Exploit the possiblities
Showing 1 - 25 of 25 RSS Feed

Files Date: 2011-11-29

Secunia Security Advisory 47026
Posted Nov 29, 2011
Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for apt. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks.

MD5 | 0f4d182dd6f043de4b0caf3e2ae20f69
Secunia Security Advisory 47026
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for apt. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, ubuntu
MD5 | 0f4d182dd6f043de4b0caf3e2ae20f69
Secunia Security Advisory 47024
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for update-manager. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to disclose sensitive information and by malicious people to conduct spoofing attacks.

tags | advisory, local, spoof
systems | linux, ubuntu
MD5 | 1b8944ca9b8007dfd8416fe83eb55fba
Secunia Security Advisory 47046
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in multiple Schneider Electric products, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, and compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | 91b6c948e35ff03718e5120257088490
Secunia Security Advisory 47028
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 4a911dcd4412e11418fc23f90f6cf26e
Secunia Security Advisory 47047
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nick Freeman has discovered a vulnerability in Avid Media Composer, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 71b81601a515026855f8c5332f45d883
Secunia Security Advisory 46991
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nick Freeman has discovered a vulnerability in Virtual Vertex Muster, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | fcfcf4ab97d08e2ae8c1c37d11d481b5
Secunia Security Advisory 47027
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, fedora
MD5 | a1f70fe5871f01fdc4bd32415ec5d717
Secunia Security Advisory 47048
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apache MyFaces, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | c19ce0e374b75eaea85882f4b65916ff
Secunia Security Advisory 46959
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle Mojarra, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 6b0720565498d5c050937ee1fd5a270a
Secunia Security Advisory 47029
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been discovered in MediaWiki, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | e899efec610fe6e61dfdfe79a5a89985
Secunia Security Advisory 46998
Posted Nov 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Gitblit, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | d8bd096e4502649a1b5d48098f134948
Vega Web Security Scanner 1.0 Beta Windows 64 Bit
Posted Nov 29, 2011
Authored by Subgraph | Site subgraph.com

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Windows 64-bit version.

tags | tool, web, scanner, javascript, vulnerability, xss, sql injection
systems | windows, unix
MD5 | 443659b64e2e92bf63a5835f46a29672
Vega Web Security Scanner 1.0 Beta Windows 32 Bit
Posted Nov 29, 2011
Authored by Subgraph | Site subgraph.com

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Windows 32-bit version.

tags | tool, web, scanner, javascript, vulnerability, xss, sql injection
systems | windows, unix
MD5 | 2ee91bca51dd6f2acb4b8b86f76eb4e7
Vega Web Security Scanner 1.0 Beta Linux 64 Bit
Posted Nov 29, 2011
Authored by Subgraph | Site subgraph.com

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Linux 64-bit version.

tags | tool, web, scanner, javascript, vulnerability, xss, sql injection
systems | linux, unix
MD5 | 8ef3d1ed87dc5eb63e8b6a17f7974c4c
Vega Web Security Scanner 1.0 Beta Linux 32 Bit
Posted Nov 29, 2011
Authored by Subgraph | Site subgraph.com

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Linux 32-bit version.

tags | tool, web, scanner, javascript, vulnerability, xss, sql injection
systems | linux, unix
MD5 | 8419cb08c608773642a79d86b84b01da
Vega Web Security Scanner 1.0 Beta Mac OS X 64 Bit
Posted Nov 29, 2011
Authored by Subgraph | Site subgraph.com

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Mac OS X 64-bit version.

tags | tool, web, scanner, javascript, vulnerability, xss, sql injection
systems | unix, apple, osx
MD5 | ba117340fec4b22ec30bd7e8569f8ff2
Vega Web Security Scanner 1.0 Beta Mac OS X 32 Bit
Posted Nov 29, 2011
Authored by Subgraph | Site subgraph.com

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Mac OS X 32-bit version.

tags | tool, web, scanner, javascript, vulnerability, xss, sql injection
systems | unix, apple, osx
MD5 | 212c508f3d3ce663a676d4790a8d6b3e
Zero Day Initiative Advisory 11-338
Posted Nov 29, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-338 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a header defined within a .ivr file. When parsing this header the application will explicitly trust a 16-bit value denoting an size and use it for performing an allocation. The code then uses a different value in the file to populate the buffer. Due to the difference in values used for allocation and the copy, this can be used to overwrite data outside the bounds of the buffer which can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-4258
MD5 | c03baf8f1f878fff1d40743cf60e284a
Zero Day Initiative Advisory 11-337
Posted Nov 29, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-337 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses sample data encoded with the RV30 codec. When parsing this sample data, the application will make an allocation and then fail to completely initialize the buffer. During decoding of the sample data, the application will explicitly trust an index from the partially filled buffer and then use that to calculate an address to write to. This can lead to memory corruption which can be converted into code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-4256
MD5 | 10f78e6d499d58655257bf60e10da003
Mandriva Linux Security Advisory 2011-180
Posted Nov 29, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-180 - crypt_blowfish before 1.1, as used in suhosin does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash. The updated packages have been patched to correct this issue.

tags | advisory
systems | linux, mandriva
advisories | CVE-2011-2483
MD5 | 01ab194abf58d17b2acb3d352ec515e0
Ubuntu Security Notice USN-1284-1
Posted Nov 29, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1284-1 - David Black discovered that Update Manager incorrectly extracted the downloaded upgrade tarball before verifying its GPG signature. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to replace arbitrary files. David Black discovered that Update Manager created a temporary directory in an insecure fashion. A local attacker could possibly use this flaw to read the XAUTHORITY file of the user performing the upgrade. Various other issues were also addressed.

tags | advisory, remote, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2011-3152, CVE-2011-3154
MD5 | 8cee38d0feff3f4716595c226ca3dad8
Zero Day Initiative Advisory 11-336
Posted Nov 29, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-336 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists when a user attempts to play a malicious video file containing a malformed codec name. When playing a malformed codec, the application will incorrectly free an object and then later attempt to use it by calling a virtual method pointer upon destruction. This can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-4255
MD5 | 63d734413f7266b82383dfb793546a81
Manx 1.0.1 Directory Traversal
Posted Nov 29, 2011
Authored by LiquidWorm | Site zeroscience.mk

Manx version 1.0.1 suffers from a directory traversal vulnerability in simplexml_load_file().

tags | exploit
MD5 | 63d6ce08cc9299879ebc3da4531ee245
Android content:// Information Disclosure
Posted Nov 29, 2011
Authored by Thomas Cannon

Android versions prior to 2.3.4 suffer from content:// URI information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
advisories | CVE-2010-4804
MD5 | c76756a14bf0b1c1e5b0709139a60f1f
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    14 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close