what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 76 RSS Feed

Files Date: 2010-11-01 to 2010-11-02

Audacity 1.3 Beta DLL Hijacking
Posted Nov 1, 2010
Authored by Salvatore Fresta

Audacity versions 1.3 Beta and below suffer from a DLL hijacking vulnerability.

tags | exploit
SHA-256 | c76de81a128e088f9523987dbb4adca911014333dd6457c2c5be5ce1c0f137be
Evilgrade - The Update Exploitation Framework 2.0
Posted Nov 1, 2010
Authored by Francisco Amato | Site infobyte.com.ar

Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. This framework comes into play when the attacker is able to make traffic redirection, and such thing can be done in several ways such as: DNS tampering, DNS Cache Poisoning, ARP spoofing Wi-Fi Access Point impersonation, DHCP hijacking with your favorite tools. This way you can easy take control of a fully patched machine during a penetration test in a clean and easy way. The main idea behind the is to show the amount of trivial errors in the update process of mainstream applications.

Changes: 63 new modules have been added.
tags | tool, spoof
systems | unix
SHA-256 | abe0dd1c3735bce07b9684ce4258af4a715be51ad2ad60997051802f63489950
Secunia Security Advisory 42048
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in GnuCash, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | ca9cbccf7116bd8765ded590f7d53ebeba2f4f946300277c9702911951cbe77d
Secunia Security Advisory 42053
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ACDSee Canvas, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 87216819e7be661cf072b06c90178a2c6049505a28cdc193e18bfadacf74d65d
Secunia Security Advisory 42055
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for glibc. This fixes two weaknesses, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | f791da9b57396fd82c30e9a3401e7b2995ab4b7b11431728a7f00aa41d6abf53
Secunia Security Advisory 42056
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for firefox and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a user's system.

tags | advisory, local, vulnerability, xss
systems | linux, fedora
SHA-256 | de16a054aab5f01fc2db198f36a85e6081f90d456657467d3b40bb04cd58e416
Secunia Security Advisory 42072
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Sponsor Wall component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 63eed9509038cab9ef4e059c68806a46c1dafddf3b1d709a2bb3c86937361f14
Secunia Security Advisory 42006
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Wagner Elias has reported some vulnerabilities in the cformsII plugin for WordPress, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | d1a2d7b8a187a47684a32b59f0b620c410bd5912786e45c2fd8f3307b9b31d3a
Secunia Security Advisory 42078
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Smallftpd, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
SHA-256 | b43f2e164d33498e90995e0ed9cdbef14b237b0d9097236b4493e6628b6f67bb
Secunia Security Advisory 42052
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in ProFTPD, which can be exploited by malicious users to manipulate certain data and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | c8d8a7749b87305d0b76378cdcdfeb3cd076f7f0bf0d6b90dfec9c2358a4e0a2
Secunia Security Advisory 42054
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for gnucash. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | e84dce5c0ed3d637c0681ad940d0e769a3e9f5e54e8b6ddbb95fbea630792c1e
Secunia Security Advisory 42051
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Xerox has acknowledged a vulnerability in Xerox 4595 Copier/Printer, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d97878107cf64b801a075e793d3533b1437c8643754e3500b056f5fc879abfbe
Secunia Security Advisory 42073
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Flip Wall component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 15719e22acc3e2a6b9076402ad4a76c887ff6b907d7142a8510bd90a5881c414
Secunia Security Advisory 42083
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Directory Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 4a5ac2109d4c5425c2a0c89166e5ef43bb70cd9efad8c048ac70a95c858fb9a4
Secunia Security Advisory 42066
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Yaws, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | ce9d2e08c7939c9cacf5392e76de62c25c05deefced4d9216e427f09713ffd39
Secunia Security Advisory 42068
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Home File Share Server, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
SHA-256 | 3bd5a260b8dc8e9e066c5bdfb6fd482d5af49c3f8855f405140771dd3c45caf5
Secunia Security Advisory 42080
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francois Harvey has reported a vulnerability in SmartOptimizer, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | bd6136cc181395a58f133401e5af5dfe3b5cb6f174ef9e4fe2ece7fea5388f0c
Secunia Security Advisory 42070
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Project Jug, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 3430bd83abd754cbb021d2299d3a70c2d56f8e7fe73e8ced944db107da42e0c6
Secunia Security Advisory 42084
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in GVim, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 83539297a443949adc32923e14550542c88cf3ede6ed14ea056da5f915ac726d
Secunia Security Advisory 42063
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Elastix, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | f75ff17e51cc8665adc7f456feb241c2f1b311b9c4f0fbdfbb0508d9e34569fa
Secunia Security Advisory 42019
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing attacks, bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability, xss
systems | linux, fedora
SHA-256 | 55cc45f2366f6dfec6b4bd978b0c73b8547084605321d31d8233fdb06e794824
Secunia Security Advisory 42031
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 33c742ff1413acd0a841b1ec9c7e80699962ad1c1c141b81114107139664c171
Secunia Security Advisory 41981
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle Mojarra, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 5d8af0b8608e9097fbaab91e9492145d8d640fca3f27cbc9bfa2ec6abe858e1b
Secunia Security Advisory 42030
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Adobe Reader / Acrobat, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1712672ca58ff0ebe5be868458b6b71e39b07532714b8de0e53246e00b6e87fd
Secunia Security Advisory 42023
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Palm Pre WebOS, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable device.

tags | advisory, vulnerability
SHA-256 | f2a127e097b9d088a62b852c64e5733ab63ccedaff795ad0aa7b0140d8a1e800
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close