what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2009-06-17 to 2009-06-18

Secunia Security Advisory 35448
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Recipe Script, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 01599c942967520db6369c9eef70460413b02dcf733fa82104e968716674c396
Secunia Security Advisory 35462
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cscope. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | b8caeff744281d21d9656b685571ee16a14f271f0f7801aaa10ffb204a5d8c43
Secunia Security Advisory 35452
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SirGod has discovered a vulnerability in phpCollegeExchange, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 3bd233d745a73178f350adc29e619c638b52c966a6afd1ae4b8acf6cef3b90fd
Secunia Security Advisory 35450
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kacper has discovered a vulnerability in the Photoracer plugin in WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 08a938fd2e100a1182513f6e553ce7649c00460d7ff3e517fee726d1eaee8bb2
Secunia Security Advisory 35464
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for wireshark. This fixes some vulnerabilities, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 689df18daf06f3163ce2564e2345a3b81e7598a477e348cab9f070125dcd7c99
Secunia Security Advisory 35463
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP OpenView SNMP Emanate Master Agent, which can be exploited by malicious people to spoof authenticated SNMPv3 packets.

tags | advisory, spoof
SHA-256 | 672815bf04d977d3b6248d19a66f659e8457d1fa4231c55fee3d4e3d4b7921a3
Debian Linux Security Advisory 1816-1
Posted Jun 17, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1816-1 - It was discovered that the Apache web server did not properly handle the "Options=" parameter to the AllowOverride directive.

tags | advisory, web
systems | linux, debian
advisories | CVE-2009-1195
SHA-256 | f481cb1d57b719487008c76e6c82018b67522e8df574fcfe60b4624260c4a8b3
Zero Day Initiative Advisory 09-043
Posted Jun 17, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-043 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Java HotSpot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the undocumented apple.laf.CColourUIResource(long, int, int ,int, int) constructor. When passing a long integer value as the first argument, the value is interpreted as pointer to an Objective-C object. By constructing a special memory structure and passing the pointer to the first argument an attacker may execute arbitrary code.

tags | advisory, java, remote, arbitrary
systems | apple
advisories | CVE-2009-1719
SHA-256 | 5facd277a7e3c9290288470e2853e5bdee3fef07cf9b1e04a967318eab053b92
Cyclic Redundancy Check (CRC)
Posted Jun 17, 2009
Authored by Livewire

Whitepaper called Cyclic Redundancy Check (CRC).

tags | paper
SHA-256 | ee9f36d6c109460e8f2bea61ca55ae7b54e4f0c5fd5a039cb22a03686686788c
Assault On PHP Applications
Posted Jun 17, 2009
Authored by Aelphaeis Mangarae

Whitepaper called Assault on PHP Applications.

tags | paper, php
SHA-256 | ef5875a096fda4f0ad831297a054b2161f778201984c4392ea88e6e2b6f69209
Linux x86 Shellcode
Posted Jun 17, 2009
Authored by blue9057

Linux x86 setreuid(geteuid(),geteuid()),execve("/bin/sh",0,0) 34 bytes universal shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 808f1d01ba025223e6efe5f3705c3a887caf3397ecc4fe4a03383b3cd49815aa
Solaris x86 Portbinding Shellcode
Posted Jun 17, 2009
Authored by Jonathan Salwan | Site shell-storm.org

Solaris x86 portbinding TCP shellcode generator.

tags | x86, tcp, shellcode
systems | solaris
SHA-256 | 230744b84b6f7e60ccd26a70589da276754ed6f6e289798b095b034d38023ef2
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close