what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files Date: 2012-10-09

Ubuntu Security Notice USN-1600-1
Posted Oct 9, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1600-1 - Henrik Skupin, Jesse Ruderman, Christian Holler, Soroush Dalili and others discovered several memory corruption flaws in Firefox. If a user were tricked into opening a specially crafted web page, a remote attacker could cause Firefox to crash or potentially execute arbitrary code as the user invoking the program. David Bloom and Jordi Chancel discovered that Firefox did not always properly handle the select element. A remote attacker could exploit this to conduct URL spoofing and clickjacking attacks. Various other issues were also addressed.

tags | advisory, remote, web, arbitrary, spoof
systems | linux, ubuntu
advisories | CVE-2012-3989, CVE-2012-3984, CVE-2012-3985, CVE-2012-3986, CVE-2012-3991, CVE-2012-3992, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188, CVE-2012-3982, CVE-2012-3983, CVE-2012-3984, CVE-2012-3985, CVE-2012-3986, CVE-2012-3988, CVE-2012-3989, CVE-2012-3990, CVE-2012-3991, CVE-2012-3992, CVE-2012-3993, CVE-2012-3994, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180
SHA-256 | 52d4985f972acd6526809efd0178dfe1a88fc1c7f8bc2f4038bc75fa704e6f04
Key Systems Electronic Key Lockers Command Injection
Posted Oct 9, 2012
Authored by Travis Lee

Key Systems Electronic Key Lockers contain a command injection vulnerability which may allow a remote unauthenticated attacker to inject commands into the electronic key locker. Key Systems Electronic Key Lockers also contains weak authentication which could allow an attacker administrative access to the electronic key locker.

tags | exploit, remote
SHA-256 | e041973800631f5c0a7274ae4ca01886483e2d34625197c49d13b8d056db55ec
PHP 5.3.4 com_event_sink 0-Day
Posted Oct 9, 2012
Authored by FB1H2S

PHP version 5.3.4 on windows com_event_sink zero day exploit.

tags | exploit, php
systems | windows
SHA-256 | 7c10651bbfba8d827368b8a19219613171b3dd6f2fc6885a3ddec4ea94d635e5
RSA Adaptive Authentication Information Disclosure
Posted Oct 9, 2012
Site emc.com

RSA Adaptive Authentication (On-Premise) version 6.0.2.1 contains a vulnerability that can potentially lead to sensitive information disclosure.

tags | advisory, info disclosure
advisories | CVE-2012-2286
SHA-256 | 45674765cbf3713028457ca019660d3802462a301c80e1753fd03db1ced6a6d5
PLIB 1.8.5 Buffer Overflow
Posted Oct 9, 2012
Authored by Andres Gomez

PLIB version 1.8.5 ssg/ssgParser.cxx buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | bcba481bbab5e30dd19c118080b1ff90929a81728cacd90054794049004482bc
PHP Fuzzing In Action
Posted Oct 9, 2012
Authored by Payam Khaninejad | Site progvig.ir

Whitepaper called PHP Fuzzing In Action. It goes over 15 ways to fuzz PHP source code.

tags | paper, php
SHA-256 | bb090192417591cba5b2f0df6d9d73d90eb45f0d389fde9e0870dfd689d7d9d2
IBM Informix Dynamic Server 11.50 Stack Overflow
Posted Oct 9, 2012
Authored by Ewerson Guimaraes | Site dclabs.com.br

IBM Informix Dynamic Server version 11.50 suffers from a stack overflow vulnerability. The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the COLLATION option in a SQL query. User-supplied data is copied into a stack-based buffer without proper bounds checking resulting in an overflow.

tags | advisory, overflow, tcp
SHA-256 | 0d072ad0fffbbe84b09f23b6e7760135a5f76c42e93b160267375940bda1cf4c
Reverse Shell 1.0
Posted Oct 9, 2012
Authored by Ashfaq Ansari

This sample code is a reverse shell written in PHP with an authentication feature.

tags | tool, shell, php, rootkit
systems | unix
SHA-256 | baa6da9a5a8a1d7c041facc10f0ed1b4c6b6b4431f46cb1460624911beda9e6b
FL Studio 10 Producer Edition Buffer Overflow
Posted Oct 9, 2012
Authored by Dark-Puzzle

FL Studio 10 Producer Edition SEH based buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | baccc3c89450e01403323b36347d890a84bd82c9b7faff4e753ea4c496b4259c
Secunia Security Advisory 50900
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SiPass Integrated, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 756ec68d218e4a17d5bc614c073075d1b4977fba611e772592dd58ae29415784
Secunia Security Advisory 50890
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Icy Phoenix, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | aeb53e75664c3dac3e47dc3cae63f11b5ce475a8fdae65473ab51532909801e8
Secunia Security Advisory 50808
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for bacula. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, debian
SHA-256 | 04b1dc174db52e596012f74111533deace1cf55e6e84dfb09bb1ebdba44465a7
Secunia Security Advisory 50840
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fujitsu has acknowledged a vulnerability in Interstage HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory, web
SHA-256 | da848b07d68f0c022fa77cbe5567338ec80e232674a37b6d1c411d9b6cd95d3b
Secunia Security Advisory 50849
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, kernel, local
systems | linux
SHA-256 | 1523146f114d3b1302b37d0cb28e0ec6a0898d862e863a9d3338dc61d03b7102
Secunia Security Advisory 50816
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC S7-1200, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 53b953a5e2e223e910e4e4057dbc63440dc65640989745a53c6b6aa8104f3581
Secunia Security Advisory 50817
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities with an unknown impact have been reported in Pale Moon.

tags | advisory, vulnerability
SHA-256 | 09897624f9be0214b8556752bf8de91ce0cb0572102507b320cb7f192c23294f
Secunia Security Advisory 50820
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 685e3b1d97ae7cf1d8f211a5a8231b1e373b5ca4d5cece2b514f5c59d55ec2fd
Secunia Security Advisory 50901
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft SQL Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 8de7310bb76d2f53edb14cd0bfb39a0dc861ab05d99e67e76202c7cfedea223c
Secunia Security Advisory 50867
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | 7d30adb3a6cac5d0d30bc103572e231e0c7ce9342b97b3823971c8fd35ef9c3e
Secunia Security Advisory 50862
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | 21b9aa86281bcc9bcc970f3f28d153dd8b5dbe18716cb5a69c8054253c5f60a2
Secunia Security Advisory 50855
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in multiple Microsoft products, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 35531abbc3c80bea946d5d405808b138e71a95e99e3e4f4ef7f04301debcc802
Secunia Security Advisory 50844
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Works, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 251dfeb7a5780fb3c513bde8291a884d746c14cd7eed09dfc13b71e75d7c2a08
Secunia Security Advisory 50835
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in multiple Microsoft products, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 95819bbc1df59a3b9c26a98273e38b4f727acf3b1cb9b19aa158d00cd8f334c0
Secunia Security Advisory 50848
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, kernel, local
systems | linux, ubuntu
SHA-256 | b91f40543afb5113dc95c4cfbed0999f4a0c0a7939c978a2a11ba5b5fda55de7
Secunia Security Advisory 50574
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered a vulnerability in Zen Cart, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 5733ee7e0a5b524d36f081a08e06cb49df4ccd0ca5b2ae4ff323213cd1d01989
Page 1 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close