exploit the possibilities
Showing 1 - 25 of 49 RSS Feed

Files Date: 2012-10-11

Mandriva Linux Security Advisory 2012-164
Posted Oct 11, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-164 - Unspecified vulnerability in XSLT allows remote attackers to obtain potentially sensitive information about heap memory addresses via unknown vectors. libxslt 1.1.26 and earlier does not properly manage memory, which might allow remote attackers to cause a denial of service via a crafted XSLT expression that is not properly identified during XPath navigation, related to the xsltCompileLocationPathPattern function in libxslt/pattern.c and the xsltGenerateIdFunction function in libxslt/functions.c. libxml2 2.9.0-rc1 and earlier does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h. Double free vulnerability in libxslt allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XSL transforms. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2011-1202, CVE-2012-2870, CVE-2012-2871, CVE-2012-2893
MD5 | b73ab60d4f134cffcd5993c66318efb1
Mandriva Linux Security Advisory 2012-163
Posted Oct 11, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-163 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and it is presumed that with enough effort at least some of these could be exploited to run arbitrary code. Various other issues have been addressed. The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2012-3982, CVE-2012-3986, CVE-2012-3988, CVE-2012-3991, CVE-2012-3994, CVE-2012-3993, CVE-2012-4184, CVE-2012-3992, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188, CVE-2012-3990
MD5 | 8a856a398612df134cc1928ef42424b9
Ubuntu Security Notice USN-1604-1
Posted Oct 11, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1604-1 - It was discovered that MoinMoin did not properly sanitize certain input, resulting in a cross-site scripting (XSS) vulnerability. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. It was discovered that MoinMoin incorrectly handled group names that contain virtual group names such as "All", "Known" or "Trusted". This could result in a remote user having incorrect permissions. Various other issues were also addressed.

tags | advisory, remote, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2011-1058, CVE-2012-4404, CVE-2011-1058, CVE-2012-4404
MD5 | 5281140c1691d805a5d7dc5741f15304
Red Hat Security Advisory 2012-1359-01
Posted Oct 11, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1359-01 - The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. A flaw was found in libvirtd's RPC call handling. An attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd by sending an RPC message that has an event as the RPC number, or an RPC number that falls into a gap in the RPC dispatch table.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2012-4423
MD5 | 55b993902659bb5319c64507828dd9c3
Dark D0rk3r 0.9
Posted Oct 11, 2012
Authored by baltazar

Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.

Changes: Various updates.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
MD5 | 8fcb9c9d36b9c64d0c3398581ffc690c
FileContral 1.0 File Disclosure / Local File Inclusion
Posted Oct 11, 2012
Authored by Ashiyane Digital Security Team, Mr.Cicili

FileContral version 1.0 suffers from file disclosure and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, info disclosure
MD5 | 9b6fe7952f79b4c63ef6941b32977046
Secunia Security Advisory 50954
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
MD5 | efd245b3b738f3fa5e3dab080ee783be
Secunia Security Advisory 50905
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco WebEx Recording Format Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | cisco
MD5 | 09531eeaea087154e1d0b76ba7e2f071
Secunia Security Advisory 50914
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MWR InfoSecurity has reported two vulnerabilities in Samsung Galaxy S III, which can be exploited by malicious people to compromise a vulnerable device.

tags | advisory, vulnerability
MD5 | 5cd6da58592d18ed9ff801c1bf2fc8c5
Secunia Security Advisory 50953
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Ghost Solution Suite, which can be exploited by malicious users to potentially compromise a vulnerable system.

tags | advisory
MD5 | a79a255022df204df6c288b157a9a3dc
Secunia Security Advisory 50932
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gareth Heyes has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 6c6950c84fc98d157de41177c5f4e3bf
Secunia Security Advisory 50885
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for MoinMoin. This fixes two vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
MD5 | 167530d171da33eb67515f180e177f79
Secunia Security Advisory 50857
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco FWSM (Firewall Services Module) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | cisco
MD5 | 38805388e8846a7af6ab2c3b95537730
Secunia Security Advisory 50956
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 12b25aeb4698e2e8c31b941722e2604e
Secunia Security Advisory 50871
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module (ASASM), which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | cisco
MD5 | f0debf542ff36bd9ae2231193cd84f14
Secunia Security Advisory 50898
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the ShareThis module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | e0d5396c8f798cf89665bf27c2aa0193
Secunia Security Advisory 50880
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Web Help Desk, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, web, vulnerability
MD5 | bf231af5967b66e3597f5742e5f86cc3
Secunia Security Advisory 50899
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Web Help Desk, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, web
MD5 | d7eea063832c4382588fa16c7fdc5bb2
Secunia Security Advisory 50940
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in RubyInstaller, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | a247d1329389c9f07e3037a5c246b41f
Secunia Security Advisory 50938
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in ActiveTcl, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | d6dbab2a6a0a09d8e0bf15f6fc4f4d47
Secunia Security Advisory 50960
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Python, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local, python
MD5 | 1a7ce3aa42594e89acabdd30d9964ce2
Secunia Security Advisory 50944
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for ruby. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability, ruby
systems | linux, ubuntu
MD5 | e396700db9f1fa2ea9b418d03dfee053
Secunia Security Advisory 50939
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in ActivePython, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | f4a490e606e54a29fb6eb9792ba846d0
Secunia Security Advisory 50937
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in ActivePerl, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 7d2d895ad387c185bf7e64cfaf7e280e
Secunia Security Advisory 50902
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and two vulnerabilities have been reported in the Basic webmail module for Drupal, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
MD5 | cee5cf33a4035e6ed2ff6e90284db5a7
Page 1 of 2
Back12Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close