what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 54 RSS Feed

Files Date: 2011-11-08 to 2011-11-09

Comtrend Router CT-5624 Remote Root Password Changer/Disclosure
Posted Nov 8, 2011
Authored by Todor Donev

Comtrend Router CT-5624 remote root / support password disclosure and change exploit.

tags | exploit, remote, root, info disclosure
SHA-256 | f88bd04a8b099f31b8c798590cd329225fab81697add7757cef9329447167836
Zero Day Initiative Advisory 11-320
Posted Nov 8, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-320 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy iFix HMI/SCADA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ihDataArchiver.exe process which listens by default on TCP port 14000. The code within this module trusts a value supplied over the network and uses it as a length when copying user-supplied data to a stack buffer. By providing a large enough value, this buffer can be overflowed leading to arbitrary code execution under the context of the user running the service.

tags | advisory, remote, overflow, arbitrary, tcp, code execution
SHA-256 | 8b0df192d4ad1c7db571fa01fea558766e51aa0528dc006fe013249532207c65
Cisco CUCM Directory Traversal / Reversible Obfuscation
Posted Nov 8, 2011
Authored by FX, Sandro Gauci | Site recurity-labs.com

Cisco CUCM environment and the IP Phone CP-7975G suffer from a directory traversal, have a reversible obfuscation algorithm, security issues related to SCCP, CTFTP, and Voice VLAN separation. Versions 7.0 and 8.0(2) are affected.

tags | exploit, file inclusion
systems | cisco
SHA-256 | 17aa1f350cac49473ed6962ed0fc3ece5a0474aa8fa99f6df2c4f4751b652bc7
Ubuntu Security Notice USN-1252-1
Posted Nov 8, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1252-1 - It was discovered that Tomcat incorrectly implemented HTTP DIGEST authentication. An attacker could use this flaw to perform a variety of authentication attacks. Polina Genova discovered that Tomcat incorrectly created log entries with passwords when encountering errors during JMX user creation. A local attacker could possibly use this flaw to obtain sensitive information. This issue only affected Ubuntu 10.04 LTS, 10.10 and 11.04. Various other issues were also addressed.

tags | advisory, web, local
systems | linux, ubuntu
advisories | CVE-2011-1184, CVE-2011-2204, CVE-2011-2526, CVE-2011-3190
SHA-256 | 28aee79644857554f6d36467480b95031c6ebb092461df659ce6ae0eff7d548a
Red Hat Security Advisory 2011-1434-01
Posted Nov 8, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1434-01 - This update fixes multiple security flaws in Adobe Reader. A PDF file with an embedded, specially-crafted SWF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. A flaw in Adobe Flash Player could allow an attacker to conduct cross-site scripting (XSS) attacks if a victim were tricked into visiting a specially-crafted web page. Various other issues were also addressed.

tags | advisory, web, arbitrary, xss
systems | linux, redhat
advisories | CVE-2011-2130, CVE-2011-2134, CVE-2011-2135, CVE-2011-2136, CVE-2011-2137, CVE-2011-2138, CVE-2011-2139, CVE-2011-2140, CVE-2011-2414, CVE-2011-2415, CVE-2011-2416, CVE-2011-2417, CVE-2011-2424, CVE-2011-2425, CVE-2011-2426, CVE-2011-2427, CVE-2011-2428, CVE-2011-2429, CVE-2011-2430, CVE-2011-2431, CVE-2011-2432, CVE-2011-2433, CVE-2011-2434, CVE-2011-2435, CVE-2011-2436, CVE-2011-2437, CVE-2011-2438, CVE-2011-2439
SHA-256 | 2ab97f1016cbda6e49f44636cc860840e76e68c11cd88e2da121b54f11d94324
Lexmark X656de Printer Information Leakage
Posted Nov 8, 2011
Authored by Deral Heiland | Site foofus.net

The Lexmark X656de multifunction printer suffers from a remote password disclosure vulnerability.

tags | exploit, remote
SHA-256 | 6f0b0ae716eef7a6fc0485b242d176d9a146bd109f1d952e0a3ecc8b624fb444
IPv6 Security Assessment Results
Posted Nov 8, 2011
Authored by Fernando Gont

These are the slides from a presentation called Results of a Security Assessment of the Internet Protocol version 6 (IPv6). It was presented at H2HC 2011.

tags | paper, protocol
SHA-256 | 235e5a42446174bb0aaca07903e927bd0aa9ebe1831174aade73cd8274fb93b3
Debian Security Advisory 2340-1
Posted Nov 8, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2340-1 - magnum discovered that the blowfish password hashing used amongst others in PostgreSQL contained a weakness that would give passwords with 8 bit characters the same hash as weaker equivalents.

tags | advisory
systems | linux, debian
advisories | CVE-2011-2483
SHA-256 | 812e797426abfa1a33e1bdf7cb86b6ef49a42fc8e041694f24b50ef02c0b9f9d
Debian Security Advisory 2336-1
Posted Nov 8, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2336-1 - Multiple vulnerabilities were found in the ffmpeg, a multimedia player, server and encoder.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-3362, CVE-2011-3973, CVE-2011-3974, CVE-2011-3504
SHA-256 | dc2b9970d45982b86e871fc5634a2d87ae725f935f5d8caeb23644a0f8a8994d
Facebook A+ Academy SQL Injection
Posted Nov 8, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

Facebook A+ Academy suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 00181d6cd709814063c9de08d37c59956a971a4025105147f42767427f12d3a8
iGuard Biometric Access Control Cross Site Scripting
Posted Nov 8, 2011
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

iGuard Biometric Access Control suffers from multiple input validation vulnerabilities that can allow for cross site scripting.

tags | advisory, vulnerability, xss
SHA-256 | 74523d19a1d84fe05e4678503b1d3643a36da019ed5c9839e2563d179e167269
Secunia Security Advisory 46643
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Barracuda Link Balancer, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | a81aa169c44e7d560e415a3f337c4ca4757fdcff2e08706117ce0428a5890cd8
Secunia Security Advisory 46728
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for sun-jre-bin, emul-linux-x86-java, and sun-jdk. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, by malicious users to disclose certain information, and by malicious people to disclose potentially sensitive information, bypass certain security restrictions, hijack a user's session, manipulate certain data, conduct DNS cache poisoning attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, x86, local, vulnerability
systems | linux, gentoo
SHA-256 | b33b4f83495ea175d67f4fa5a5c759918152a25df09d968252c675b39d8f8b29
Secunia Security Advisory 46765
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in UBB.threads, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 22c3dfbadeb8237d7abc59b4afcd7cf86704873e237fcfa3b47a6b665564f287
Secunia Security Advisory 46736
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | 4202a02fb5e56c1325b85d3853bc82f51c7303c7ccba44340a63c1c647c5ddc4
Secunia Security Advisory 46754
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.PaPaRoSSe has reported a vulnerability in SmartJobBoard, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | e8a1d35eec749d36233e6d6918cc44ccf61882c1ea3f6baf88db2cf1853025e1
Secunia Security Advisory 46719
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mahara, which can be exploited by malicious users to disclose potentially sensitive information, conduct script insertion attacks, and cause a DoS (Denial of Service) and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, denial of service, vulnerability, csrf
SHA-256 | 39903c0cc6014d83a6236d82859d6dddd2fb9b92691b773b1da18431fa34496a
Secunia Security Advisory 46782
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kernel. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, fedora
SHA-256 | 12f135cbd2df51b9c7cf9d4223375c9acc31e7175db6cdf0823ee2fa3e8a8e8e
Secunia Security Advisory 46660
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the JEEMA SMS component for Joomla!, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, sql injection, csrf
SHA-256 | bfd8fb81dc8993c58c29e01a5b10527f7971b7f79fea8fbf1494d6295d032846
Secunia Security Advisory 46749
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in zenphoto, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c7990fc5ad788d4d868247fc6a4b58b058ce8b3fd282aeff43007597f00853ec
Secunia Security Advisory 46707
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been discovered in Apple Mac OS X, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | apple, osx
SHA-256 | 3115109995487857bb5ac49e7cfb02598fbaf76f91014482f19c30143f8ffb6d
Secunia Security Advisory 46746
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Iwate Portal Bar, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 3e78415b564818418614529ed78a8db381324f35a918c60fbde309878a421b33
Secunia Security Advisory 46659
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the ZTE ZXDSL 831 II modem, which can be exploited by malicious people to conduct cross-site request forgery attacks and to disclose sensitive information.

tags | advisory, vulnerability, csrf
SHA-256 | b7cf4aabea0687bdaa8a7ca61f9c2c8706a71eb41a5961132249781bd082708c
Secunia Security Advisory 46694
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged multiple vulnerabilities in Hitachi Cosminexus products, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 4a1fbc20f6efa8bdc03a0dc55803c2275389b4d0b7a8fc4171aadcdcc9aa4361
Secunia Security Advisory 46731
Posted Nov 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows
SHA-256 | 356f06bd51a3dd6d5f2033a9f4583c1b710b7b94af34e64ee9c7c91642ba0eb5
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close