Exploit the possiblities
Showing 1 - 25 of 41 RSS Feed

Files Date: 2012-11-23

Router Exploitation
Posted Nov 23, 2012
Authored by FX | Site recurity-labs.com

This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.

tags | paper
systems | cisco, juniper
MD5 | e392d0b1fc69f4d7ac2a5079ed9c7203
FreeBSD Security Advisory - Linux Input Validation
Posted Nov 23, 2012
Authored by Mateusz Guzik | Site security.freebsd.org

FreeBSD Security Advisory - FreeBSD is binary-compatible with the Linux operating system through a loadable kernel module/optional kernel component. A programming error in the handling of some Linux system calls may result in memory locations being accessed without proper validation. It is possible for a local attacker to overwrite portions of kernel memory, which may result in a privilege escalation or cause a system panic.

tags | advisory, kernel, local
systems | linux, freebsd
advisories | CVE-2012-4576
MD5 | 621bb2bf1b4bbcbdf821555933edf169
FreeBSD Security Advisory - EAP-TLS Message Insufficient Validation
Posted Nov 23, 2012
Authored by Timo Warns, Jouni Malinen | Site security.freebsd.org

FreeBSD Security Advisory - The internal authentication server of hostapd does not sufficiently validate the message length field of EAP-TLS messages. A remote attacker could cause the hostapd daemon to abort by sending specially crafted EAP-TLS messages, resulting in a Denial of Service.

tags | advisory, remote, denial of service
systems | freebsd
advisories | CVE-2012-4445
MD5 | ee78773746000638162c5942e19522fd
FreeBSD Security Advisory - named Denial Of Service
Posted Nov 23, 2012
Site security.freebsd.org

FreeBSD Security Advisory - The BIND daemon would crash when a query is made on a resource record with RDATA that exceeds 65535 bytes. The BIND daemon would lock up when a query is made on specific combinations of RDATA. A remote attacker can query a resolving name server to retrieve a record whose RDATA is known to be larger than 65535 bytes, thereby causing the resolving server to crash via an assertion failure in named. An attacker who is in a position to add a record with RDATA larger than 65535 bytes to an authoritative name server can cause that server to crash by later querying for that record. The attacker can also cause the server to lock up with specific combinations of RDATA.

tags | advisory, remote
systems | freebsd
advisories | CVE-2012-4244, CVE-2012-5166
MD5 | d9a687a53d52bb1dd32def96f2fd8833
Greenstone XSS / Password Disclosure / Log Forging
Posted Nov 23, 2012
Authored by Akastep

Greenstone Digital Library Software suffers from cross site scripting, password file disclosure, broken salt, and log forging vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
MD5 | 78ab8fb6ae5fbb0497b645f7951346da
Cisco WAG120N Command Execution
Posted Nov 23, 2012
Authored by Manu

Cisco WAG120N suffers from a remote command execution vulnerability in setup.cgi.

tags | exploit, remote, cgi
systems | cisco
MD5 | e7c1f4d8e514ad1411426380181ab2f8
Slackware Security Advisory - mozilla-firefox Updates
Posted Nov 23, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 13.37, 14.0, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | bf70541928b6a538384d94b3dab78e58
Debian Security Advisory 2576-1
Posted Nov 23, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2576-1 - Andy Lutomirski discovered that tcsd (the TPM userspace daemon) was missing a of input validation. Using carefully crafted input, it can lead to a denial of service by making the daemon crash with a segmentation fault.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2012-0698
MD5 | a95f777fc182ac60eb65c0a25bb75e50
Red Hat Security Advisory 2012-1485-01
Posted Nov 23, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1485-01 - IBM J2SE version 1.4.2 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2012-1531, CVE-2012-3216, CVE-2012-4820, CVE-2012-4822, CVE-2012-5073, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083, CVE-2012-5084
MD5 | 6689e41a409c2607627bbe80e1213eed
Ubuntu Security Notice USN-1639-1
Posted Nov 23, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1639-1 - It was discovered that unity-firefox-extension incorrectly handled certain callbacks. A remote attacker could use this issue to cause unity-firefox-extension to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-0960
MD5 | a73143989d0cde30618f36598cf70352
TrouSerS Denial Of Service
Posted Nov 23, 2012
Authored by Andy Lutomirski

TrouSerS denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
advisories | CVE-2012-0698
MD5 | af4be426cd123e2aa9aa4f1c65903c3b
Secunia Security Advisory 51280
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ReVuln has reported a vulnerability in Call of Duty Modern Warfare 3, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 51358e11eb848153352e2690a26d9c81
Secunia Security Advisory 51371
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for tomcat6. This fixes a weakness and a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | f2cb75538ceb931ca8449abda4e6e3f9
Secunia Security Advisory 51332
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge has discovered a vulnerability in dotProject, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fafd17f5f0679cae25bb4957a3337e0a
Secunia Security Advisory 51388
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Call Management System, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | f8461aa0c122e276e3bdaf38040c0e9f
Secunia Security Advisory 51380
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge has discovered multiple vulnerabilities in dotProject, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
MD5 | 8dd2eb1ed16ac250e7cd35d60f88a374
Secunia Security Advisory 51356
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Feng Office, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | f7f0c2e62968bdda95da68cb9a5166c8
Secunia Security Advisory 51390
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for java-1.7.0-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, suse
MD5 | fa82d43c708bb38eba22c31bb1720784
Secunia Security Advisory 51370
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
MD5 | 68a850519b50e1582f86b2fdfd67d8a1
Secunia Security Advisory 51369
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
MD5 | 3582cbc39cff076dc35445bf77adf865
Secunia Security Advisory 51389
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a vulnerability in the Archiv plugin for TinyMCE, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | cd43457c2d25e7b8e06d0be5013a1005
Secunia Security Advisory 51386
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Endpoint Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 8e2f4dd7f415b3f82190fe1dc4631d84
Secunia Security Advisory 51387
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a vulnerability in Liferay Portal, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 7269ff36cc0184ae23491dd15fd35091
Secunia Security Advisory 51358
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox and Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | f77cc5c15cb22ca22103cd72ad6b2b39
Secunia Security Advisory 51365
Posted Nov 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Symantec has acknowledged some vulnerabilities in multiple products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | c27c30f52f7051afbde7eadf2da05dff
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close