Twenty Year Anniversary
Showing 1 - 25 of 41 RSS Feed

Files Date: 2012-11-23

Router Exploitation
Posted Nov 23, 2012
Authored by FX | Site recurity-labs.com

This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.

tags | paper
systems | cisco, juniper
MD5 | e392d0b1fc69f4d7ac2a5079ed9c7203
FreeBSD Security Advisory - Linux Input Validation
Posted Nov 23, 2012
Authored by Mateusz Guzik | Site security.freebsd.org

FreeBSD Security Advisory - FreeBSD is binary-compatible with the Linux operating system through a loadable kernel module/optional kernel component. A programming error in the handling of some Linux system calls may result in memory locations being accessed without proper validation. It is possible for a local attacker to overwrite portions of kernel memory, which may result in a privilege escalation or cause a system panic.

tags | advisory, kernel, local
systems | linux, freebsd
advisories | CVE-2012-4576
MD5 | 621bb2bf1b4bbcbdf821555933edf169
FreeBSD Security Advisory - EAP-TLS Message Insufficient Validation
Posted Nov 23, 2012
Authored by Timo Warns, Jouni Malinen | Site security.freebsd.org

FreeBSD Security Advisory - The internal authentication server of hostapd does not sufficiently validate the message length field of EAP-TLS messages. A remote attacker could cause the hostapd daemon to abort by sending specially crafted EAP-TLS messages, resulting in a Denial of Service.

tags | advisory, remote, denial of service
systems | freebsd
advisories | CVE-2012-4445
MD5 | ee78773746000638162c5942e19522fd
FreeBSD Security Advisory - named Denial Of Service
Posted Nov 23, 2012
Site security.freebsd.org

FreeBSD Security Advisory - The BIND daemon would crash when a query is made on a resource record with RDATA that exceeds 65535 bytes. The BIND daemon would lock up when a query is made on specific combinations of RDATA. A remote attacker can query a resolving name server to retrieve a record whose RDATA is known to be larger than 65535 bytes, thereby causing the resolving server to crash via an assertion failure in named. An attacker who is in a position to add a record with RDATA larger than 65535 bytes to an authoritative name server can cause that server to crash by later querying for that record. The attacker can also cause the server to lock up with specific combinations of RDATA.

tags | advisory, remote
systems | freebsd
advisories | CVE-2012-4244, CVE-2012-5166
MD5 | d9a687a53d52bb1dd32def96f2fd8833
Greenstone XSS / Password Disclosure / Log Forging
Posted Nov 23, 2012
Authored by Akastep

Greenstone Digital Library Software suffers from cross site scripting, password file disclosure, broken salt, and log forging vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
MD5 | 78ab8fb6ae5fbb0497b645f7951346da
Cisco WAG120N Command Execution
Posted Nov 23, 2012
Authored by Manu

Cisco WAG120N suffers from a remote command execution vulnerability in setup.cgi.

tags | exploit, remote, cgi
systems | cisco
MD5 | e7c1f4d8e514ad1411426380181ab2f8
Slackware Security Advisory - mozilla-firefox Updates
Posted Nov 23, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 13.37, 14.0, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | bf70541928b6a538384d94b3dab78e58
Debian Security Advisory 2576-1
Posted Nov 23, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2576-1 - Andy Lutomirski discovered that tcsd (the TPM userspace daemon) was missing a of input validation. Using carefully crafted input, it can lead to a denial of service by making the daemon crash with a segmentation fault.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2012-0698
MD5 | a95f777fc182ac60eb65c0a25bb75e50
Red Hat Security Advisory 2012-1485-01
Posted Nov 23, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1485-01 - IBM J2SE version 1.4.2 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2012-1531, CVE-2012-3216, CVE-2012-4820, CVE-2012-4822, CVE-2012-5073, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083, CVE-2012-5084
MD5 | 6689e41a409c2607627bbe80e1213eed
Ubuntu Security Notice USN-1639-1
Posted Nov 23, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1639-1 - It was discovered that unity-firefox-extension incorrectly handled certain callbacks. A remote attacker could use this issue to cause unity-firefox-extension to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-0960
MD5 | a73143989d0cde30618f36598cf70352
TrouSerS Denial Of Service
Posted Nov 23, 2012
Authored by Andy Lutomirski

TrouSerS denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
advisories | CVE-2012-0698
MD5 | af4be426cd123e2aa9aa4f1c65903c3b
Secunia Security Advisory 51280
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ReVuln has reported a vulnerability in Call of Duty Modern Warfare 3, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 51358e11eb848153352e2690a26d9c81
Secunia Security Advisory 51371
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for tomcat6. This fixes a weakness and a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | f2cb75538ceb931ca8449abda4e6e3f9
Secunia Security Advisory 51332
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge has discovered a vulnerability in dotProject, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fafd17f5f0679cae25bb4957a3337e0a
Secunia Security Advisory 51388
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Call Management System, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | f8461aa0c122e276e3bdaf38040c0e9f
Secunia Security Advisory 51380
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge has discovered multiple vulnerabilities in dotProject, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
MD5 | 8dd2eb1ed16ac250e7cd35d60f88a374
Secunia Security Advisory 51356
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Feng Office, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | f7f0c2e62968bdda95da68cb9a5166c8
Secunia Security Advisory 51390
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for java-1.7.0-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, suse
MD5 | fa82d43c708bb38eba22c31bb1720784
Secunia Security Advisory 51370
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
MD5 | 68a850519b50e1582f86b2fdfd67d8a1
Secunia Security Advisory 51369
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
MD5 | 3582cbc39cff076dc35445bf77adf865
Secunia Security Advisory 51389
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a vulnerability in the Archiv plugin for TinyMCE, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | cd43457c2d25e7b8e06d0be5013a1005
Secunia Security Advisory 51386
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Endpoint Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 8e2f4dd7f415b3f82190fe1dc4631d84
Secunia Security Advisory 51387
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a vulnerability in Liferay Portal, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 7269ff36cc0184ae23491dd15fd35091
Secunia Security Advisory 51358
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox and Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | f77cc5c15cb22ca22103cd72ad6b2b39
Secunia Security Advisory 51365
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Symantec has acknowledged some vulnerabilities in multiple products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | c27c30f52f7051afbde7eadf2da05dff
Page 1 of 2
Back12Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    7 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    40 Files
  • 23
    May 23rd
    64 Files
  • 24
    May 24th
    55 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close