what you don't know can hurt you
Showing 1 - 25 of 64 RSS Feed

Files Date: 2011-08-31

Red Hat Security Advisory 2011-1243-01
Posted Aug 31, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1243-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. It was found that a Certificate Authority issued a fraudulent HTTPS certificate. This update renders any HTTPS certificates signed by that CA as untrusted, except for a select few. The now untrusted certificates that were issued before July 1, 2011 can be manually re-enabled and used again at your own risk in Thunderbird; however, affected certificates issued after this date cannot be re-enabled or used. All Thunderbird users should upgrade to this updated package, which resolves this issue. All running instances of Thunderbird must be restarted for the update to take effect.

tags | advisory, web
systems | linux, redhat
MD5 | 0e03cc31929ca60dd1f939bf86d48d78
Red Hat Security Advisory 2011-1242-01
Posted Aug 31, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1242-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. It was found that a Certificate Authority issued a fraudulent HTTPS certificate. This update renders any HTTPS certificates signed by that CA as untrusted, except for a select few. The now untrusted certificates that were issued before July 1, 2011 can be manually re-enabled and used again at your own risk in Firefox; however, affected certificates issued after this date cannot be re-enabled or used. All Firefox users should upgrade to these updated packages, which contain a backported patch. After installing the update, Firefox must be restarted for the changes to take effect.

tags | advisory, web
systems | linux, redhat
MD5 | 9a2349defe71bbc1b6f7003cd58783d7
Red Hat Security Advisory 2011-1241-01
Posted Aug 31, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1241-01 - eCryptfs is a stacked, cryptographic file system. It is transparent to the underlying file system and provides per-file granularity. eCryptfs is released as a Technology Preview for Red Hat Enterprise Linux 5 and 6. The setuid mount.ecryptfs_private utility allows users to mount an eCryptfs file system. This utility can only be run by users in the "ecryptfs" group. A race condition flaw was found in the way mount.ecryptfs_private checked the permissions of a requested mount point when mounting an encrypted file system. A local attacker could possibly use this flaw to escalate their privileges by mounting over an arbitrary directory.

tags | advisory, arbitrary, local
systems | linux, redhat
advisories | CVE-2011-1831, CVE-2011-1832, CVE-2011-1834, CVE-2011-1835, CVE-2011-1837, CVE-2011-3145
MD5 | 1694c3f90d3c7b2d523bc306a63ba00c
Sardus SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Sardus suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 09980c02a5973735d6ed548c33a52091
iProv CMS Cross Site Scripting / SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

iProv CMS suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 48cc3c6644dd8f2e45a17595d3f384f1
D-Tekweb SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

D-Tekweb suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | d15a74643e054494d06a93514d0ad00c
Dream Factory Cross Site Scripting / SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Dream Factory suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | f83443e7f4e5038115b62ab0d12b8e6c
Red Hat Security Advisory 2011-1240-01
Posted Aug 31, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1240-01 - This is the 6-month notification of the End Of Life plans for Red Hat Enterprise Linux 4.

tags | advisory
systems | linux, redhat
MD5 | ea9a8740fecf02331b466f0dbac4e914
Red Hat Security Advisory 2011-1239-01
Posted Aug 31, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1239-01 - This is the End of Life notification for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 4.7.

tags | advisory
systems | linux, redhat
MD5 | 57db3ed2cd4400b3be104ccfd522fb24
WordPress Redirection 2.2.8 Cross Site Scripting
Posted Aug 31, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Redirection plugin version 2.2.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | a3920a58c71f94ab609eae9962ab1b56
Zero Day Initiative Advisory 11-277
Posted Aug 31, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-277 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles 'mp4v' codec information. When parsing the video description table it will read the size field preceding the 'mp4v' tag and use that size to create an allocation to hold the data. It will then copy the correct amount of data into that buffer, but then does some endian changes on a fixed portion of the buffer without checking its size. The resulting memory corruption could result in remote code execution under the context of the current user.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-0258
MD5 | a3dd4716a54963b77e886fd3f67b21dc
Debian Security Advisory 2300-1
Posted Aug 31, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2300-1 - Several unauthorised SSL certificates have been found in the wild issued for the DigiNotar Certificate Authority, obtained through a security compromise with said company. Debian, like other software distributors, has as a precaution decided to disable the DigiNotar Root CA by default in the NSS crypto libraries.

tags | advisory, root, crypto
systems | linux, debian
MD5 | c536f0e78e2b245da2edac0ef79e837a
Debian Security Advisory 2299-1
Posted Aug 31, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2299-1 - An unauthorized SSL certificate has been found in the wild issued the DigiNotar Certificate Authority, obtained through a security compromise with said company. Debian, like other software distributors, has as a precaution decided to disable the DigiNotar Root CA by default in its ca-certificates bundle.

tags | advisory, root
systems | linux, debian
MD5 | 0e562f8cc6272e92c9bc1d374a9311ab
SLADS CMS SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

SLADS CMS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 34c2da423051ad338542b257dc8b80bf
Make Art CMS SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Make Art CMS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6dc83edad63381263e56f2a05f28aab0
AR Solutions SQL Injection
Posted Aug 31, 2011
Authored by ruben_linux

AR Solutions suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | f66fff2878fc22a812d730a4b88772cd
Web Professional SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Web Professional suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
MD5 | d24a725e48d20cb8bb63a3d2309506de
Officine Digitali SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Officine Digitali suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a3c67bb8c116c644fe31a7869d2cb833
Idea Web Agency SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Idea Web Agency suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, web, sql injection
MD5 | a742a4f2455b907c90e9de6727c5246c
GMDS CMS SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

GMDS CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ceeff6a8e76dee334dafef47440fc9a5
Different Web SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Different Web suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
MD5 | 4450d8410d48d5c8ffbaa4acb3579ebb
SQL-Ledger 2.8.33 / LedgerSMB 1.2.24 SQL Injection
Posted Aug 31, 2011
Authored by Chris Travers

SQL-Ledger versions 2.8.33 and below and LedgerSMB versions 1.2.24 and below suffer from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
MD5 | bfe294cd4b1b21395f42a22491567ca9
Cisco Security Advisory 20110831-tandberg
Posted Aug 31, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs that are running software versions prior to TC4.0.0 or F9.1 contain a vulnerability that could allow an attacker to cause a denial of service. Cisco has released free software updates that address this vulnerability.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2011-2577
MD5 | 6ba516d510a5b4841fcd9444d5a6d5c5
DragoflyBSD PortBind TCP/31337 Shellcode
Posted Aug 31, 2011
Authored by KedAns-Dz

98 bytes small DragonflyBSD portbinding shellcode that spawns on tcp/31337.

tags | tcp, shellcode
MD5 | c193fa24bb15f9451ef8e165de8de12a
Serendipity Weblog SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Serendipity Weblog suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 4cdf4b8f7db1368a2808ac966f43eaf5
Page 1 of 3
Back123Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    31 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close