all things security
Showing 1 - 25 of 29 RSS Feed

Files Date: 2012-09-24

RSA Authentication Agent 7.1 / Client 3.5 Access Control
Posted Sep 24, 2012
Site emc.com

Under some configuration conditions, a user of RSA Authentication Agent 7.1 for Windows or RSA Authentication Client who has privilege to access a desktop or a server is incorrectly able to do so with only Windows credentials.

tags | advisory
systems | windows
advisories | CVE-2012-2287
MD5 | 5a9444bd17d38c5e1f3c2a5ce0ae8642
IFOBS Cross Site Request Forgery / Cross Site Scripting
Posted Sep 24, 2012
Authored by MustLive

IFOBS suffers from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | f5a95bb79b80681cce9798f4319344b7
Tor-ramdisk i686 UClibc-based Linux Distribution x86_64 20120923
Posted Sep 24, 2012
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: For the i686 and x86_64 ports, Tor was updated to 0.2.2.39, openssh to 6.1p1, and the kernel to 3.4.7 plus Gentoo's hardened-patches-3.4.7-1.extras. The MIPS port also incorporates these changes, but for this architecture, libevent was updated to 2.0.20, while the kernel was kept at vanilla 3.2.5.
tags | tool, kernel, peer2peer
systems | linux
MD5 | 8bd834f03e393fd346b04e1688b0de04
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20120923
Posted Sep 24, 2012
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Changes: For the i686 and x86_64 ports, Tor was updated to 0.2.2.39, openssh to 6.1p1, and the kernel to 3.4.7 plus Gentoo\'s hardened-patches-3.4.7-1.extras. The MIPS port also incorporates these changes, but for this architecture, libevent was updated to 2.0.20, while the kernel was kept at vanilla 3.2.5.
tags | tool, x86, kernel, peer2peer
systems | linux
MD5 | efc12187fdcdb1322d667c0e4907bc6b
Tor-ramdisk i686 UClibc-based Linux Distribution MIPS 20120923
Posted Sep 24, 2012
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. MIPS version.

Changes: For the i686 and x86_64 ports, Tor was updated to 0.2.2.39, openssh to 6.1p1, and the kernel to 3.4.7 plus Gentoo's hardened-patches-3.4.7-1.extras. The MIPS port also incorporates these changes, but for this architecture, libevent was updated to 2.0.20, while the kernel was kept at vanilla 3.2.5.
tags | tool, kernel, peer2peer
systems | linux
MD5 | 29be91cbbea1d49e48c1dff1e615773b
I2P 0.9.2
Posted Sep 24, 2012
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: This release adds extensive low-level changes to improve the performance and efficiency of the router. It updates the UPnP library to make UPnP work for more people. I2PSnark now has DHT support, but it is not yet enabled by default, as the authors plan to do more testing during the upcoming 0.9.3 development cycle. As usual, there's also a lot of bugfixes in this release, so updating is recommended.
tags | tool
systems | unix
MD5 | 0b79c1fb3a4a836cc56644e4bc3d6490
ipset 6.14
Posted Sep 24, 2012
Authored by Jan Engelhardt | Site ipset.netfilter.org

ipset allows administration of sets of IP addresses/networks, ports, MAC addresses, and interfaces, which are stored in hash or bitmap data structures. These can then be used in conjunction with iptables to do fast presence lookups.

Changes: Userspace and Kernel modifications.
tags | tool
systems | unix
MD5 | 70f2d4c054592236dcda285855a4ee58
Ubuntu Security Notice USN-1581-1
Posted Sep 24, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1581-1 - Marc Schoenefeld discovered that Ghostscript did not correctly handle certain image files. If a user or automated system were tricked into opening a specially crafted file, an attacker could cause a denial of service and possibly execute arbitrary code with user privileges.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-4405
MD5 | 2b06664821f21d56efe5814d81015ef5
Gentoo Linux Security Advisory 201209-06
Posted Sep 24, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-6 - Multiple vulnerabilities have been found in Expat, possibly resulting in Denial of Service. Versions less than 2.1.0_beta3 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2009-3560, CVE-2009-3720, CVE-2012-0876, CVE-2012-1147, CVE-2012-1148
MD5 | 8bc7845bc16ff6a87259c1ef6916c090
Gentoo Linux Security Advisory 201209-05
Posted Sep 24, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-5 - Multiple vulnerabilities have been found in LibreOffice, allowing remote attackers to execute arbitrary code or cause a Denial of Service. Versions less than 3.5.5.3 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2011-2713, CVE-2012-0037, CVE-2012-1149, CVE-2012-2665
MD5 | 44b9182331c07f97b324ae81e5f38065
Debian Security Advisory 2551-1
Posted Sep 24, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2551-1 - Glen Eustace discovered that the ISC DHCP server, a server for automatic IP address assignment, is not properly handling changes in the expiration times of a lease. An attacker may use this flaw to crash the service and cause denial of service conditions, by reducing the expiration time of an active IPv6 lease.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2012-3955
MD5 | ad74b5d5e908f783b36e4a0dd4627a94
Gentoo Linux Security Advisory 201209-04
Posted Sep 24, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-4 - Multiple vulnerabilities have been found in BIND, the worst of which may allow remote Denial of Service. Versions less than 9.9.1_p3 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2012-1033, CVE-2012-1667, CVE-2012-3817, CVE-2012-3868, CVE-2012-4244
MD5 | 772058c5f68b14e9fad5087d7b1a9380
Gentoo Linux Security Advisory 201209-03
Posted Sep 24, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-3 - Multiple vulnerabilities were found in PHP, the worst of which lead to remote execution of arbitrary code. Versions less than 5.3.15 are affected.

tags | advisory, remote, arbitrary, php, vulnerability
systems | linux, gentoo
advisories | CVE-2011-1398, CVE-2011-3379, CVE-2011-4566, CVE-2011-4885, CVE-2012-0057, CVE-2012-0788, CVE-2012-0789, CVE-2012-0830, CVE-2012-0831, CVE-2012-1172, CVE-2012-1823, CVE-2012-2143, CVE-2012-2311, CVE-2012-2335, CVE-2012-2336, CVE-2012-2386, CVE-2012-2688, CVE-2012-3365, CVE-2012-3450
MD5 | 3a7b11ddafda5c0c062b3746c3db17dd
Gentoo Linux Security Advisory 201209-02
Posted Sep 24, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-2 - Multiple vulnerabilities in libTIFF could result in execution of arbitrary code or Denial of Service. Versions less than 4.0.2-r1 are affected.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-2347, CVE-2009-5022, CVE-2010-1411, CVE-2010-2065, CVE-2010-2067, CVE-2010-2233, CVE-2010-2443, CVE-2010-2481, CVE-2010-2482, CVE-2010-2483, CVE-2010-2595, CVE-2010-2596, CVE-2010-2597, CVE-2010-2630, CVE-2010-2631, CVE-2010-3087, CVE-2010-4665, CVE-2011-0192, CVE-2011-0192, CVE-2011-1167, CVE-2011-1167, CVE-2012-1173, CVE-2012-2088, CVE-2012-2113, CVE-2012-3401
MD5 | b1e333c1e644cbcc9addafc4e21e030b
Secunia Security Advisory 50729
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and a vulnerability have been reported in IBM Installation Manager, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks.

tags | advisory, spoof, xss
MD5 | 1b02207a83ae7f83039c8bb45b9e4e27
Secunia Security Advisory 50725
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for php. This fixes a weakness, a security issue, and multiple vulnerabilities, which can be exploited by malicious people to conduct brute force attacks, disclose certain sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, php, vulnerability
systems | linux, gentoo
MD5 | 3a438f5efce42bd3a406527b35f6442e
Drupal 7.15 Path Disclosure
Posted Sep 24, 2012
Authored by Akastep

Drupal version 7.15 suffers from multiple path disclosure vulnerabilities.

tags | exploit, vulnerability
MD5 | fe65325d48ea82b24f25a6a0918cf121
Custom Designed Sites SQL Injection / XSS / LFI
Posted Sep 24, 2012
Authored by Am!r | Site irist.ir

Sites designed by TapIn Solutions LLC, LetUsPlay, and SmartCreations suffer from a remote SQL injection vulnerability. Sites designed by infobigs suffer from a local file inclusion vulnerability. Sites designed by Morgane and mc-creation suffer from a cross site scripting vulnerability. Note that these findings house site-specific data.

tags | exploit, remote, local, xss, sql injection, file inclusion
systems | linux
MD5 | 7c3b4c0cb18b56065e26c2263d2d0bb3
Secunia Security Advisory 50732
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users, by malicious, local users in a guest virtual machine, and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, ubuntu
MD5 | c13f40f1eab088118ea311bdbbd4e269
Secunia Security Advisory 50726
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentto has issued an update for tiff. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library.

tags | advisory, denial of service, vulnerability
MD5 | 1efaa94e967a96f85be77572c8eae4e7
Secunia Security Advisory 50727
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for isc-dhcp. This fixes a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
MD5 | 6dbfc42db50a7fd0cfb30cdb15a1b1e8
Secunia Security Advisory 50717
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Notices Ticker Plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | c0d5cfa128d71bcbd690755869898160
Secunia Security Advisory 50692
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for libreoffice. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | dfd57cbbf26228d2bd496e718949cbea
Secunia Security Advisory 50695
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for expat. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | 0fbd496f7b5a1b0fad6ea896cee60559
Secunia Security Advisory 50691
Posted Sep 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in gpEasy CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | d2489c2fba42b19fee58f352eb1efc36
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close