Twenty Year Anniversary
Showing 1 - 25 of 53 RSS Feed

Files Date: 2012-02-17

Secunia Security Advisory 48072
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | 9df59685a4326d59c883c00f5344aa1c
Secunia Security Advisory 47998
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in WebSphere DataPower SOA Appliances, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.

tags | advisory
MD5 | 2c5f00d9aef94afbc319a23dacd14e9b
Secunia Security Advisory 48020
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in the Organic Groups Vocabulary module for Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 3e27157bce855db26da46b8f9cbf0a0a
Secunia Security Advisory 48056
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sony has discovered a vulnerability in Jenkins, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | cf988c04ba40f238405fc4dbf8009f5c
Secunia Security Advisory 48025
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
MD5 | cd67936f5ae596b4a03c68c7c3134665
Secunia Security Advisory 48074
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged multiple vulnerabilities in Hitachi Cosminexus products, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | b4ba720a69d19c0989a93f774119bcc0
Secunia Security Advisory 48070
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox and seamonkey. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | c9ac559f562abd247546ee93f4211e3c
Secunia Security Advisory 48069
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for xulrunner. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | 659b27dc5431e35476f41ac84af590f9
Secunia Security Advisory 47835
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in swDesk, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | b7bc9ae7bbc7b965db8858d6d791ed4e
Secunia Security Advisory 48089
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mozilla has acknowledged a vulnerability in Firefox, Thunderbird, and Seamonkey, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | 89b9ad6f3805051cdac343ae77b7fc93
Secunia Security Advisory 48006
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, suse
MD5 | aa70bb561a61a12e7b74287389aa740e
Secunia Security Advisory 48012
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, redhat
MD5 | 73770b17fedc11c3129e17e5c09ec5bf
Secunia Security Advisory 48013
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has discovered multiple vulnerabilities in SQL Buddy, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | dc69c0191586ae3b6de8573e7354c9dc
Secunia Security Advisory 47950
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in swDesk, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | 260d913e39a1aaccb08c8bd1193c1f7b
Secunia Security Advisory 48010
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Piwik, which can be exploited by malicious people to conduct cross-site scripting and forgery attacks.

tags | advisory, vulnerability, xss
MD5 | 66ccdd97343eaeed0af17008d2407430
Secunia Security Advisory 48016
Posted Feb 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 00135f9b4679a841c6966cd0230fd8c7
R2 1.65 Stack Overflow / Directory Traversal / Brute Forcing
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

R2 versions 1.65 and below suffer from stack overflow, PIN brute forcing, and directory traversal vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | 89980e1bd9e80ecbc479185a8063a80d
Novell GroupWise Messenger 2.1.0 Arbitrary Memory Write
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

Novell GroupWise Messenger versions 2.1.0 and below suffer from an arbitrary memory write vulnerability. Proof of concept code included.

tags | exploit, arbitrary, proof of concept
systems | linux
MD5 | 1c4dab8bd719e7ad36939e5a219e45bf
Novell GroupWise Messenger 2.1.0 Memory Corruption
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

Novell GroupWise Messenger versions 2.1.0 and below suffer from a memory corruption vulnerability. Proof of concept code included.

tags | exploit, proof of concept
systems | linux
MD5 | a3264996d4507d2fb61bcf255efa34bd
Novell GroupWise Messenger Client 2.1.0 Unicode Stack Overflow
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

Novell GroupWise Messenger Client versions 2.1.0 and below suffer from a unicode stack overflow vulnerability. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | 31187ed87f4d43291a5e81bcfa24524c
XnView 1.98.5 Integer / Heap Overflows
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

XnView versions 1.98.5 and below suffer from an integer overflow and multiple heap overflows. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | 6d5dbe1b14e11651821693877b2e0f5a
R4 1.25 Overflows / Directory Traversal
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

R4 versions 1.25 and below suffer from stack overflows, a heap overflow, and a directory traversal vulnerability.

tags | exploit, overflow
MD5 | 4becbc0586fa6f248aaff1c3084f2812
Java MixerSequencer Object GM_Song Structure Handling
Posted Feb 17, 2012
Authored by Peter Vreugdenhil, juan vazquez | Site metasploit.com

This Metasploit module exploits a flaw within the handling of MixerSequencer objects in Java 6u18 and before. Exploitation id done by supplying a specially crafted MIDI file within an RMF File. When the MixerSequencer objects is used to play the file, the GM_Song structure is populated with a function pointer provided by a SONG block in the RMF. A Midi block that contains a MIDI with a specially crafted controller event is used to trigger the vulnerability. When triggering the vulnerability "ebx" points to a fake event in the MIDI file which stores the shellcode. A "jmp ebx" from msvcr71.dll is used to make the exploit reliable over java updates.

tags | exploit, java, shellcode
advisories | CVE-2010-0842, OSVDB-63493
MD5 | 832d568f84262995932885096374fd29
Horde 3.3.12 Backdoor Arbitrary PHP Code Execution
Posted Feb 17, 2012
Authored by Eric Romang, jduck | Site metasploit.com

This Metasploit module exploits an arbitrary PHP code execution vulnerability introduced as a backdoor into Horde 3.3.12 and Horde Groupware 1.2.10.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2012-0209
MD5 | c67d692d4c351361a41b41a368ecd76d
Skype 5.6.59.x Memory Corruption
Posted Feb 17, 2012
Authored by Benjamin Kunz Mejri, Alexander Fuchs | Site vulnerability-lab.com

Skype version 5.6.59.x suffers from a memory corruption vulnerability.

tags | advisory
MD5 | a4510a19fc72c5bf740d58cdfee486ba
Page 1 of 3
Back123Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    16 Files
  • 17
    Aug 17th
    22 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close