensics
systems | windows
SHA-256 | 4bc0e65d8f2c0bf6645f69209e08992fbcb9193f1f25e64e825c0275d08dca20
Process Dumper 1.1 Linux Version
Posted Apr 23, 2010
Authored by Tobias Klein

Process Dumper is able to make a dump of a running process in a forensical manner. Linux version.

tags | tool, forensics
systems | linux
SHA-256 | 4e60a60adc611b7b94aa58472701a8fe1f939fbf445141ab433d39f4ad84d3b7
HITB Magazine Volume 1 Issue 2
Posted Apr 23, 2010
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 2 -This issue covers automated malware analysis, windows objects in kernel vulnerability exploitation, and more.

tags | kernel, magazine
systems | windows
SHA-256 | cb042ca8cc507a8da1acaca874a404d0fbf87e51a6ecd8278a00ca363740fad3
ScoopyNG - The VMware Detection Tool
Posted Apr 23, 2010
Authored by Tobias Klein

ScoopyNG combines the detection tricks of Scoopy Doo and Jerry as well as some new techniques to determine if a current OS is running inside a VMware Virtual Machine (VM) or on a native system. ScoopyNG should work on all modern uni-, multi- and multi-core cpu's. ScoopyNG is able to detect VMware even if "anti-detection-mechanisms" are deployed.

SHA-256 | 2d85b2d9706260fbcc4f2d2841c4301c97e18a67ae40072ee2956cbf75b2f720
MySQL Injection Tutorial
Posted Apr 23, 2010
Authored by fvox

Whitepaper called MySQL Injection Tutorial. Written in Portuguese.

tags | paper, sql injection
SHA-256 | 0df4af51e4285ae2d4430f8a8cdfd67da28e3b64df5895574861a008661dad06
Web App Fingerprinting
Posted Apr 23, 2010
Authored by fvox

Whitepaper called Web App Fingerprinting. Written in Portuguese.

tags | paper, web
SHA-256 | 5fed46a554194e32b7e5eb5f9e5746a4fc03f1cf9e8299a81cfef99041092828
VLC Media Player 1.0.5 Heap Overflows And Invalid Memory Access
Posted Apr 23, 2010
Site videolan.org

VLC Media Player versions 0.5.0 through 1.0.5 suffer from heap buffer overflow and memory access vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 7437866dbb5dd04e28279cd9c3748c9ca764743f7a0eccdaac574d71986dd3d8
167 Bytes BSD x86 Bindshell
Posted Apr 23, 2010
Authored by beosroot

167 bytes small BSD x86 bindshell shellcode that spawns on port 2525.

tags | x86, shellcode
systems | bsd
SHA-256 | 5a447749a7e712642b891f138acd1fadf52e144f89d056165174522ccc32ba06
Page 1 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close