all things security
Showing 1 - 25 of 37 RSS Feed

Files Date: 2011-12-01

CoDeSys 2.3 Buffer Overflow
Posted Dec 1, 2011
Authored by Celil Unuver

CoDeSys SCADA version 2.3 remote buffer overflow exploit that spawns a shell on port 4444.

tags | exploit, remote, overflow, shell
MD5 | 53b002f0c5f93c8a2166b9e404552a36
Debian Security Advisory 2356-1
Posted Dec 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2356-1 - Several vulnerabilities have been discovered in OpenJDK, an implementation of the Java platform.

tags | advisory, java, vulnerability
systems | linux, debian
advisories | CVE-2011-3389, CVE-2011-3521, CVE-2011-3544, CVE-2011-3547, CVE-2011-3548, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560
MD5 | bf2bb7a9acce8419f4ee636af1cbe1cd
RoundCube 0.6 Content Spoofing / Cross Site Scripting
Posted Dec 1, 2011
Authored by MustLive

RoundCube version 0.6 suffers from cross site scripting, content spoofing, brute force and clickjacking inclusion vulnerabilities.

tags | exploit, spoof, vulnerability, xss
MD5 | d03bb67175df26d5b085168489904317
InfoSec Southwest 2012 Call For Papers
Posted Dec 1, 2011
Authored by I)ruid | Site infosecsouthwest.com

The InfoSec Southwest staff are now soliciting papers to be presented at their 2012 conference to be held March 30th through April 1st, 2012 in Austin, Texas.

tags | paper, conference
MD5 | d4db8a92ec473073a5b4c4bc9995fe45
Red Hat Security Advisory 2011-1508-01
Posted Dec 1, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1508-01 - The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support. An authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially-crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature.

tags | advisory, remote, imap
systems | linux, redhat
advisories | CVE-2011-3372, CVE-2011-3481
MD5 | 33665b3c67f3189c990594826a6afcae
Red Hat Security Advisory 2011-1507-01
Posted Dec 1, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1507-01 - The libarchive programming library can create and read several different streaming archive formats, including GNU tar and cpio. It can also read ISO 9660 CD-ROM images. Two heap-based buffer overflow flaws were discovered in libarchive. If a user were tricked into expanding a specially-crafted ISO 9660 CD-ROM image or tar archive with an application using libarchive, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-1777, CVE-2011-1778
MD5 | 143b69d86cd662804abf439411c672b3
Red Hat Security Advisory 2011-1506-01
Posted Dec 1, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1506-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, the regular 7 year life-cycle of Red Hat Enterprise Linux 4 will end on February 29, 2012. After this date, Red Hat will discontinue the regular subscription services for Red Hat Enterprise Linux 4.

tags | advisory
systems | linux, redhat
MD5 | ba143456845d6ee6d6b4d4d0bdb53706
Ariadne 2.7.6 Cross Site Scripting
Posted Dec 1, 2011
Authored by Stefan Schurtz

Ariadne version 2.7.6 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 4aaab1f8075b12a1a27a5203188724ef
HP Security Bulletin HPSBPI02728 SSRT100692
Posted Dec 1, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI02728 SSRT100692 - A potential security vulnerability has been identified with certain HP printers and HP digital senders. The vulnerability could be exploited remotely to install unauthorized printer firmware. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2011-4161
MD5 | 10a9384e7bec0ce33dd67388166a9165
Hero Framework 3.69 Cross Site Scripting
Posted Dec 1, 2011
Authored by LiquidWorm | Site zeroscience.mk

Hero Framework version 3.69 suffers form a reflected cross site scripting vulnerability when malicious input is passed to the month variable.

tags | exploit, xss
MD5 | 34801506635fcd749faee8323e587012
CSRFScanner 1.0
Posted Dec 1, 2011
Authored by Romain MILLET, VULNIT, Jeremy Rovelli, Thibault de Lacheze-Murel | Site vulnit.com

CSRFSCanner is a tool designed to identify the forms potentially vulnerable to CSRF/XSRF on a website. This detection is made on forms that are only accessible by logged-in users (cookies are needed to find these forms). The methodology used to identify these forms is the 4-pass reverse diff analysis. Then, in order to determine if a form may be vulnerable, the tool analyzes hidden and password fields to find an anti-CSRF token.

tags | tool, scanner
systems | unix
MD5 | 4d7379f8b72c66d21b2d10ed8ed273f8
XssScanner 1.1
Posted Dec 1, 2011
Authored by Romain MILLET, VULNIT | Site vulnit.com

XssScanner is a tool designed to help penetration testers find cross site scripting vulnerabilities. It analyzes a webpage to determine which are the payloads that could be used according to the position of the parameter. Then, for each selected payload, XssScanner sends a request using the payload and checks the returned page to find the payload. The major feature of XssScanner is its ability to detect many encodings that do not change the behavior of the payload (eg: double quote encoded into ").

tags | tool, scanner, vulnerability, xss
systems | unix
MD5 | 81a8c81d88805ecc5d92819b6a859f6e
Digital Whisper Electronic Magazine #27
Posted Dec 1, 2011
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 27. Written in Hebrew.

tags | magazine
MD5 | 47f317985ef2234855535111cc628acf
Secunia Security Advisory 47035
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the Webform Validation module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | c87aa42e85e4490b9e8021e0819e29c3
Secunia Security Advisory 47054
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cups. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 513a277f65377a620d31e1db2a176aa7
Secunia Security Advisory 47012
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dognaedis has discovered two vulnerabilities in AtMail Open, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | e1ba258981a02b03fb12c1f4965e83bc
Secunia Security Advisory 47053
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Adobe Flex, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 9fa3f1546becb6e2ae08c029e62da27a
Secunia Security Advisory 47067
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Serv-U, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 74712676be0ad229b6b1a346859cf4fc
Secunia Security Advisory 47008
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a weakness and two vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and to cause a DoS (Denial of Service) and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
MD5 | 5334dd73d67764fcd8fc39a7321bbf72
Secunia Security Advisory 46847
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in lighttpd, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | aaee19c4ddd75b0b89a74b06296a816e
Secunia Security Advisory 47015
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in the Proc::ProcessTable module for Perl, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local, perl
MD5 | 2a616a44b69ece129a8149cce2c491bb
Secunia Security Advisory 47056
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the Support Ticketing System module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | bd9f41853a22ac591200c6de37bbd5e7
Secunia Security Advisory 47030
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the Support Timer module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | bfd29c1c1cc246d3d27de3c63138fe94
Secunia Security Advisory 47021
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kingcope has discovered a vulnerability in Serv-U, which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
MD5 | 3641dcfd93992fc12c8cdfd1a13325af
Secunia Security Advisory 47018
Posted Dec 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in CoDeSys, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | db3efbb4460c4b1041724dcb580bc91f
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    22 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close