what you don't know can hurt you
Showing 1 - 24 of 24 RSS Feed

Files Date: 2012-12-06

Maxthon / Avant Browser XCS / Same Origin Bypass
Posted Dec 6, 2012
Authored by Roberto Suggi Liverani | Site security-assessment.com

Maxthon and Avant browsers suffer from various flaws such as same origin policy bypass, cross context scripting, and various other vulnerabilities.

tags | advisory, vulnerability
MD5 | b65ef9e12524d460a0c05223b1d1b4c7
m0n0wall 1.33 Cross Site Request Forgery
Posted Dec 6, 2012
Authored by Yann CAM

m0n0wall version 1.33 suffers from a cross site request forgery vulnerability that can allow for remote root access to the system.

tags | exploit, remote, root, csrf
MD5 | 364018406072194858a7a83fb8c41145
Ubuntu Security Notice USN-1657-1
Posted Dec 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1657-1 - It was discovered that Bind incorrectly handled certain crafted queries when DNS64 was enabled. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2012-5688
MD5 | 33830d9038a65767797493b2a8cabaa6
Secunia Security Advisory 51478
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
systems | linux, ubuntu
MD5 | f2496b635130c8b8be7678c3882d2685
Secunia Security Advisory 51491
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for tiff. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, ubuntu
MD5 | 318140e97327e3830340d6916e615f46
Secunia Security Advisory 51367
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in ManageEngine AssetExplorer, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | 4998171f963063436cd464c8b31d0ea5
Secunia Security Advisory 51476
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kent Web Access Report, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, xss
MD5 | ba80859a5bf994b2442557f4fd215e7a
Secunia Security Advisory 51502
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Network Node Manager i (NNMi), which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
MD5 | c294756188fe4edbafa73a54371bafa2
Secunia Security Advisory 51426
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 4a0ae7a65d1551796738e1cba8f1a7db
Secunia Security Advisory 51505
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP LaserJet and Color LaserJet Printers, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | f99bea8163e6c7a3efbe3acecd48667b
Secunia Security Advisory 51507
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP LaserJet Pro 400 Printers, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | bbd4d71e59ab866030e496006598e58f
Secunia Security Advisory 51450
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cartel has discovered two vulnerabilities in ManageEngine MSP Center Plus, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
MD5 | 891eda29ba22263e6cb27888d13e181f
Secunia Security Advisory 51429
Posted Dec 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CA XCOM Data Transport, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4647a02f68407d76fe4e2b64438f569e
Microsoft Internet Explorer 7 Denial Of Service
Posted Dec 6, 2012
Authored by MustLive

Microsoft Internet Explorer version 7.00.5730.13 suffers from a redirector denial of service vulnerability.

tags | advisory, denial of service
MD5 | 4312c04184a5aa0e409f0abb9e69a4df
Mild Subdomain Brute Forcer 0.7
Posted Dec 6, 2012
Authored by Weston Henry | Site github.com

mild.sh is a straight-forward subdomain brute forcer inspired by fierce.pl. It includes hosts-plus.txt, it randomizes queries, and it logs found subdomains.

tags | tool
systems | unix
MD5 | 0f69aeed5d33150143488d07aa9c3f75
Adobe IndesignServer 5.5 SOAP Server Arbitrary Script Execution
Posted Dec 6, 2012
Authored by juan vazquez, h0ng10 | Site metasploit.com

This Metasploit module abuses the "RunScript" procedure provided by the SOAP interface of Adobe InDesign Server, to execute arbitrary vbscript (Windows) or applescript(OSX). The exploit drops the payload on the server and must be removed manually.

tags | exploit, arbitrary
systems | windows, apple
advisories | OSVDB-87548
MD5 | 2ba77dcd03b81ca9f84ca962368ed69a
NVIDIA Install Application 2.1002.85.551 Buffer Overflow
Posted Dec 6, 2012
Authored by LiquidWorm | Site zeroscience.mk

NVIDIA Install Application version 2.1002.85.551 (NVI2.dll) unicode buffer overflow proof of concept exploit. The vulnerability is caused due to a boundary error in NVI2.DLL when handling the value assigned to the 'pDirectory' string variable in the 'AddPackages' function and can be exploited to cause a unicode buffer overflow by inserting an overly long array of data which may lead to execution of arbitrary code.

tags | exploit, overflow, arbitrary, proof of concept
MD5 | 9973f8b25edd8ba69798e89d4f23eee3
Drupal Nodewords: D6 Meta Tags 6.x Information Disclosure
Posted Dec 6, 2012
Authored by Andrey Tretyakov, asb | Site drupal.org

Drupal Nodewords: D6 Meta Tags third party module verison 6.x suffers from an information disclosure vulnerability.

tags | advisory, info disclosure
MD5 | cc8beec4170b4524ab3c677c23a9b01d
CA XCOM Data Transport Command Execution
Posted Dec 6, 2012
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies Support is alerting customers to a potential risk with CA XCOM Data Transport. A vulnerability exists that can allow a remote attacker to execute arbitrary commands. CA Technologies has issued patches to address the vulnerability. The vulnerability occurs due to insufficient verification of requests. A remote attacker can send a carefully constructed request to execute arbitrary commands and compromise the server.

tags | advisory, remote, arbitrary
advisories | CVE-2012-5973
MD5 | 9dc9416367af102b823599a9d8eb7f3e
Mandriva Linux Security Advisory 2012-177
Posted Dec 6, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-177 - BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service vector against affected servers. The updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2012-5688
MD5 | 67314a2beb3e9ba70a413c4f6ce5ee12
HP Security Bulletin HPSBMU02816 SSRT100949
Posted Dec 6, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02816 SSRT100949 - A potential security vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerability could be remotely exploited resulting in unauthorized access. Revision 1 of this advisory.

tags | advisory
systems | linux, windows, solaris, hpux
advisories | CVE-2012-3275
MD5 | 6b97f59c3b4271673f91d6baa79043f7
HP Security Bulletin HPSB3C02831 SSRT100661
Posted Dec 6, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSB3C02831 SSRT100661 - A potential security vulnerability has been identified with HP Intelligent Management Center User Access Manager (UAM). The vulnerability could be remotely exploited resulting in the execution of arbitrary code. Revision 1 of this advisory.

tags | advisory, arbitrary
advisories | CVE-2012-3274
MD5 | 6f197ce94837dafb33064e8d1bd7f286
HP Security Bulletin HPSBPI02828 SSRT100778
Posted Dec 6, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI02828 SSRT100778 - A potential security vulnerability has been identified with certain HP LaserJet and Color LaserJet printers. The vulnerability could be exploited to allow cross-site scripting (XSS). Revision 1 of this advisory.

tags | advisory, xss
advisories | CVE-2012-3272
MD5 | 9db1eccdc849d377d96368a7a2b7804f
HP Security Bulletin HPSBPI02807 SSRT100928
Posted Dec 6, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI02807 SSRT100928 - Potential security vulnerabilities have been identified with certain HP LaserJet Pro 400 Multifunction Printers (MFP). The vulnerabilities could be remotely exploited to allow unauthorized access. Revision 1 of this advisory.

tags | advisory, vulnerability
advisories | CVE-2012-3273
MD5 | 414f48d9d1f6cfb70a14d605bb9af6ad
Page 1 of 1
Back1Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close