what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 48 RSS Feed

Files Date: 2010-04-23

Secunia Security Advisory 39567
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Apache ActiveMQ, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | ed156c3f274885b7eda139ab125b1b5b53f4a2a3e2d0fea79c3695620bdd23de
Secunia Security Advisory 39479
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3Com H3C SR6600 Series Routers, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 6b763c3e58c3a80a7e1c761cb9e59e55fa1be91e1627d6fbba8d90d98c478c8f
Secunia Security Advisory 39574
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apache Tomcat, which can be exploited by malicious people to disclose certain system information.

tags | advisory
SHA-256 | 6762e0419f3db9b9885eecc07dd86df23556298f852374201c2cb4e5b86204ad
Secunia Security Advisory 39500
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM DB2, which can be exploited by by malicious users to cause a DoS (Denial of Service) and by malicious people to manipulate certain data.

tags | advisory, denial of service, vulnerability
SHA-256 | 0ffc09f31adefb97d7926b603f501236cb30e242167b64a9620de4016ec87297
Secunia Security Advisory 39551
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AJ Shopping Cart, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 7794e93f74a7195faff93bf4de7e406b399701ad41e089b5fe0e3d69757fbc6b
Secunia Security Advisory 39582
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for BIND. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | 1d7e9c8d9d393b7a21a8617e1d734f31812f1d1c18ba101c0784cc41bae8f2f8
Secunia Security Advisory 39511
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsh Ray has discovered a security issue in Intel C++ Compiler Professional Edition, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 9c45a95138daa8489cbef730947a2e480bf45a3cba8f2175026067389a9dc163
Secunia Security Advisory 39542
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in MDaemon, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 718ee95763bdd10c38613bad714ae174acfc8c2625f2e49361c03365137fe2b0
Secunia Security Advisory 39559
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in In-portal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 14d943bee62ad2eedbf9bdcb9b2417cddb2f5ca08b4854a6e52326d436d02737
Secunia Security Advisory 39583
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP Insight Control, which can potentially be exploited by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | b64f91650f5440a1bb0e758d5e5b8940671607456ef07c4ae6649c02c5b8b508
Secunia Security Advisory 39456
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | windows
SHA-256 | 48f64e867db70a15732d7a38a0b2ef51e4e46fdac095e9d97f1d239a88d5f918
Secunia Security Advisory 39576
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in libESMTP, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
SHA-256 | 03a725c0d8c83ba06d4545dd077f7c282dda2c5d16b19c4875810a7245137dd1
Secunia Security Advisory 39464
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in GetSimple CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 36878aa4abb8b8e901a22aa1880bb908fc5bdca4fdc4d29c43fa7be86041b27f
Secunia Security Advisory 39579
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Memorial Web Site Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, web, sql injection
SHA-256 | 8ca7e04ea1aa1be10d4b637119eb14ceee5be23d5f5b6a73dea3ebc7c0b3c590
Secunia Security Advisory 39484
Posted Apr 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Valentin Hoebel has discovered a vulnerability in FlashCard, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | f8480262996de45ba8e4c0d984de11fc001718f7f38e932874c9c739352b9fe9
ZeusCart 3.0 SQL Injection
Posted Apr 23, 2010
Authored by v3n0m

ZeusCart version 3.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4adb92542944a5399ab34b694fa93713a8c543a9985c8af95e7c5b79df074409
Aanval Intrusion Detection Tool 5.5
Posted Apr 23, 2010
Site aanval.com

Aanval is the industry's most comprehensive snort and syslog intrusion detection, correlation and management console. Aanval is designed specifically to scale from small single sensor installations to global enterprise deployments. Aanval is browser based and designed to work on all current variants of UNIX, Linux and Mac OS X.

Changes: Dozens of bug fixes, all new look and feel, new collection system, new notes system, new syslog filter system, upgraded compatibility and more.
tags | tool, sniffer
systems | linux, unix, apple, osx
SHA-256 | cf8ec1138ff5907bcfd8a9ff0872dc2f331ad612083825554ff792eda9eda325
Process Dumper 1.1 Windows Version
Posted Apr 23, 2010
Authored by Tobias Klein

Process Dumper is able to make a dump of a running process in a forensical manner. Windows version.

tags | tool, forensics
systems | windows
SHA-256 | 4bc0e65d8f2c0bf6645f69209e08992fbcb9193f1f25e64e825c0275d08dca20
Process Dumper 1.1 Linux Version
Posted Apr 23, 2010
Authored by Tobias Klein

Process Dumper is able to make a dump of a running process in a forensical manner. Linux version.

tags | tool, forensics
systems | linux
SHA-256 | 4e60a60adc611b7b94aa58472701a8fe1f939fbf445141ab433d39f4ad84d3b7
HITB Magazine Volume 1 Issue 2
Posted Apr 23, 2010
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 2 -This issue covers automated malware analysis, windows objects in kernel vulnerability exploitation, and more.

tags | kernel, magazine
systems | windows
SHA-256 | cb042ca8cc507a8da1acaca874a404d0fbf87e51a6ecd8278a00ca363740fad3
ScoopyNG - The VMware Detection Tool
Posted Apr 23, 2010
Authored by Tobias Klein

ScoopyNG combines the detection tricks of Scoopy Doo and Jerry as well as some new techniques to determine if a current OS is running inside a VMware Virtual Machine (VM) or on a native system. ScoopyNG should work on all modern uni-, multi- and multi-core cpu's. ScoopyNG is able to detect VMware even if "anti-detection-mechanisms" are deployed.

SHA-256 | 2d85b2d9706260fbcc4f2d2841c4301c97e18a67ae40072ee2956cbf75b2f720
MySQL Injection Tutorial
Posted Apr 23, 2010
Authored by fvox

Whitepaper called MySQL Injection Tutorial. Written in Portuguese.

tags | paper, sql injection
SHA-256 | 0df4af51e4285ae2d4430f8a8cdfd67da28e3b64df5895574861a008661dad06
Web App Fingerprinting
Posted Apr 23, 2010
Authored by fvox

Whitepaper called Web App Fingerprinting. Written in Portuguese.

tags | paper, web
SHA-256 | 5fed46a554194e32b7e5eb5f9e5746a4fc03f1cf9e8299a81cfef99041092828
VLC Media Player 1.0.5 Heap Overflows And Invalid Memory Access
Posted Apr 23, 2010
Site videolan.org

VLC Media Player versions 0.5.0 through 1.0.5 suffer from heap buffer overflow and memory access vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 7437866dbb5dd04e28279cd9c3748c9ca764743f7a0eccdaac574d71986dd3d8
167 Bytes BSD x86 Bindshell
Posted Apr 23, 2010
Authored by beosroot

167 bytes small BSD x86 bindshell shellcode that spawns on port 2525.

tags | x86, shellcode
systems | bsd
SHA-256 | 5a447749a7e712642b891f138acd1fadf52e144f89d056165174522ccc32ba06
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close