exploit the possibilities
Showing 1 - 25 of 26 RSS Feed

Files Date: 2011-05-02

OpenMyZip 0.1 .ZIP Buffer Overflow
Posted May 2, 2011
Authored by C4SS!0 G0M3S

OpenMyZip version 0.1 suffers from a .zip file parsing buffer overflow vulnerability.

tags | exploit, overflow
MD5 | b3d9bc5e2c2cec86a7675e185ddfed46
Botan C++ Crypto Algorithms Library 1.9.17
Posted May 2, 2011
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release adds some new options for controlling use of Sphinx and Doxygen for generating documentation. A bug that broke runtime feature detection on x86 processors has been fixed. Support for the BeOS clone/continuation Haiku has been improved. This is the third and hopefully final release candidate for the next stable tree.
tags | library
systems | linux
MD5 | 9338df049df92737223ab496154bbc3d
Mandriva Linux Security Advisory 2011-082
Posted May 2, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-082 - Multiple vulnerabilities have been found and corrected in python-feedparser. Cross-site scripting vulnerability in feedparser.py in Universal Feed Parser before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas. feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0.1 allows remote attackers to cause a denial of service via a malformed DOCTYPE declaration. Cross-site scripting vulnerability in feedparser.py in Universal Feed Parser 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via malformed XML comments. Cross-site scripting vulnerability in feedparser.py in Universal Feed Parser 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via an unexpected URI scheme, as demonstrated by a javascript: URI. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, denial of service, arbitrary, javascript, vulnerability, xss, python
systems | linux, mandriva
advisories | CVE-2009-5065, CVE-2011-1156, CVE-2011-1157, CVE-2011-1158
MD5 | bd3827242604d5e2e5f48ddda22acfb2
Mandriva Linux Security Advisory 2011-081
Posted May 2, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-081 - Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and earlier allows remote attackers to create arbitrary files via a dot dot in the name attribute of a file element in a metalink file.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2011-1586
MD5 | 07ed0a7197997739f71c550aaab7746d
Win32/XP SP3 StarWars Movie Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

74 bytes small Win32/XP SP3 StarWars movie shellcode.

tags | shellcode
systems | windows
MD5 | 447177db46fd416d7fa0b7f8d02d1477
Win32/XP SP3 Shutdown Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

56 bytes small Win32/XP SP3 shutdown windows shellcode with a 30 second timer.

tags | shellcode
systems | windows, 32
MD5 | 182664fc2d212409720fbfded5bfc869
Win32/XP SP3 cmd.exe Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

50 bytes small Win32/XP SP3 cmd.exe shellcode.

tags | shellcode
systems | windows
MD5 | b01de457b94682a45864333978004040
Win32/XP SP3 Windows Magnifier Shellcode
Posted May 2, 2011
Authored by Xecuti0N3r

52 bytes small Win32/XP SP3 windows magnifier shellcode.

tags | shellcode
systems | windows, 32
MD5 | bac8355339141caa3a39f93d72f49b86
Debian Security Advisory 2230-1
Posted May 2, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2230-1 - Two vulnerabilities have been discovered in KVM, a solution for full virtualization on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2011-0011, CVE-2011-1750
MD5 | b2e0e26b641dd9200be61eabd93ec987
Oracle AS Portal 10.1.2 Cross Site Scripting
Posted May 2, 2011
Authored by Vicente Aguilera Diaz

Oracle AS Portal 10g version 10.1.2 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 7140d5f110f837105772d1748f51b217
Ubuntu Security Notice USN-1127-1
Posted May 2, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1127-1 - Evan Broder discovered that usb-creator did not properly enforce restrictions when performing privileged disk operations. A local attacker could use this flaw to perform certain disk operations, such as unmount arbitrary mountpoints.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2011-1828
MD5 | 8a35430376e418df700c9271698cb537
OATH Toolkit 1.6.4
Posted May 2, 2011
Site nongnu.org

The OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: The usersfile max secret length was increased to 32 bytes in liboath. The --window option is supported together with --totp in oathtool. The pam_sm_setcred function was added again and was made to return success. Linking to -lpam is done for PAM symbols. The pam_oath.la file is not installed. The pammoddir automake variable is used instead of overriding libdir. autoreconf was made to work in released tar archives.
tags | tool
systems | unix
MD5 | a35901e9d3bbfa7c4ae51febed8eaad4
RegLookup Registry Parser 0.99.0
Posted May 2, 2011
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: This 1.0 release candidate contains major improvements to regfi usability. regfi was made a proper library, and major improvements were made to the API. Python bindings (pyregfi) were added for regfi. The Make-based build system was replaced with a SCons-based one. Numerous improvements were made in regfi for multithreaded use and memory management. API documentation was improved.
tags | registry
systems | windows, unix, nt
MD5 | c86d45b55756ed754c04db13f7eac408
Debian Security Advisory 2228-1
Posted May 2, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2228-1 - Several vulnerabilities have been found in Iceweasel, a web browser based on Firefox.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2011-0065, CVE-2011-0066, CVE-2011-0067, CVE-2011-0069, CVE-2011-0070, CVE-2011-0071, CVE-2011-0072, CVE-2011-0073, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0080, CVE-2011-0081
MD5 | f66c18ed4278dd2db1867cff99db8dd0
Packet Storm New Exploits For April, 2011
Posted May 2, 2011
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 334 exploits added to Packet Storm in April, 2011.

tags | exploit
systems | linux
MD5 | f0a75b6f63bb645afc5b5e96c74f6cae
Secunia Security Advisory 44405
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for php. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, php, vulnerability
systems | linux, ubuntu
MD5 | 60257dc28a367cb62524ed23b5c3fdfc
Secunia Security Advisory 44401
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cross-site request forgery attacks, disclose sensitive information, and compromise a user's system.

tags | advisory, spoof, vulnerability, csrf
systems | linux, ubuntu
MD5 | d256d12533b253df1fb0ab42cf6e7437
Secunia Security Advisory 44424
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for mediawiki. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to bypass certain security restrictions, disclose potentially sensitive information, and conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
MD5 | 86bfda355be4cf82899bac1ca55939d1
Secunia Security Advisory 44447
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in CGI.pm included in Solaris, which can be exploited by malicious people to conduct HTTP response splitting attacks in an application using the library.

tags | advisory, web, cgi, vulnerability
systems | solaris
MD5 | cd740532b014dbcf98a20b60e2c99e11
Secunia Security Advisory 44444
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Apache APR-util included in Solaris, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | solaris
MD5 | 18bbbeb2dae1c2a669a9c1c57017c7fa
Secunia Security Advisory 44445
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Apache APR-util included in Solaris, which can be exploited by malicious users and malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | solaris
MD5 | 1d07f26b1d41ac92aaee94d876a70b78
Secunia Security Advisory 44448
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in OpenSSL included in Solaris, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | solaris
MD5 | 61b7bc1279e034bc1e153897bb37421b
Secunia Security Advisory 44443
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Apache HTTP Server included in Solaris and OpenSolaris, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to bypass certain security restrictions, manipulate certain data, gain access to potentially sensitive information, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, web, denial of service, local, vulnerability
systems | solaris
MD5 | 49205090b369538d3b2d011df8d4f74d
Secunia Security Advisory 44446
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Mozilla Thunderbird included in Solaris, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability, xss
systems | solaris
MD5 | 393ad9198343ba6e86f6fded02e0ca68
Secunia Security Advisory 44387
Posted May 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in SSSD, which can be exploited by malicious people to hijack another user's account.

tags | advisory
MD5 | 6463b8e4f62392089e28a4daafb31457
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close