exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 926 RSS Feed

Files Date: 2011-11-01 to 2011-11-30

Mandriva Linux Security Advisory 2011-179
Posted Nov 27, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-179 - The addmntent function in the GNU C Library 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296. Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071. crypt_blowfish before 1.1, as used in glibc on certain platforms, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, overflow, local
systems | linux, osx, mandriva
advisories | CVE-2011-1089, CVE-2011-1659, CVE-2011-2483
SHA-256 | 28900655297d1ea4816e5de8820317856a37994a5877afdb6697329afc3ec425
Debian Security Advisory 2353-1
Posted Nov 27, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2353-1 - David Wheeler discovered a buffer overflow in ldns's code to parse RR records, which could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-3581
SHA-256 | 30834ae6dd79c9c782b27e64bf7d40a0b116914d4d1800c26f3abff17771d053
ARP Toxin Cache Poisoner
Posted Nov 27, 2011
Authored by infodox

ARP Toxin is a simple Perl script designed to ARP poison a host on the LAN. It uses Nemesis as a packet crafting tool to create and send the ARP packets. It is NOT original code, merely a slightly improved version of the sample arpredirect script from the book "Hacking: The Art of Exploitation". This variant allows one to set their own poisoning interval and interface to poison on.

tags | tool, perl
systems | unix
SHA-256 | aaa815740a2967208c32389034fd22ddc713b8769ad0c27475d119c8fbeb276d
Titan FTP Server 8.40 Denial Of Service
Posted Nov 27, 2011
Authored by Houssam Sahli

Titan FTP Server version 8.40 suffers from a denial of service condition that leads to a kernel crash.

tags | exploit, denial of service, kernel
SHA-256 | 63a8fb14cd6960d0567ab112f079bffb34f96fff18a95cef2eb2832dd45cdb0b
PHP Video Script SQL Injection
Posted Nov 27, 2011
Authored by longrifle0x

PHP Video Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 853eb5286c79cf9e5e91ab553b21226f4ac833df597dee8272f8dae63b1082f1
#breaking80211 Whitepaper
Posted Nov 27, 2011
Authored by Aetsu

This whitepaper goes into detail on how to break 802.11 detailing the various attack methodologies and tools needed to perform the attacks. Written in Spanish.

tags | paper
SHA-256 | db2e01888753073cc48af12d04fdc0fce7a3a6f5d76f0cf0f4036c28964010c6
Ubuntu Security Notice USN-1281-1
Posted Nov 27, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1281-1 - Andrea Righi discovered a race condition in the KSM memory merging support. If KSM was being used, a local attacker could exploit this to crash the system, leading to a denial of service. It was discovered that an mmap() call with the MAP_PRIVATE flag on "/dev/zero" was incorrectly handled. A local attacker could exploit this to crash the system, leading to a denial of service. Vasily Averin discovered that the NFS Lock Manager (NLM) incorrectly handled unlock requests. A local attacker could exploit this to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, local
systems | linux, ubuntu
advisories | CVE-2011-2183, CVE-2011-2479, CVE-2011-2491, CVE-2011-2494, CVE-2011-2495, CVE-2011-2496, CVE-2011-2517, CVE-2011-2905, CVE-2011-2909, CVE-2011-3363
SHA-256 | 872fb0971665c7f419fc03b97528a458416b56407dc592de5dc20aa1368746fa
TinyMCE / flvPlayer Cross Site Scripting / Disclosure
Posted Nov 26, 2011
Authored by MustLive

TinyMCE and flvPlayer suffer from cross site scripting, path disclosure and content spoofing vulnerabilities.

tags | exploit, spoof, vulnerability, xss, info disclosure
SHA-256 | 872046dfd1f633c8ebc6d604cc01ec5c313e98caa38f7140a61c93262c92a99d
Whois.com Cross Site Scripting
Posted Nov 26, 2011
Authored by Mr.PaPaRoSSe

Whois.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e2ac630071eca8340daea335b449a6e12b37cda626e7da1fff0831dc9f413846
eSyndiCat Pro 2.3.05 Cross Site Scripting
Posted Nov 26, 2011
Authored by d3v1l

eSyndiCat Pro version 2.3.05 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a881de1b7ecd810c25106d0c9006ec4cb8cf175600183fbd33ec8e537063deff
Secunia Security Advisory 46993
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ec2. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | a48d4e0dd8232d3af91feee97404ec62dba4dd7aaad8f834abc3c9caf65b26a7
Secunia Security Advisory 46985
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.5.0-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 0d6229d3f53528fc176b553f50fca3625f06851bb0ea89bdb428a00c90e6b555
Secunia Security Advisory 46990
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for phpldapadmin. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | ce4d69c9271027903bf32ccdea788f9aa506c04f8d4732ccdc0f809f913ff2d6
Secunia Security Advisory 46926
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ldns. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
SHA-256 | 4abfb65fb0c981d8433f6c4c84894edc694018e611381a26193d1ed007498c4e
Secunia Security Advisory 46974
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in SRWare Iron, where some have unknown impacts and others can be exploited by malicious people to bypass certain security restrictions, conduct spoofing and cross-site scripting attacks, and potentially compromise a user's system.

tags | advisory, spoof, vulnerability, xss
SHA-256 | 5d0c453a53f2d9bda6320774df9f323ba2bf3c11f3d62252ef30eb831bc7db47
Secunia Security Advisory 46988
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for net6. This fixes two weaknesses, which can be exploited by malicious people to disclose certain information and conduct session hijacking attacks.

tags | advisory
systems | linux, fedora
SHA-256 | c2a7e80fe5f0c822f558039b4a43cee7f6f447754f1d7d6f855792d1606d25a6
Secunia Security Advisory 46940
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in colord, which can be exploited by malicious, local users to conduct SQL injection attacks.

tags | advisory, local, vulnerability, sql injection
SHA-256 | 27f73f4cf34389ed5d203d1b3c8b6b918f42234b8688cde468ca070001c21d6f
Secunia Security Advisory 46995
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-lts-backport-natty. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, cause a DoS (Denial of Service), and gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | ad94eaf4783d0359df30a99fd1035ec3f47b6020436422758628a5a97cf33392
Secunia Security Advisory 46994
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-lts-backport-maverick. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to conduct session hijacking attacks, cause a DoS (Denial of Service), and gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | e85d5bb4123b782b807b1e79f109a8f41a97748301f87e11e3f7223c4dc14757
Secunia Security Advisory 46983
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in iTop, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 7cdfb98749c8e7099a20b5f9b90e8fd0227d93cf4c7f8149fe3243d56a39ff20
Secunia Security Advisory 46980
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Akin Tosunlar has discovered a vulnerability in Koha, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | f349cf3ca9c2b657e61e5276e5d819886c7c7712ff5dd3f9ec7b29e2030c0e5d
Secunia Security Advisory 46982
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ti-omap4. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges and by malicious people to cause a DoS.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | 63badc3c944278c4bda54367d16093bb01851c90d386fac87e90954904233a25
Secunia Security Advisory 46912
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ti-omap4. This fixes two vulnerabilities, which can be exploited by malicious, local users to conduct session hijacking attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | 2d674c2e358ec22ee36be08fa197fa90478e405cb35c5bd35b58d5bc1e0e52e2
Secunia Security Advisory 46951
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in MyBB, where one has an unknown impact and others can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
SHA-256 | 3aca6b6c809108060f2b218f2a25fa97a9ca269c68707ea85c0f24fabb339a6f
Secunia Security Advisory 46969
Posted Nov 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the MeeNews plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 57644dd55ecf2be450a918ad94db2972d5ab62e3f8cf479295b90599198e5858
Page 3 of 37
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close