seeing is believing
Showing 1 - 18 of 18 RSS Feed

Files Date: 2012-11-22

Slackware Security Advisory - seamonkey Updates
Posted Nov 22, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 13.37, 14.0, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | db4652935827c57f5399f8106d82425b
Slackware Security Advisory - mozilla-thunderbird Updates
Posted Nov 22, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 13.37, 14.0, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | 9f2f5e65fbc720a2058807accafc88ea
Mandriva Linux Security Advisory 2012-174
Posted Nov 22, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-174 - Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format. ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-4447, CVE-2012-4564
MD5 | 4f1d205e812a3e6ccf8462eed46afc35
TOR Virtual Network Tunneling Tool 0.2.3.25
Posted Nov 22, 2012
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release reduces directory overhead, provides enormous crypto performance improvements for fast relays on recent hardware, a new v3 TLS handshake protocol that can better resist fingerprinting, support for protocol obfuscation plugins, better scalability for hidden services, IPv6 support for bridges, performance improvements like allowing clients to skip the first round-trip on the circuit ("optimistic data") and refilling token buckets more often, a new "stream isolation" design to isolate different applications on different circuits, and many stability, security, and privacy fixes.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | a1c364189a9a66ed9daa8e6436489daf
Twitter 5.0 Eavesdropping Proof Of Concept
Posted Nov 22, 2012
Authored by Carlos Reventlov

The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.

tags | exploit, web, proof of concept
systems | apple, iphone
MD5 | 98ef370a606a1bdfefb0f0de75168c75
WordPress Zarzadzanie Kontem Shell Upload
Posted Nov 22, 2012
Authored by Ashiyane Digital Security Team

WordPress Zarzadzonie Kontem third party plugin suffers from a remote shell upload vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, shell
MD5 | 46b7a1084cb4702cc68f888a312fb659
WordPress Zingiri Web Shop 2.5.0 Shell Upload
Posted Nov 22, 2012
Authored by Ashiyane Digital Security Team

WordPress Zingiri Web Shop third party plugin version 2.5.0 suffers from a remote shell upload vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, web, shell
MD5 | 6b6ad9735e7cd218ceec4e4586f9a8ae
WordPress Webplayer SQL Injection
Posted Nov 22, 2012
Authored by Novin hack

WordPress Webplayer Player third party plugin suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | aa64e590066452f255ec5dfe64c5e4f9
WordPress FS-Real-Estate SQL Injection
Posted Nov 22, 2012
Authored by Novin hack

WordPress FS-Real-Estate third party plugin suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | a339b15fba193741c5b91eee31f700e5
Gianni Messina CMS 2.0 2010 SQL Injection
Posted Nov 22, 2012
Authored by Ashiyane Digital Security Team

Gianni Messina CMS 2.0 2010 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 605cbe447d381a4213ef36e99cd1d108
WordPress Simple Slider 1.0 Cross Site Scripting
Posted Nov 22, 2012
Authored by Aditya Balapure

WordPress Simple Slider plugin version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 159878449216c166b0dbb520b52d773c
vBulletin 5.0.0 Beta 19 Cross Site Scripting
Posted Nov 22, 2012
Authored by KrypTiK

vBulletin version 5.0.0 Beta 19 suffers from a cross site scripting vulnerability.

tags | advisory, xss
MD5 | f92989a0d5f1eb6771486fe3d31bf2fb
Simple Lighttpd 1.4.31 Denial Of Service
Posted Nov 22, 2012
Authored by Milan Berger

Simple Lighttpd version 1.4.31 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
advisories | CVE-2012-5533
MD5 | 394e2b213a7beadb8bbef7aae3fec13b
WordPress Plg Novana SQL Injection
Posted Nov 22, 2012
Authored by Ashiyane Digital Security Team, sil3nt

WordPress Plg Novana third party plugin suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | d0d6385ab537461576cf0a854faffe8e
GNU SIP Witch Telephony Server 1.4.0
Posted Nov 22, 2012
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Updated for the new ucommon 6 API. Support for VoIP hotspot mode. Initial support for the exosip 4.0 API. Better mingw build support. Better debuging tools. A switchview GUI.
tags | tool, telephony
systems | unix
MD5 | 5c1b8629a3d227b0e1fac58db6676951
Entropy Broker RNG 2.0.1
Posted Nov 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release fixes crashes with the Linux kernel client.
tags | tool, encryption
systems | linux
MD5 | 75fff2e094d150d29d86deaa15782fab
WordPress Magazine Basic SQL Injection
Posted Nov 22, 2012
Authored by Novin hack

WordPress Magazine Basic third party plugin theme suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | 29f3516bbb72262fb6de2377a91beace
Linux 2.6 Kernel /proc Rootkit Backdoor
Posted Nov 22, 2012
Authored by Analiz

Unix/Darbe-A is a new kernel rootkit backdoor based in the /proc file system.

tags | tool, kernel, rootkit
systems | unix
MD5 | f2f3ef80c6403c43b6af91f8c998e0e3
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    8 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close