what you don't know can hurt you
Showing 26 - 44 of 44 RSS Feed

Files Date: 2011-12-13 to 2011-12-14

Secunia Security Advisory 47062
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Office, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | 5e43f25c902f01542e51dc7cd002116f
Secunia Security Advisory 47208
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | e8f62e82b171047639ae0ad8aa433f0f
Secunia Security Advisory 47202
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | windows
MD5 | 7c299c87a597548466278052b0813444
Secunia Security Advisory 47204
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
MD5 | 13ace62c4b580902748e72265c7ba22c
Secunia Security Advisory 47099
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 201765b8ebbbcab6c72f69aadd702520
Secunia Security Advisory 47213
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 8a2d4729921d72c0e4702f82b31ef8b7
Secunia Security Advisory 47207
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 94f66600430e850bdde3f4e75fff33d4
Secunia Security Advisory 47210
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
MD5 | 56a1db7670ea5f3ebe2484424fc64a7e
Mandriva Linux Security Advisory 2011-186
Posted Dec 13, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-186 - A vulnerability has been discovered and corrected in nfs-utils. It was found that the mount.nfs tool did not handle certain errors correctly when updating the mtab file. A local attacker could use this flaw to corrupt the mtab file. The updated packages have been patched to correct this issue.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2011-1749
MD5 | f4e620083697e4725f893f7e5033eb05
Red Hat Security Advisory 2011-1811-01
Posted Dec 13, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1811-01 - The netpbm packages contain a library of functions which support programs for handling various graphics file formats, including .pbm, .pgm, .pnm, .ppm, and others. Two heap-based buffer overflow flaws were found in the embedded JasPer library, which is used to provide support for Part 1 of the JPEG 2000 image compression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker could create a malicious JPEG 2000 compressed image file that could cause jpeg2ktopam to crash or, potentially, execute arbitrary code with the privileges of the user running jpeg2ktopam. These flaws do not affect pamtojpeg2k.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2009-4274, CVE-2011-4516, CVE-2011-4517
MD5 | f076177d0b4ae02681b10b3ba5785994
Ubuntu Security Notice USN-1298-1
Posted Dec 13, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1298-1 - Wilfried Weissmann discovered that Apache Commons Daemon incorrectly dropped capabilities after starting. A remote attacker could possibly use this flaw to read certain files, bypassing the intended permissions.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2011-2729
MD5 | 04907bb6e79015ba5614a277ea9e2464
UseBB 1.0.14 Cross Site Request Forgery
Posted Dec 13, 2011
Authored by Muhammet Cagri Tepebasili

UseBB version 1.0.14 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | c038701c0eb262d9c879976fe464545e
The Tor Project: Authority "No Check" Weakness
Posted Dec 13, 2011
Authored by Piotr CHMIELNICKI

Whitepaper called The Tor Project: Authority "No Check" Weakness. It discusses the fact that exit nodes can be leveraged easily to commit man-in-the-middle attacks.

tags | paper
MD5 | d9f653a8eedc28517244cfbc8ed941f1
On Equivalence Between Zeta And R-Sequence
Posted Dec 13, 2011
Authored by Michal Bucko

This paper covers a conjecture of equivalence between a statement regarding Ξ matrix and Zeta.

tags | paper
MD5 | ffeb0704f3a4f742f8cdc662a27b89a1
On The R-Sequence And Prime Key Set Problem
Posted Dec 13, 2011
Authored by Michal Bucko

This document covers the introduction of the R-sequence, i.e. the sequence of numbers closely related to the distribution of the prime numbers. The paper contains its connection to ζ and Mobius function.

tags | paper
MD5 | 7eb0b52dfcf76b9629a1e7004f39e0ca
ClickIt Proof Of Concept
Posted Dec 13, 2011
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

JavaScript allows you to exploit human cognitive abilities to a remarkable extent; tools such as window positioning, history.forward() and history.back(), open some scary possibilities that we are completely unprepared to deal with. This proof-of-concept aims to demonstrate this; while it is intentionally crude and makes no real effort to conceal its operation, the transitions can be made seamless and very difficult to perceive. Very accurate click prediction can be achieved by carefully measuring mouse velocity and distance to destination, too.

tags | exploit, javascript
MD5 | 753f7c9a5e2186e19dff5a73e9ae8583
YSTS 6th Edition Call For Papers
Posted Dec 13, 2011
Site ysts.org

The 6th edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 7th, 2011.

tags | paper, conference
MD5 | a39d88849e3088f5558aadf1965a7c81
Secunia Security Advisory 47203
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | ae9a86f9ea17e7c88fc2ca4e2219d6ef
Secunia Security Advisory 47117
Posted Dec 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 6a0b21b29b80d7ece9d3c6b21d306b8e
Page 2 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close