what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2011-06-15 to 2011-06-16

Complemento Penetration Tools 0.7.7.2
Posted Jun 15, 2011
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

Changes: Various updates.
tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 01cec2d94c04ad80540724c9d1a4dcd23cc5c4d7af0fd832e9e85cb729918512
NSFOCUS Security Advisory 2011.1
Posted Jun 15, 2011
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory - The NSFOCUS Security Team discovered a security vulnerability in Microsoft Internet Explorer. This flaw could be used to corrupt memory resulting in application crash and possible code execution by convincing users to open specially crafted HTML files.

tags | advisory, code execution
advisories | CVE-2011-1250
SHA-256 | 304ad6848efcde6c6b6b142064862fe425d9b17265e995651fed164dbf1712c1
Red Hat Security Advisory 2011-0871-01
Posted Jun 15, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0871-01 - Virtual Network Computing is a remote display system which allows you to view a computer's desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. It was discovered that vncviewer could prompt for and send authentication credentials to a remote server without first properly validating the server's X.509 certificate. As vncviewer did not indicate that the certificate was bad or missing, a man-in-the-middle attacker could use this flaw to trick a vncviewer client into connecting to a spoofed VNC server, allowing the attacker to obtain the client's credentials. Various other issues were also addressed.

tags | advisory, remote, spoof
systems | linux, redhat
advisories | CVE-2011-1775
SHA-256 | 0ebbb13913b75c5c0015754ed42e37e40caef343daeab3ccb5e802275bd2ce8a
Red Hat Security Advisory 2011-0870-01
Posted Jun 15, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0870-01 - The IBM 1.4.2 SR13-FP9 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. Detailed vulnerability descriptions are linked from the IBM "Security alerts" page, listed in the References section. All users of java-1.4.2-ibm-sap for Red Hat Enterprise Linux 4, 5 and 6 for SAP are advised to upgrade to these updated packages, which contain the IBM 1.4.2 SR13-FP9 Java release. All running instances of IBM Java must be restarted for this update to take effect. Various other issues were also addressed.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2010-4447, CVE-2010-4448, CVE-2010-4454, CVE-2010-4462, CVE-2010-4465, CVE-2010-4466, CVE-2010-4473, CVE-2010-4475, CVE-2011-0311
SHA-256 | 07e4f69d6e06691ebd003af3262b7a285a4251861e3b89141e162f66beafd906
Red Hat Security Advisory 2011-0869-01
Posted Jun 15, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0869-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB11-18, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.181.26. Various other issues were also addressed.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2011-2110
SHA-256 | 681b65e302d8af8fcc72423d214ba93b558f71e8a6dab3d4ed847ce30c5fe9e6
Secunia Security Advisory 44908
Posted Jun 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows
SHA-256 | 99b905b10c0c10931abf00438e0394024039a93faca2dd111906a8c52b8a51b4
Secunia Security Advisory 44910
Posted Jun 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DOS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | da76114355c1c363a85007252baf941d5941e6f8096b5283390158c2103d6087
Secunia Security Advisory 44915
Posted Jun 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | windows
SHA-256 | 1c0ca75cb4265b2dd1b3d16c8094dff61df35610c068c2cabf87de1b47a2e8fa
Secunia Security Advisory 44901
Posted Jun 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | d303888c3870a4ed762f156f2b94d8520140a8d5e69bac9eb3440e13dbd930c8
Secunia Security Advisory 44920
Posted Jun 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 296b8c0f919c8760a2835642ef1cd5962f67f5fcafe055045aed875774d822f2
Secunia Security Advisory 43980
Posted Jun 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | windows
SHA-256 | 0815abb486548bfc11cec8519d8b87dd3465739bd43b455893dbcf36e8e294af
Secunia Security Advisory 44894
Posted Jun 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | windows
SHA-256 | 55cfa8245de74875bdbe7313184378c5feedb690857e65fa9efe69763b5839cf
Technical Cyber Security Alert 2011-165A
Posted Jun 15, 2011
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2011-165A - There are multiple vulnerabilities in Microsoft Windows, Office, Internet Explorer, ISA, Visual Studio, and .NET Framework. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
systems | windows
SHA-256 | ab94413b428fb0353a45566bcc41f47aee78928dc1e11eedcd047d3eaf84c74c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close