exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files Date: 2011-08-17

GNU Privacy Guard 2.0.18
Posted Aug 17, 2011
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Compatibility with newer versions of libgcrypt was restored. dirmngr/gpgsm interaction was improved for OCSP. Card keys can now be generated up to 4096 bits. The SSH confirm flag is now supported, and SSH fingerprints are shown in SSH related pinentries.
tags | encryption
SHA-256 | 48aedd762ca443fb952a9e859efe3c66706d7c2c9c77c32dbdbac4fe962dae5b
NIELD (Network Interface Events Logging Daemon) 0.20
Posted Aug 17, 2011
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.

Changes: NIELD now adds new events to display the state of the ethernet bridge and the bonding interface.
tags | tool, kernel, system logging
systems | unix
SHA-256 | 5d13b66a33b86d7279a0cd219e222e986fc25b5a2007ecbe27812a0e85601618
Joomla JoomTouch 1.0.2 Local File Inclusion
Posted Aug 17, 2011
Authored by NoGe

Joomla JoomTouch component version 1.0.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | df9dde7bb3beb604a1b8d7e77e9f16504a8da611fb4743608631f0a742ea9382
Secunia Security Advisory 45613
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in libldap included in Solaris, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | solaris
SHA-256 | 8cf44c3683ebdcac3f4c8205c3a09afa6f97caed0ced2f202663d004b6b71390
Secunia Security Advisory 45596
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and some vulnerabilities have been discovered in Elgg, which can be exploited by malicious people to disclose sensitive information and conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 4d5d8acaa21b9587feb026e066820576faca5da767b413c8884d3b7802e7ea81
Secunia Security Advisory 45655
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | b56d973e58e56aa15f830538448ec004c8dc3975d0ed70a507b9d755e9ad2707
Secunia Security Advisory 45609
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Net-snmp included in Solaris, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | solaris
SHA-256 | c0b046ead3b27f3324e7bb1d950b128a820a1b2aed489750f208f78bfb1b628c
Secunia Security Advisory 45652
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 73911b3f2436964b45cb7b4bdcad89ee1d75e54bc77c2c05c8cb7023c5dc9b5c
Secunia Security Advisory 45651
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | ed39f4c55c06a71f32c0058c158a9336cc102a17b298a54ef5f112baca547b3a
Secunia Security Advisory 45669
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 5657255fdcbc1db1d41f6b1099af09c28efbd1d11fafc14e77d1af145d7d7dbb
Secunia Security Advisory 45627
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in libpango included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | solaris
SHA-256 | d7b7dd6a350401b4552c66a3d4626f4cb8c60a17c3d36b5fcf310303030f851d
Secunia Security Advisory 45650
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | b3a9ed5c8d9632b526fcf58b5795ed0df52788cd04b6dc1ccf35f46ee04a74d2
Secunia Security Advisory 45618
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a weakness in wget included in Solaris, which can be exploited by malicious people to bypass certain security features.

tags | advisory
systems | solaris
SHA-256 | 256605a9c386d05312d5a02d1946b6be6e28ef2fba94a73bfdbd71874db44cf0
Secunia Security Advisory 45610
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in PostgreSQL included in Solaris, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | solaris
SHA-256 | 9535b04ba50153f501d026d7bfb2f704a0c6065a903eaf9c3d888ec4c6132dea
Secunia Security Advisory 44014
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | d1324fe2338fb31116b8e24d70d1599c01ab477bd1fff8a69439904dd4e6aba6
Secunia Security Advisory 45611
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Nortel Media Application Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 86c28e68f064bcc3d71df597477df1f17c94a9ed8b9ed272cfa7a09b00b133cf
Secunia Security Advisory 45607
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged two vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | solaris
SHA-256 | 5f56bb5cd272f8cbecadd09832678ea71e23aaa6e798775bc36efcfedab75435
Secunia Security Advisory 45616
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged multiple vulnerabilities in Firefox included in Solaris, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | solaris
SHA-256 | e54cc09122526158f50767b2c0df7d2bce1409de792364e16ffdf336c5f34c0f
Secunia Security Advisory 45608
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in RealPlayer Enterprise, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 98db388287c126b3879bf66be0afcc35111d28e4572f4fc8bfd2a73fe94511f7
Secunia Security Advisory 45668
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | c475467b864971a4b356ceff0949e30c79c5eacf09436688df2a2dd2fcbd6720
Secunia Security Advisory 45670
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for gdk-pixbuf2. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 82c262c2a330ecae14b22fe35a4addb1ea1f3e7a7695f4755fc68e86f1497e35
Secunia Security Advisory 45656
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in gdk-pixbuf, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library.

tags | advisory, denial of service
SHA-256 | cb4aa8dc49c80e4488a153d2986ce4b1462275f30c212bfdcae34dc11cd06336
Secunia Security Advisory 45653
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in MasqMail, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 53ff750dafc8eec8ffd39f2395b1bea623979174d76a1da78aeeb84ab66f8a51
Secunia Security Advisory 45631
Posted Aug 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SoftwareDEP Classified Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | f4178cd5957cf6166740d8c23ea9d40bbcb8700e2d8a53473914c76377e21609
Zero Day Initiative Advisory 11-269
Posted Aug 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-269 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists due to the fact that RealPlayer allows users to run local HTML files with scripting enabled without any warning. The RealPlayer ActiveX control can be scripted from a web browser to load local HTML files. This can lead to remote code execution under the context of the current user.

tags | advisory, remote, web, arbitrary, local, code execution, activex
advisories | CVE-2011-2947
SHA-256 | b591c6bbdcc4cbe1c3c5610ecba64679b3c35330beac8aa8d30391fb641b40ad
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close