exploit the possibilities
Showing 26 - 50 of 52 RSS Feed

Files Date: 2011-05-12 to 2011-05-13

Secunia Security Advisory 44541
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for seamonkey. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose sensitive information and compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, fedora
MD5 | 515a7bda71678e16fb64a7810a89652d
Secunia Security Advisory 44466
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information.

tags | advisory, kernel, local
systems | linux
MD5 | 494fd32b16eafd34f2da0da02e1cbe44
Secunia Security Advisory 44574
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apache HTTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, web, denial of service
MD5 | aaa37df151da4825c13f51ac2fd87da8
Secunia Security Advisory 44490
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apache APR, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | c2175ade20098fa5110ffe7dae7040d6
Secunia Security Advisory 44565
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for rdesktop. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | 118f8667560a783edb45a83b4e27ff3a
Secunia Security Advisory 44554
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for mono. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, suse
MD5 | 3956795d1df2125846c00b5f16239742
Secunia Security Advisory 44564
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for apr. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 1b1b595b2805b3d2484a7feadb16cf22
Secunia Security Advisory 44499
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Core Security Technologies has reported a vulnerability in Sun GlassFish Enterprise Server, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | d49a2560f983f490f7b2912980ec1d09
Secunia Security Advisory 44566
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Taxonomy Access Control Lite module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 23f70b5b9e61df843d4bde31d4564abb
Secunia Security Advisory 44575
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in HP Network Node Manager i, which can be exploited by malicious, local users to disclose sensitive information and manipulate certain data.

tags | advisory, local
MD5 | 281f379dce9788c363da60a33b295055
Secunia Security Advisory 44481
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in PHProjekt, which can be exploited by malicious people to disclose sensitive information and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | ed5c7db24b0dc8bdd3b31f28303fdab4
Secunia Security Advisory 44578
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | e5b105e03900238fa78eb882a645f88a
Secunia Security Advisory 44546
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in SlimPDF Reader, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 5b4fdd100174fd7fd6645752fd5d6713
Secunia Security Advisory 44356
Posted May 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in ZyXEL ZyWALL appliances, which can be exploited by malicious users and malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | 43e450c51fa973fc161cfaf3fdcee012
Samhain File Integrity Checker 2.8.4a
Posted May 12, 2011
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: A regression has been fixed that under certain circumstances would cause samhain to hang when reloading the configuration file. A compile error in the samhain_hide.ko kernel module has been fixed. A contributed patch for samhainadmin.pl has been included that allows you to specify the location of the secret keyring. The (l)stat timeout has been increased to fix spurious timeouts under heavy load. The Apache log file parser has been enhanced to allow the insertion of arbitrary regexes into the format definition. New options allow you to define the port range for the open ports check.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | cebadf8b7bb9da1ff828539a297db68b
XML Security Library 1.2.18
Posted May 12, 2011
Site aleksey.com

XML Security Library is a C library based on LibXML2. It provides an implementation for major XML security standards: XML Digital Signature and XML Encryption.

Changes: This release fixes a serious crash issue. All users are advised to upgrade.
tags | library
systems | unix
MD5 | 8694b4609aab647186607f79e1da7f1a
Chasys Media Player 2.0 Buffer Overflow
Posted May 12, 2011
Authored by h1ch4m

Chasys Media Player version 2.0 buffer overflow exploit that leverages SEH.

tags | exploit, overflow
MD5 | 7d3045faaccba3c474407d8c8963f5a1
Core Security Technologies Advisory 2010.1118
Posted May 12, 2011
Authored by Core Security Technologies, Francisco Falcon | Site coresecurity.com

Core Security Technologies Advisory - The Administration Console of Oracle GlassFish Server, which is listening by default on port 4848/TCP, is prone to an authentication bypass vulnerability. This vulnerability can be exploited by remote attackers to access sensitive data on the server without being authenticated, by making 'TRACE' requests against the Administration Console. Oracle GlassFish Server version 3.0.1 and Sun GlassFish Enterprise Server version 2.1.1 are affected.

tags | exploit, remote, tcp, bypass
advisories | CVE-2011-1511
MD5 | aed0efb7e4049f02a715c1bc2c2c7a4a
eyeOS Shell Upload / Cross Site Scripting
Posted May 12, 2011
Authored by knull | Site leethack.info

This is a brief write up discussing how to leverage cross site scripting and shell upload vulnerabilities in eyeOS versions prior to 1.9.0.3.

tags | exploit, shell, vulnerability, xss
MD5 | a7dfc57edaa98567723a299e7e28878f
ClubHACK Magazine Issue 16
Posted May 12, 2011
Authored by clubhack | Site chmag.in

ClubHACK Magazine Issue 16 - Topics covered include the Browser Exploitation Framework, New Rules Under The Information Technology Act, Forensics With Matriux Part 1, and more.

tags | magazine
MD5 | 09abfe18a8a728501bbbd1519a616092
HP Security Bulletin HPSBMA02672 SSRT100485
Posted May 12, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBMA02672 SSRT100485 - A potential vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited by a local user to read and write data and log files. Revision 1 of this advisory.

tags | advisory, local
systems | linux, windows, solaris, hpux
advisories | CVE-2011-1855
MD5 | 8e80ee2dbefc28d43a6833d24dd3d493
HP Security Bulletin HPSBMA02642 SSRT100415 2
Posted May 12, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBMA02642 SSRT100415 2 - A potential vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows running Java. The vulnerability could be remotely exploited to create a Denial of Service (DoS). Revision 2 of this advisory.

tags | advisory, java, denial of service
systems | linux, windows, solaris, hpux
advisories | CVE-2010-4476
MD5 | 8907a77147dbbaeb49d26ff0eed74d09
Linux 2.4 / 2.6 Information Disclosure / Denial Of Service
Posted May 12, 2011
Authored by Timo Warns | Site pre-cert.de

PRE-CERT Security Advisory - The Linux kernel contains a vulnerability that may lead to an information disclosure or a denial-of-service due to corrupted partition tables on storage devices. The kernel automatically evaluates partition tables of storage devices. The code for evaluating EFI GUID partition tables contains a buffer overflow bug that allows to leak data from the kernel heap to userspace or that may allow to cause a kernel oops resulting in a denial of service.

tags | advisory, denial of service, overflow, kernel, info disclosure
systems | linux
advisories | CVE-2011-1776
MD5 | 9ce1e30c5a025279b01bb2e8eebb0b57
Ubuntu Security Notice USN-1131-1
Posted May 12, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1131-1 - Thomas Jarosch discovered that Postfix incorrectly handled authentication mechanisms other than PLAIN and LOGIN when the Cyrus SASL library is used. A remote attacker could use this to cause Postfix to crash, leading to a denial of service, or possibly execute arbitrary code as the postfix user.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2011-1720
MD5 | 457533377b681afc533a24be68137fb5
GGGooglescan 0.4
Posted May 12, 2011
Authored by Andrew Horton (urbanadventurer) | Site morningstarsecurity.com

GGGooglescan is a Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames. Datamining Google's search index is useful for many applications. Despite this, Google makes it difficult for researchers to perform automatic search queries. The aim of GGGooglescan is to make automated searches possible by avoiding the search activity that is detected as bot behavior.

tags | tool, scanner
systems | unix
MD5 | 63316923251b7dbc84d7455f7fdd9515
Page 2 of 3
Back123Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close