all things security
Showing 1 - 25 of 33 RSS Feed

Files Date: 2012-12-27

THC-IPv6 Attack Tool 2.1
Posted Dec 27, 2012
Authored by van Hauser, thc | Site thc.org

THC-IPv6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: 4 new tools, features, and bug fixes.
tags | tool, protocol
systems | unix
MD5 | 62ad4fc959025d7f2dd852d8e60103f2
Mandriva Linux Security Advisory 2012-184
Posted Dec 27, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-184 - A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-5581
MD5 | ff69d9541734261be383ad63a1cb2046
AnonTwi 1.0
Posted Dec 27, 2012
Authored by psy | Site anontwi.sf.net

Anontwi is a tool for OAuth2 applications, such as GNUSocial and Twitter, that provides different layers of encryption, privacy methods and proxy features. It contains a GTk+ interface.

tags | tool, python
systems | unix
MD5 | 292185eb946839171d77213b224a5f93
Hook Analyser Whitepaper
Posted Dec 27, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a freeware project, started in 2011, to analyse an application during the run-time. The project can be potentially useful in analysing malwares (static and run time), and for performing application crash analysis. This paper breaks down the features and functionality of the tools and provides guidance on usage.

tags | paper
MD5 | 02501bfe1d6289601fe249fb2fb58351
Another File Integrity Checker 3.3
Posted Dec 27, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This release continued the rewrite with libraries and unit tests. Afick::Gen, a new library for generic code was added. A bug was fixed in the fix report_url option. The check_update feature was also fixed.
tags | tool, integrity
systems | linux, windows, unix
MD5 | aa524134be2e3f10c5a53323e30017ff
Guru Auction 2.0 SQL Injection
Posted Dec 27, 2012
Authored by v3n0m

Guru Auction version 2.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 7b8c2fbabcbb00cd9b2f2dcac71c2eda
NVidia Display Driver Buffer Overflow
Posted Dec 27, 2012
Authored by Peter Winter-Smith

This is an exploit for a stack buffer overflow in the NVidia Display Driver Service. The service listens on a named pipe (\pipe\nsvr) which has a NULL DACL configured, which should mean that any logged on user or remote user in a domain context (Windows firewall/file sharing permitting) should be able to exploit this vulnerability.

tags | exploit, remote, overflow
systems | windows
MD5 | 1be277706130b299d5676cf85ee08c9e
Debian Security Advisory 2590-1
Posted Dec 27, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2590-1 - Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2012-4048, CVE-2012-4296
MD5 | 38e1328c7999cb63dd5e37489bad3eb9
WHM editfilter.html Stored Cross Site Scripting
Posted Dec 27, 2012
Authored by Rafay Baloch

WHM suffers from a persistent cross site scripting vulnerability in editfilter.html.

tags | exploit, xss
MD5 | 5e50dccfebdd2ee7b64396e44376f068
Secunia Security Advisory 51688
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Rational Functional Tester, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 200142a0f71185b8845383059e1cf6bb
Secunia Security Advisory 51651
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cPanel, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 79ffb8c2d9692167295853dcb13c42f2
Secunia Security Advisory 51672
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC Data Protection Advisor, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
MD5 | 088196a84a360da0662106b83344910e
Secunia Security Advisory 51519
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeType, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
MD5 | 78c3cabe2ba0befeb973eea82528278f
Secunia Security Advisory 51664
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in multiple products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 0d2939bd16cc7455c3b3cf6d791d8638
Secunia Security Advisory 51585
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aung Khant has reported a vulnerability in Open-Realty, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | ae16d7ab0ff8b74c9471162b722ad14b
Secunia Security Advisory 51666
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in grep, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | d5cd360d805af6e7003bbc080bbdded8
Secunia Security Advisory 51624
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a weakness in multiple products, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
MD5 | b78c4118af14955fce83ae8b79d59bbf
Secunia Security Advisory 51626
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in multiple products, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | 9a65e64e39835c9e0131fbbbbdb013b3
Secunia Security Advisory 51630
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in some Hitachi Collaboration products, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | a29aff6a30da3f2b2646b9006151c500
Secunia Security Advisory 51681
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities in IBM Rational Synergy, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, spoof, vulnerability, xss
MD5 | 7d580d83583fb122d85774a41c48b32b
Secunia Security Advisory 51685
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for chromium. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | 9f6122b588a90e40e7e9f139afe8ae9b
Secunia Security Advisory 51614
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability has been reported in ownCloud, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, xss
MD5 | 92d36eadb42f76a94a72ada5b8fda9e2
Secunia Security Advisory 51619
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - DigiP has reported a vulnerability in the Clockstone theme for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | d2ed385c4501cf3120beb62004989dcf
Secunia Security Advisory 51674
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pfSense has acknowledged multiple vulnerabilities in pfSense, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially compromise an application using the library.

tags | advisory, denial of service, local, vulnerability
MD5 | 1dff25a2fc152f7fe4a452a35f574fc7
Secunia Security Advisory 51668
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered multiple vulnerabilities in Hero Framework, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
MD5 | 6335d629857e33dd03039a62da5a634a
Page 1 of 2
Back12Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    8 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close