what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files Date: 2011-05-02

OpenMyZip 0.1 .ZIP Buffer Overflow
Posted May 2, 2011
Authored by C4SS!0 G0M3S

OpenMyZip version 0.1 suffers from a .zip file parsing buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | e000f9b93dfd3a47dbaee9587785d5fe83e4dc6f8418c3eecb61d93e3c2a37d9
Botan C++ Crypto Algorithms Library 1.9.17
Posted May 2, 2011
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release adds some new options for controlling use of Sphinx and Doxygen for generating documentation. A bug that broke runtime feature detection on x86 processors has been fixed. Support for the BeOS clone/continuation Haiku has been improved. This is the third and hopefully final release candidate for the next stable tree.
tags | library
systems | linux
SHA-256 | 8cfcaadd7c2fa3fbbc336cd0f9df387364f3db42933d4f085b39926cb2e0d2ae
Mandriva Linux Security Advisory 2011-082
Posted May 2, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-082 - Multiple vulnerabilities have been found and corrected in python-feedparser. Cross-site scripting vulnerability in feedparser.py in Universal Feed Parser before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas. feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0.1 allows remote attackers to cause a denial of service via a malformed DOCTYPE declaration. Cross-site scripting vulnerability in feedparser.py in Universal Feed Parser 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via malformed XML comments. Cross-site scripting vulnerability in feedparser.py in Universal Feed Parser 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via an unexpected URI scheme, as demonstrated by a javascript: URI. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, denial of service, arbitrary, javascript, vulnerability, xss, python
systems | linux, mandriva
advisories | CVE-2009-5065, CVE-2011-1156, CVE-2011-1157, CVE-2011-1158
SHA-256 | e71a73bc07b958a000011bac9bf9924d0241b15dd54914ceb4ddfebd3a0a6670
Mandriva Linux Security Advisory 2011-081
Posted May 2, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-081 - Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and earlier allows remote attackers to create arbitrary files via a dot dot in the name attribute of a file element in a metalink file.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2011-1586
SHA-256 | fc127713d8ef1e9a75c6a5226437ea6403cc42a9d2d302d3f21f67e296f07e1a
Win32/XP SP3 StarWars Movie Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

74 bytes small Win32/XP SP3 StarWars movie shellcode.

tags | shellcode
systems | windows
SHA-256 | fe12c9745febfbe9e02484775bfe4c3c13748bbb88d18692e30151b1c897c5f1
Win32/XP SP3 Shutdown Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

56 bytes small Win32/XP SP3 shutdown windows shellcode with a 30 second timer.

tags | shellcode
systems | windows
SHA-256 | 32a5d9489d35c679c592e0fb1602236045f377eea5231a18ac09a65aa4096996
Win32/XP SP3 cmd.exe Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

50 bytes small Win32/XP SP3 cmd.exe shellcode.

tags | shellcode
systems | windows
SHA-256 | f9ce8650ff072c4452e279d57119391623ec6f2bfb5aa5f40d7f1cbfcaf6a0c3
Win32/XP SP3 Windows Magnifier Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

52 bytes small Win32/XP SP3 windows magnifier shellcode.

tags | shellcode
systems | windows
SHA-256 | 9fb60a79610c653ff4e27aeed6d85eb49fc41ab5b31e6d94c836f48edd801eec
Debian Security Advisory 2230-1
Posted May 2, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2230-1 - Two vulnerabilities have been discovered in KVM, a solution for full virtualization on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2011-0011, CVE-2011-1750
SHA-256 | 61ae493a42caf194662c3546704f4d2f3505ccec3866ac23397b6dc45d9e1095
Oracle AS Portal 10.1.2 Cross Site Scripting
Posted May 2, 2011
Authored by Vicente Aguilera Diaz

Oracle AS Portal 10g version 10.1.2 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 01be71d80b7fe81294b6d74a1e6891d5fdc895d42564fa1b40b6c153a2cb4167
Ubuntu Security Notice USN-1127-1
Posted May 2, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1127-1 - Evan Broder discovered that usb-creator did not properly enforce restrictions when performing privileged disk operations. A local attacker could use this flaw to perform certain disk operations, such as unmount arbitrary mountpoints.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2011-1828
SHA-256 | de314acad232a79f2909333ed42107e763ccec15776eb8316617d961dd2888d9
OATH Toolkit 1.6.4
Posted May 2, 2011
Site nongnu.org

The OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: The usersfile max secret length was increased to 32 bytes in liboath. The --window option is supported together with --totp in oathtool. The pam_sm_setcred function was added again and was made to return success. Linking to -lpam is done for PAM symbols. The pam_oath.la file is not installed. The pammoddir automake variable is used instead of overriding libdir. autoreconf was made to work in released tar archives.
tags | tool
systems | unix
SHA-256 | 7ee94f3a56f6254df39925a07ec62e26c9589c0323659c91919e45215efa510f
RegLookup Registry Parser 0.99.0
Posted May 2, 2011
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: This 1.0 release candidate contains major improvements to regfi usability. regfi was made a proper library, and major improvements were made to the API. Python bindings (pyregfi) were added for regfi. The Make-based build system was replaced with a SCons-based one. Numerous improvements were made in regfi for multithreaded use and memory management. API documentation was improved.
tags | registry
systems | windows, unix
SHA-256 | b7ae9e5c13f949ef958da4cba741067516bbc4c2800e033ff0d6ad4506945406
Debian Security Advisory 2228-1
Posted May 2, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2228-1 - Several vulnerabilities have been found in Iceweasel, a web browser based on Firefox.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2011-0065, CVE-2011-0066, CVE-2011-0067, CVE-2011-0069, CVE-2011-0070, CVE-2011-0071, CVE-2011-0072, CVE-2011-0073, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0080, CVE-2011-0081
SHA-256 | 078486b1e8f5b88faea2f516d6b56bfc112bf90d660d1a22609bc809f5526969
Packet Storm New Exploits For April, 2011
Posted May 2, 2011
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 334 exploits added to Packet Storm in April, 2011.

tags | exploit
systems | linux
SHA-256 | 743f38c3c668eb2c1cfdc703d384f8c4faebedfd6246d72d48323a87341337ef
Secunia Security Advisory 44405
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for php. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, php, vulnerability
systems | linux, ubuntu
SHA-256 | 622810909bb347d51ea1986a8fa97f3e68063ed3b9e76650806bcf6e8c97aca4
Secunia Security Advisory 44401
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cross-site request forgery attacks, disclose sensitive information, and compromise a user's system.

tags | advisory, spoof, vulnerability, csrf
systems | linux, ubuntu
SHA-256 | 72f6280aaaf1b28c530adee72e02528fc2475249cce27dfcdfa88372e2c8cb69
Secunia Security Advisory 44424
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for mediawiki. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to bypass certain security restrictions, disclose potentially sensitive information, and conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | 47985ed4c28edb53200b6150be76172d0bdb3bb7e3e3c915b72e4f498fa3b492
Secunia Security Advisory 44447
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in CGI.pm included in Solaris, which can be exploited by malicious people to conduct HTTP response splitting attacks in an application using the library.

tags | advisory, web, cgi, vulnerability
systems | solaris
SHA-256 | f43b4f585e2439b7b480950685faf027fb31ee89957b14a26714aa3677e74a96
Secunia Security Advisory 44444
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Apache APR-util included in Solaris, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | solaris
SHA-256 | 688b0a3090fa9075a406ead9fa64dae384823f38c329731e9c62d6bd5155fca0
Secunia Security Advisory 44445
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Apache APR-util included in Solaris, which can be exploited by malicious users and malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | solaris
SHA-256 | de3d0256b6b4f5dde68cba1acb57b8e68400ec9f6deb9083165e91e275011d84
Secunia Security Advisory 44448
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in OpenSSL included in Solaris, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | solaris
SHA-256 | a5ac363f8717291cb8a72e07e4285cf5579077ffd490fa617f1ace7b2c05c405
Secunia Security Advisory 44443
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Apache HTTP Server included in Solaris and OpenSolaris, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to bypass certain security restrictions, manipulate certain data, gain access to potentially sensitive information, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, web, denial of service, local, vulnerability
systems | solaris
SHA-256 | 88e6093d6df332993ad48490c3d929b3cf6bebb1f8c207e0aec43e2b9cf35692
Secunia Security Advisory 44446
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Mozilla Thunderbird included in Solaris, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability, xss
systems | solaris
SHA-256 | 4b8759b30bb40ebcdb6e180bc52bc6b2a6ec247258ad01ae227ded760636cd37
Secunia Security Advisory 44387
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in SSSD, which can be exploited by malicious people to hijack another user's account.

tags | advisory
SHA-256 | 6674df041061f0cce82d722ebdc9cb149c4ce4556dcc38accdc1e76010b4e34c
Page 1 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close