exploit the possibilities
Showing 1 - 25 of 34 RSS Feed

Files Date: 2012-06-05

Ubuntu Security Notice USN-1462-1
Posted Jun 5, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1462-1 - Dan Luther discovered that Bind incorrectly handled zero length rdata fields. A remote attacker could use this flaw to cause Bind to crash or behave erratically, resulting in a denial of service. It was discovered that Bind incorrectly handled revoked domain names. A remote attacker could use this flaw to cause malicious domain names to be continuously resolvable even after they have been revoked.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2012-1667, CVE-2012-1033, CVE-2012-1033, CVE-2012-1667
MD5 | a8a4a361e684549df3a403d90bf6d16d
Ubuntu Security Notice USN-1461-1
Posted Jun 5, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1461-1 - It was discovered that PostgreSQL incorrectly handled certain bytes passed to the crypt() function when using DES encryption. An attacker could use this flaw to incorrectly handle authentication. It was discovered that PostgreSQL incorrectly handled SECURITY DEFINER and SET attributes on procedural call handlers. An attacker could use this flaw to cause PostgreSQL to crash, leading to a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2012-2143, CVE-2012-2655, CVE-2012-2143, CVE-2012-2655
MD5 | b046400016ac6c335e39243cf3d44777
Red Hat Security Advisory 2012-0710-01
Posted Jun 5, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0710-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers with graphics cards that have hardware acceleration enabled.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2011-3101, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1944, CVE-2012-1945, CVE-2012-1946, CVE-2012-1947
MD5 | fffd5b4c1d3eb173d69f16851930053b
Debian Security Advisory 2486-1
Posted Jun 5, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2486-1 - It was discovered that BIND, a DNS server, can crash while processing resource records containing no data bytes. Both authoritative servers and resolvers are affected.

tags | advisory
systems | linux, debian
advisories | CVE-2012-1667
MD5 | 4972bc1a97a98d96f0f5150fc97da847
Mandriva Linux Security Advisory 2012-087
Posted Jun 5, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-087 - Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-2944
MD5 | 428226cf6b67d4a0c691e9e479e55678
WordPress Nmedia WP Member Conversation 1.35.0 Shell Upload
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress Nmedia WordPress Member Conversation plugin version 1.35.0 suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | 7ac3af614de55bcd733496aca69ff83a
WordPress WP Mass Mail Spoofing
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress WP Mass Mail plugin version 2.45 suffers from a mass mailing vulnerability without authentication.

tags | exploit
MD5 | cbc5d1b983a8faf0ebceefa6b7376781
WordPress Asset Manager 0.2 Shell Upload
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress Asset Manager plugin version 0.2 suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | e636a0fd2fb7ae3fab6aabc3a7dd27ec
WordPress Comment Extra Fields Shell Upload
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress Comment Extra Fields plugin version 1.7 suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | 92cf73a062aceebaf7e33fe9df3f2848
WordPress Foxypress Shell Upload
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress Foxypress plugin versions 0.4.1.1 through 0.4.2.1 suffer from a shell upload vulnerability.

tags | exploit, shell
MD5 | 0faddd89ca8f416922a94906aee21068
WordPress Nmedia User File Uploader Shell Upload
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress Nmedia User File Uploader plugin version 1.8 suffers from a shell upload vulnerability.

tags | exploit, shell, file upload
MD5 | 5f8458b96e207f0776dccee398eabb67
StyleDesign CMS SQL Injection
Posted Jun 5, 2012
Authored by s3ri0s bl@ck

StyleDesign CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6ca9580956ff797b23ea8dda22bd94e7
WordPress HT-Poi Shell Upload
Posted Jun 5, 2012
Authored by Mr.XpR

WordPress HT-Poi plugin suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | 98475e3983b037159d7df2e1f0731c6c
Technical Cyber Security Alert 2012-156A
Posted Jun 5, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-156A - X.509 digital certificates issued by the Microsoft Terminal Services licensing certificate authority (CA) can be illegitimately used to sign code. This problem was discovered in the Flame malware. Microsoft has released updates to revoke trust in the affected certificates.

tags | advisory
MD5 | 580a5294899e774369e7c71deccb7243
WordPress HTML5 AV Manager 0.2.7 Shell Upload
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress HTML5 AV Manager plugin version 0.2.7 suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | d32b11ba7f8d157c9f4072589f2360ac
WordPress Google Maps Via Store Locator Plus Email Spool / SQL Injection
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress Google Maps via Store Locator plugin versions 2.7.1 through 3.0.1 suffer from information disclosure, email spoofing, and remote blind SQL injection vulnerabilities.

tags | exploit, remote, spoof, vulnerability, sql injection, info disclosure
MD5 | 527fea7a2fccf71cfebc767de890355d
WordPress WP-Property 1.35.0 Shell Upload
Posted Jun 5, 2012
Authored by Sammy FORGIT

WordPress WP-Property plugin version 1.35.0 suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | 15614339f02296588d9dcdc5e9acdb91
Sielco Sistemi Winlog 2.07.14 Buffer Overflow
Posted Jun 5, 2012
Authored by m1k3

Sielco Sistemi Winlog version 2.07.14 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | a0cce9722a0dd28ae724251b8e31a07f
Secunia Security Advisory 49385
Posted Jun 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in @WEB ShoppingCart, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, xss
MD5 | 6bbcca741556f17491e03aa95d2ce6d9
Secunia Security Advisory 49350
Posted Jun 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for php5. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, suse
MD5 | dac41975785cc1d68bd5b7745c4ae8c9
Secunia Security Advisory 49346
Posted Jun 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 65340bfbbc3852db4ded593d8edb5c13
Secunia Security Advisory 49392
Posted Jun 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | 5bf3307016e6c20f5e086a65a4d9a7eb
Secunia Security Advisory 49399
Posted Jun 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Theme My Login plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 25cac8ad128b426f36c74285ea2b9a73
Secunia Security Advisory 49357
Posted Jun 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Spentera has discovered a vulnerability in Hexamail Server, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | 9003d9bee339d7cf04c94127b58b8109
Secunia Security Advisory 49342
Posted Jun 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Check Point has acknowledged a weakness in Check Point IPSO, which can be exploited by malicious people to conduct brute force attacks.

tags | advisory
MD5 | 84fb354d8c02ae9a461830d142a34ee1
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close