exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2011-12-14

Secunia Security Advisory 47254
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in OpenStack Compute (Nova), which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | a4284561d7cc566f53d416cedca16012c7bc338fcb88d308510cc8c9fcf1361d
Secunia Security Advisory 47247
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for nova. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | eb2351617db0c3a0707457da06f36253bec7dab7a7a0863ed57ab8f2a257adff
Secunia Security Advisory 47146
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the International Components for Unicode (ICU), which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
SHA-256 | 9d96322c24fb138abe77b00390380cea4ba78e3868e09a88b8f914002da0ecb4
Secunia Security Advisory 47232
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Splunk, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
SHA-256 | 78c918dde9a7687d1fc97e4616b0964af358dd675a8ee5844dc6c0dae983fd32
Secunia Security Advisory 47005
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Social Book Facebook clone 2010, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | fe18893f97c1e730f0706e1c40988dd1f457858d4ccd20e2eb93ec49fa98f030
Secunia Security Advisory 47225
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and two vulnerabilities have been reported in Pulse Pro CMS, which can be exploited by malicious people to disclose sensitive information and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | e6044eaeb7f9308639fc91c1eed77b7df96e1acea183c9fcfddaf17e21d0d7b0
Secunia Security Advisory 46766
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered a vulnerability in PHP-SCMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, php, xss
SHA-256 | dcaf4567aa03fc2ecb52fd1a36eef3cf95d9d727a3c98fb6d69183fbf32216dc
Secunia Security Advisory 47255
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in RSA Adaptive Authentication, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | 589cc1bb2bd3f7726b387380b1e5310c49038f75c6f45412180111f5f199f489
Secunia Security Advisory 47222
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to manipulate certain data and perform certain actions with escalated privileges.

tags | advisory, local, vulnerability
systems | aix
SHA-256 | 47470338592c50d11d99d4c8eab74302d5ae765d6754ffc5c4f0eea430012d31
Secunia Security Advisory 47218
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 91af0a7074f799534153ef9ea2785851eab679b1466b41452c1c1d1e8b64ced9
Secunia Security Advisory 47250
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Fork CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 439067b1fc32fc43a7622274752933ff512eb227b970614908e69fbe354284b2
Secunia Security Advisory 47178
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
SHA-256 | a84250445f6ace3f3120f0bd7c1d348c9edc09a470f7b3d447ac6c0bcfa3563d
Secunia Security Advisory 47212
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to disclose sensitive information and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 5e59d9f3c10d3e199e1e365749e0b4729cc59f61ea968501b6cc33ed9750a587
Secunia Security Advisory 47195
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cacti, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
SHA-256 | 5ed69403f1c217b52f7d053abc19514a0c2d57bfa163efdf3552c51673a32869
Secunia Security Advisory 47186
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ec2. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | c257e59db31567343d5f5fb12fa022c390f416a9c699536d8cb3206d40610c76
Secunia Security Advisory 47198
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the SCORM Cloud For WordPress plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 020808bdd28e0ba9691ebf8bdd0039af732c50e5e2337854c7c5e071062b1007
Secunia Security Advisory 47060
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-mvl-dove. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people to cause a DoS.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | a71d1dd83eedc90b4b30cb4e804aa5c287c739385b85b6dc690690d2a636a6d5
Secunia Security Advisory 46996
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ti-omap4. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | b6d668bdf075604752e9c96ab2463868b3a321b18b28e85d5f166623a636e576
ICS-ALERT 11-346-01 - Schneider Electric Quantum Ethernet Module
Posted Dec 14, 2011
Authored by ICS-CERT | Site ics.cert.org

ICS-Alert 11-346-01 - On December 12, 2011, independent security researcher Rubén Santamarta publicly announced details of multiple vulnerabilities affecting the Schneider Electric Quantum Ethernet Module. Prior to publication, Mr. Santamarta notified ICS-CERT of the vulnerabilities. ICS-CERT is coordinating mitigations with Mr. Santamarta and Schneider Electric. Schneider has produced a fix for two of the reported vulnerabilities and is continuing to develop additional mitigations.

tags | advisory, vulnerability
SHA-256 | 9778d7636ef3e4a79ff7e21dffc414c0bcb49002566536caf10085dd1ba06dcc
Zero Day Initiative Advisory 11-348
Posted Dec 14, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-348 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within nnmRotConfig.exe CGI program. When processing crafted nameParams parameters, there exists an insufficient boundary check that can lead to a insufficient heap buffer, enabling a heap overflow. This can lead to memory corruption which can be leveraged to execute arbitrary code under the context of the target service.

tags | advisory, remote, overflow, arbitrary, cgi
advisories | CVE-2011-3165
SHA-256 | 8b34d80ef01f16adfe54e85e1bc39fc4193f07b869044663840aeecfaefde141
i4Style Web Design SQL Injection / Cross Site Scripting
Posted Dec 14, 2011
Authored by AngelParrot

i4Style Web Design suffer from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, web, vulnerability, xss, sql injection
SHA-256 | 1c38a500e4e3bdab6965199201e8033eaa702be19dfcba11c26c7d32d01d9ef3
Red Hat Security Advisory 2011-1815-01
Posted Dec 14, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1815-01 - The International Components for Unicode library provides robust and full-featured Unicode services. A stack-based buffer overflow flaw was found in the way ICU performed variant canonicalization for some locale identifiers. If a specially-crafted locale representation was opened in an application linked against ICU, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. All users of ICU should upgrade to these updated packages, which contain a backported patch to resolve this issue. All applications linked against ICU must be restarted for this update to take effect.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-4599
SHA-256 | 80064f93a00c591c9eb00ee3c62f207e8ca534830ec5880d7ae14456ad08780d
Red Hat Security Advisory 2011-1814-01
Posted Dec 14, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1814-01 - The ipmitool package contains a command line utility for interfacing with devices that support the Intelligent Platform Management Interface specification. IPMI is an open standard for machine health, inventory, and remote power control. It was discovered that the IPMI event daemon created its process ID file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. All users of ipmitool are advised to upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the IPMI event daemon will be restarted automatically.

tags | advisory, remote, arbitrary, local
systems | linux, redhat
advisories | CVE-2011-4339
SHA-256 | 62add3e212c5b9df0506f9c22fdba3b39dd6ac36a3e365b075092f91e980f787
Red Hat Security Advisory 2011-1813-01
Posted Dec 14, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1813-01 - Updated kernel packages that fix several security issues and various bugs are now available for Red Hat Enterprise Linux 5.6 Extended Update Support.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2011-2482, CVE-2011-2491, CVE-2011-2495, CVE-2011-2517, CVE-2011-2519, CVE-2011-2901
SHA-256 | 3b16278bac583a2c1428428c3ee68d41f050c60bf38ba7270277894b824802f2
Zero Day Initiative Advisory 11-347
Posted Dec 14, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-347 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word 2007/2010. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application handles a border containing a specific property. When parsing this property, the application will incorrectly free it. If the application attempts to render the object, a use-after-free condition can be made to occur. This can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-1983
SHA-256 | c998ca3897ccbe8974534d8594685d9229d85af0647b8834346c4f9d08b43858
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close