exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2010-11-30 to 2010-11-30

Secunia Security Advisory 42397
Posted Nov 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to bypass certain security features and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | linux, suse
SHA-256 | b222b246d8abd9cf09fdf05c3c6ad8ea9384118480d9878ba4bc2562d6bc4d73
Secunia Security Advisory 42385
Posted Nov 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Skeletonz CMS, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 00e2a51f5c76ea4cf585333b7d7f491e7ce988c7725317fc4827bd07e5083cab
Secunia Security Advisory 42422
Posted Nov 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Xen, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | a6b412ace764f0013fe13cebec41594318f08dfdbde11979c9f13d60892e7a21
Secunia Security Advisory 42410
Posted Nov 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for php. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users and malicious people to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service), disclose system and potentially sensitive information, and compromise a vulnerable system.

tags | advisory, denial of service, php, vulnerability
systems | linux, redhat
SHA-256 | e35b8d5b8aab15ce093056e297299a4482fd618da78817eee87f6474d3ca20ac
Secunia Security Advisory 42408
Posted Nov 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 056ee993fe634f953593cdd2f28b0bf0893054b035e648029887decf5a2ed2cd
Secunia Security Advisory 42378
Posted Nov 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for linux-2.6. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), gain escalated privileges, or to disclose certain system and potentially sensitive information, and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | linux, debian
SHA-256 | e5dcdf388ac814512dc300ef7566cbe2181d1867d5c8b2113a279f994e0230d7
Provj 5.1.5.5 Buffer Overflow
Posted Nov 30, 2010
Authored by 0v3r

Provj version 5.1.5.5 buffer overflow proof of concept exploit that creates a malicious .m3u file.

tags | exploit, overflow, proof of concept
SHA-256 | aec6b03abf1ba0759b36964b812d759521e4d2627937b907b5028dad09712589
HP LaserJet PJL Interface Directory Traversal
Posted Nov 30, 2010
Authored by Moritz Jodeit | Site nruns.com

A directory traversal vulnerability has been found in the PJL file system access interface of various HP LaserJet MFP devices. File system access through PJL is usually restricted to a specific part of the file system. Using a pathname such as 0:\..\..\..\ it is possible to get access to the complete file system of the device.

tags | exploit
advisories | CVE-2010-4107
SHA-256 | 3046f35f738f91dd1414a725b79b838acb34d0bb5e416218ca7e0fbb11a194c5
Botan C++ Crypto Algorithms Library 1.9.11
Posted Nov 30, 2010
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release fixes a bug that prevented negotiating TLS connections using RC4. Bugs in CRL encoding and decoding were also fixed. New functions for hex and base64 encoding that do not require using a Pipe were added. The memory container types have changed in various ways to be more compatible with STL containers. The Skein implementation was updated to match the 1.3 specification. The dynamically loaded engine code now supports Windows as well as Unix.
tags | library
systems | linux
SHA-256 | 8abf104341b47019a8abedc009267bfbfe0c9b083640eac501448d7dc7e45eeb
MicroNetSoft RV Dealer Website SQL Injection
Posted Nov 30, 2010
Authored by Underground Stockholm | Site underground-stockholm.com

MicroNetSoft RV Dealer Website suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 4a6c0d05c9b469faff6de0670d8a2fed649168ed07334d4c15f72be2f908cd78
Hyenae Packet Generator 0.35-3
Posted Nov 30, 2010
Authored by Robin Richter | Site sourceforge.net

Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.

Changes: Send delay, fixed byte padding on ARP attacks, and attack assistant usage comparison were fixed. The documentation was updated.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | af9ae528f2df822f1bb78005ebe736b8412d5750d5ad8278037b35790576a542
Page 2 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close