what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files Date: 2011-06-24

Secunia Security Advisory 45057
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Brendan Coles has discovered multiple vulnerabilities in ActivDesk, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 24c09702a914920fbd41b77edc81171ac154eb723ac9d213137934a92c020052
Secunia Security Advisory 45054
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | 064cdf7bba7061ae073f185e4dc5c2e1a1591a1772c6d560ec50b0492a084c28
Secunia Security Advisory 45007
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 952b7ddcdfdcb898da5ab1f3750f1f5948eb2a125c8657848ca48671664f8bfe
Secunia Security Advisory 44911
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Lync 2010, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a63a7ede82460829a052211467886dc014474ec8bba3dcc761a5c9060eb4e12b
Secunia Security Advisory 45049
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Movable Type, which can be exploited by malicious users to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | a99b0a567ce15dd71b2229e21ab958b141de4e6218e40c4327826b8d9a3386be
Secunia Security Advisory 45037
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Pidgin, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | a4a522ae6b4a9c6d113f2a40705c615d55b1258ba5335e6e606fb721059b0e06
Secunia Security Advisory 45067
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in cURL, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | f51ee4b9c4e91086bda6aaf5136f1cfca513bc96b5f38a7eddfa7c3da1953b3c
Secunia Security Advisory 45050
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cybozu Office, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 89706c334f6caba2f50393608e01ecb759181a94bcf901eb57c5d91a73da5306
Secunia Security Advisory 45063
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in two Cybozu products, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | f6a8545f1ccb1a26f7c69600813714b7591f9bd59106066dae97e6d72bef7726
Secunia Security Advisory 45047
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for curl. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks and to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service, spoof, vulnerability
systems | linux, ubuntu
SHA-256 | 7ee5fab97db03228ea9c9fa5adf187783821fee19a9d33bed4f9eb3395d3190a
Secunia Security Advisory 44992
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cybozu Office, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 2fbe3e2c29ee260f01660eb3b116c67da960314ae7c0835a8f732c6ad494b854
Secunia Security Advisory 45043
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in multiple Cybozu products, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 33de3954fa870426f9e38dd58efee3a14e3ec1e3faae0e2f5f060ce1e165190f
Secunia Security Advisory 45031
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Keith Lee has reported a vulnerability in ManageEngine ServiceDesk Plus, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
SHA-256 | b40e0e913d9d82e387b0e3b316260a71c80735f914f4d973d948758f342911eb
Secunia Security Advisory 45045
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Avactis Shopping Cart, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 25660b46d29a2555c4426cd16297ab0addc685d634a79a00be05ddbddb53776b
Secunia Security Advisory 45048
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 51038f37cea0f04f48bf2abe626c2a4b6f769c893a4484b70c29755e5fd22e9e
Secunia Security Advisory 44973
Posted Jun 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | fd0b42c3f1a4074aaa53e950f402f861445e8d8ce3d067f99e20a4d498d35c3a
Creepy Geolocation Gathering Tool 0.1.94
Posted Jun 24, 2011
Authored by Yiannis Kakavas | Site ilektrojohn.github.com

creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.

Changes: This release adds support for instagram photos included in tweets.
tags | tool
systems | unix
SHA-256 | cbcdfa86cad0e2d10b1463a31bc5be6fd31f44a1019369eac203b1b90e166a5a
Mobius Forensic Toolkit 0.5.8
Posted Jun 24, 2011
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: The Hive (registry viewer) features three new reports: email accounts, TCP/IP interfaces, and computer descriptions. All registry reports can be exported as CSV and the user password report can be exported in a format suitable for John the Ripper as well. Minor improvements were made.
tags | tool, python, forensics
systems | unix
SHA-256 | ae4c4870abd2448a6b13abf48ccd5a20979836ce7e17d787686ee96f246a8762
tftp-hpa Daemon Buffer Overflow
Posted Jun 24, 2011
Authored by Timo Warns | Site pre-cert.de

PRE-CERT Security Advisory - The tftp-hpa daemon contains a buffer overflow vulnerability in the function for setting the utimeout option. As the daemon accepts the option from clients, the vulnerability can be remotely exploited. Versions 0.30 through 5.0 are affected.

tags | advisory, overflow
advisories | CVE-2011-2199
SHA-256 | 0a46a4e113dabe89a5380ccddb1dda0c299749eccc3f07ddbd3134e705cf6484
Ubuntu Security Notice USN-1158-1
Posted Jun 24, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1158-1 - Richard Silverman discovered that when doing GSSAPI authentication, libcurl unconditionally performs credential delegation, handing the server a copy of the client's security credential. Wesley Miaw discovered that when zlib is enabled, libcurl does not properly restrict the amount of callback data sent to an application that requests automatic decompression. This might allow an attacker to cause a denial of service via an application crash or possibly execute arbitrary code with the privilege of the application. This issue only affected Ubuntu 8.04 LTS and Ubuntu 10.04 LTS. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-2417, CVE-2010-0734, CVE-2011-2192
SHA-256 | c6a6ac23fe38bdd0c63b14ef095dd1d9c4d3b33b67d83ea20586c5d3c3440d08
Ubuntu Security Notice USN-1157-3
Posted Jun 24, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1157-3 - USN-1157-1 fixed vulnerabilities in Firefox. Unfortunately, this update produced the side effect of pulling in Firefox on some systems that did not have it installed during a dist-upgrade due to changes in the Ubuntu language packs. This update fixes the problem.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2011-2366, CVE-2011-2367, CVE-2011-2368, CVE-2011-2369, CVE-2011-2370, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2375, CVE-2011-2377
SHA-256 | 1f06eaaf0e9e4c10be161a5015eab74c9ebe632a8a649a51c954db744e7eed54
Red Hat Security Advisory 2011-0897-01
Posted Jun 24, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0897-01 - JBoss Enterprise Web Server has been updated to mitigate multiple vulnerabilities such as cross site scripting, information leaks, and more.

tags | advisory, web, vulnerability, xss
systems | linux, redhat
advisories | CVE-2010-1157, CVE-2010-1452, CVE-2010-1623, CVE-2010-3718, CVE-2010-4172, CVE-2011-0013, CVE-2011-0419
SHA-256 | 7aecf3731e5d7ec16a49db4e8573debf3eeae784616883cd4920d2dccde550de
xAurora Web Browser 10.00 DLL Hijack
Posted Jun 24, 2011
Authored by Zer0 Thunder

xAurora Web Browser version 10.00 DLL hijacking exploit.

tags | exploit, web
systems | windows
SHA-256 | d929090da8a51d38c072431d98fc0afdcdb7c6a41f94bdecc58abaf851fd5ea9
John The Ripper 1.7.8
Posted Jun 24, 2011
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.

Changes: The bitslice DES S-box expressions and code have been replaced, reducing the gate count by 17% and typically speeding up DES-based crypt(3) cracking by 13%. Support for bcrypt hashes of passwords containing non-ASCII characters has been corrected, and a backwards compatibility feature for broken bcrypt hashes of such passwords has been added. Various other improvements have also been made.
tags | cracker
systems | windows, unix, beos
SHA-256 | 12f4307602b9a8f0d3f82daf28e0f59de21aa82c9dcccd16819b288ec83ab559
A Simpler Way Of Finding 0day
Posted Jun 24, 2011
Authored by Robert Graham, David Maynor

Whitepaper called A Simpler Way of Finding 0day.

tags | paper
SHA-256 | 4859d724b26948f29e04d81656d4e0314359c0100667a845bd0c4eb59191af45
Page 1 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close