what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 31 RSS Feed

Files Date: 2011-09-21

Ubuntu Security Notice USN-1212-1
Posted Sep 21, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1212-1 - Goldwyn Rodrigues discovered that the OCFS2 filesystem did not correctly clear memory when writing certain file holes. A local attacker could exploit this to read uninitialized data from the disk, leading to a loss of privacy. Timo Warns discovered that the LDM disk partition handling code did not correctly handle certain values. By inserting a specially crafted disk device, a local attacker could exploit this to gain root privileges. Various other issues were also addressed.

tags | advisory, local, root
systems | linux, ubuntu
advisories | CVE-2011-0463, CVE-2011-1017, CVE-2011-1020, CVE-2011-1078, CVE-2011-1079, CVE-2011-1080, CVE-2011-1160, CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1173, CVE-2011-1180, CVE-2011-1182, CVE-2011-1493, CVE-2011-1494, CVE-2011-1495, CVE-2011-1577, CVE-2011-1581, CVE-2011-1593, CVE-2011-1598, CVE-2011-1745, CVE-2011-1746, CVE-2011-1748, CVE-2011-1770, CVE-2011-1771, CVE-2011-1833, CVE-2011-2022, CVE-2011-2484
SHA-256 | f2bd89a7fb4e075ddf3c443cc67ea905e50e3d359edda7464f4642e35cf7b84e
Ubuntu Security Notice USN-1211-1
Posted Sep 21, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1211-1 - It was discovered that the /proc filesystem did not correctly handle permission changes when programs executed. A local attacker could hold open files to examine details about programs running with higher privileges, potentially increasing the chances of exploiting additional vulnerabilities. Dan Rosenberg discovered that the X.25 Rose network stack did not correctly handle certain fields. If a system was running with Rose enabled, a remote attacker could send specially crafted traffic to gain root privileges. Various other issues were also addressed.

tags | advisory, remote, local, root, vulnerability
systems | linux, ubuntu
advisories | CVE-2011-1020, CVE-2011-1493, CVE-2011-1833, CVE-2011-2492, CVE-2011-2689, CVE-2011-2699, CVE-2011-2918
SHA-256 | c722fd7511a442653d720916be5133aeccaba801f39a3fdb017e7ee6b3699415
Trusteer Rapport Key Decryptor / Keylogger
Posted Sep 21, 2011
Authored by mu-b | Site digit-labs.org

Trusteer Rapport key decryptor / keylogger exploit that uses Trusteer's own functionality to 'decrypt' keys directly.

tags | exploit
SHA-256 | c8f6cb87a1da1cd5f8ebbf54d12f5416d0be16db65d6f07abce191af94431441
Trusteer Rapport Key Encryption Switch Off
Posted Sep 21, 2011
Authored by mu-b | Site digit-labs.org

Trusteer Rapport key encryption switch off exploit that switches off anti-keylogger protections on OS X allowing your already existing keylogger to function correctly once again.

tags | exploit
systems | apple, osx
SHA-256 | e487f26a1ce7c3bd190b7b3803f36945aebfe51c050ce618a0da3d61b445f487
Hack.lu 2011 IPv6 Security Presentation
Posted Sep 21, 2011
Authored by Fernando Gont

These are the slides for the IPv6 security talk given at Hack.lu 2011.

tags | paper
SHA-256 | c48839ec6e8c59d1496899d1c7147f00134f8c12a6684faa5ee5150fb0a98546
Clickjacking For Shells
Posted Sep 21, 2011
Authored by Andrew Horton | Site security-assessment.com

Whitepaper called Clickjacking for Shells. Two years after the world was warned about clickjacking, popular web apps are still vulnerable and no web app exploits have been published. With many security pros considering clickjacking to have mere nuisance value on social networks, the attack is grossly underestimated. In this presentation, the author demonstrates step by step how to identify vulnerable applications, how to write exploits that attack web apps and also how to protect against clickjacking.

tags | paper, web, shell
SHA-256 | b6184ace78ff59c01b98abf9251555c43de66e1e8499ccd4c6717f23c36d980f
TunerLabs SQL Injection
Posted Sep 21, 2011
Authored by nGa Sa Lu

TunerLabs suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 45c2e3cca038017758bf5611472cc12116a50f943d8c2ca4f34140b39e1d19a4
Dolphin Browser HD Cross Application Scripting
Posted Sep 21, 2011
Authored by Yair Amit, Roee Hay

Dolphin Browser HD versions prior to 6.1.0 suffer from a cross applications scripting vulnerability.

tags | exploit
advisories | CVE-2011-2357
SHA-256 | fec0542347d11dcaba40a36e576a9a2728f140dc57e324d0e46a4289ce1ef603
Secunia Security Advisory 46100
Posted Sep 21, 2011
Site secunia.com

Secunia Security Advisory -

SHA-256 | c9a78e16dfad3b2f7fb266fe234bf9ad03b6ab9a28c88d2edb9044bcf97872f1
Secunia Security Advisory 46100
Posted Sep 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Rent-A-Car plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c9a78e16dfad3b2f7fb266fe234bf9ad03b6ab9a28c88d2edb9044bcf97872f1
Secunia Security Advisory 46108
Posted Sep 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the LISL Last-Image Slider plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 0774800dc79b6b2f55146f1814113c1f037161a78092943e8250399cf3e74277
Secunia Security Advisory 46036
Posted Sep 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Auto Attachments plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b074a51479b32f245d2644bfefbde15ca9ecf2755f9668a4dd70671bc5820aa4
Secunia Security Advisory 46088
Posted Sep 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Category List Portfolio Page plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b27bd25d37169b90a1d4f570280f942968f617246511389169321fafe7d60c08
TOR Virtual Network Tunneling Tool 0.2.2.33
Posted Sep 21, 2011
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release fixes several bugs and includes a slight tweak to Tor's TLS handshake which makes relays and bridges which run this new version reachable from Iran again.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | 5af42b1cc07704fcbde8bb44380e5a02ebedc75470a132c70022ecb5f8476bcf
Bypassing Microsoft Internet Explorer's XSS Filter
Posted Sep 21, 2011
Authored by Michael Brooks

This is a whitepaper is called Bypassing Microsoft's Internet Explorer Cross Site Scripting Filter.

tags | paper, xss, bypass
SHA-256 | 1d5e74f1e5da2f90ef88920e1f7b0170ec0523060a97714408048591e6e8d1f9
EViews 7.0.0.1 Memory Corruption / Heap Overflow
Posted Sep 21, 2011
Authored by Luigi Auriemma | Site aluigi.org

EViews versions 7.0.0.1 and below suffer from memory corruption and heap overflow vulnerabilities.

tags | exploit, overflow, vulnerability
systems | linux
SHA-256 | be48badc72b4e1d5c824e861b9cf4392dc32970a580ebf2abc57ca1c1f2bcb31
MetaServer RT 3.2.1.450 Heap Overflow / Denial Of Service
Posted Sep 21, 2011
Authored by Luigi Auriemma | Site aluigi.org

MetaServer RT versions 3.2.1.450 and below suffer from heap overflow and denial of service vulnerabilities.

tags | exploit, denial of service, overflow, vulnerability
SHA-256 | 7a443b62dbf2c43b4d149adce2a09d72963021bff26038d582a82a3bcec0adad
Secunia Security Advisory 46095
Posted Sep 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in JasperReports Server, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | b643ff254f555f85f01149c60cb42060244dbf1ef5bb836c71370e669c439191
SharePoint 2007 / 2010 And DotNetNuke File Disclosure
Posted Sep 21, 2011
Authored by Nicolas Gregoire

SharePoint 2007 / 2010 and DotNetNuke versions prior to 6 suffer from a file disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2011-1892
SHA-256 | 8374996d630a396dfa8c66032e2d7425570f3f5bcac4ab501cc5cc12f9a4a0fd
AVCon Buffer Overflow With DEP Bypass
Posted Sep 21, 2011
Authored by Blake

AVCon H323 DEP bypass SEH overwrite exploits that generates malicious input.

tags | exploit, bypass
SHA-256 | e9723bb21ef7e18d46bb58e8632c159ba2ecf3cb81d3cb33337284e8f6f4f5c3
ScriptFTP 3.3 Buffer Overflow
Posted Sep 21, 2011
Authored by modpr0be

ScriptFTP versions 3.3 and below suffer from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 4c3d7bd282a71bbc0d04ab728ecd6d649b96ed1e7f9337d132ef2569f82dde80
Cisco Security Advisory 20110920-ise
Posted Sep 21, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Identity Services Engine (ISE) contains a set of default credentials for its underlying database. A remote attacker could use those credentials to modify the device configuration and settings or gain complete administrative control of the device. Cisco will release free software updates that address this vulnerability on September 30th, 2011. There is no workaround for this vulnerability.

tags | advisory, remote
systems | cisco
advisories | CVE-2011-3290
SHA-256 | f8b64349683d7496a8300593b934d118350bd667fccd7d4bba5b889e0720aff7
Red Hat Security Advisory 2011-1321-01
Posted Sep 21, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1321-01 - The kernel packages contain the Linux kernel. A flaw in skb_gro_header_slow() in the Linux kernel could lead to GRO fields being left in an inconsistent state. An attacker on the local network could use this flaw to trigger a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, redhat
advisories | CVE-2011-2723
SHA-256 | 94d31ed0387d6868b6e7adab496a79ec824e11127ad246421b8615a51ee105f6
i-Gallery 4.1 Source Code Disclosure
Posted Sep 21, 2011
Authored by kurdish hackers team | Site kurdteam.org

i-Gallery version 4.1 suffers from a remote source code disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 1d8463dabdf2e45356673cfb48681ccae5c00563ee20ae15e980da4b932c0af1
i-Gallery 3.4 Source Code Disclosure
Posted Sep 21, 2011
Authored by kurdish hackers team | Site kurdteam.org

i-Gallery version 3.4 suffers from a remote source code disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | ed70f25e15008bfc81925da56f00162c5748a55d9148d460f3937e681304fb28
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close