Exploit the possiblities
Showing 26 - 48 of 48 RSS Feed

Files Date: 2012-02-07 to 2012-02-08

Secunia Security Advisory 47362
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in IvanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | f4d631504d9965bd58518fec2d5327fb
Secunia Security Advisory 47386
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered two vulnerabilities in Hancom Office 2010 SE, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | c796f75cb852e282e0e8dad2a1f3b76b
Secunia Security Advisory 47352
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 19f58675a11d2e5c4c10366e51e0e003
Secunia Security Advisory 47857
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Basic Analysis And Security Engine, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | e34cf6d30788d810b408667095bf79e5
Secunia Security Advisory 47865
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AIX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | aix
MD5 | af2e1b65a6b174014d5fbef7356ef52a
Secunia Security Advisory 47902
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious, local users to disclose certain sensitive information and by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, ubuntu
MD5 | 6a2c723e70e704804a011af067029adc
Secunia Security Advisory 47920
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in EMC Documentum xPlore, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
MD5 | f600ac629e23705633ab81da4410f225
Secunia Security Advisory 47783
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Campaign Enterprise, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 0203bf2180e610c9039f21be5cd4e782
Secunia Security Advisory 47844
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xen-qemu-dm-4.0. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local
systems | linux, debian
MD5 | 73384f9a431ecab3b36ba082be1c4cfc
Mandriva Linux Security Advisory 2012-014
Posted Feb 7, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-014 - The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request. This advisory provides the latest version of GLPI which are not vulnerable to this issue. Additionally the latest versions of the corresponding plugins are also being provided.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2011-2720
MD5 | 331e61a2bee6cfb1a975fa84689dbf3d
Cryptanalysis Of INCrypt32 In HID's iCLASS Systems
Posted Feb 7, 2012
Authored by Daewan Han, Dong Hoon Lee, ChangKyun Kim, Chang-Ho Jung, Eun-Gu Jung

The cryptographic algorithm called INCrypt32 is a MAC algorithm to authenticate participants, RFID cards and readers, in HID Global's iCLASS systems. HID's iCLASS cards are widely used contactless smart cards for physical access control. Although INCrypt32 is a heart of the security of HID's iCLASS systems, its security has not been evaluated yet since the specification has not been open to public. In this paper, they reveal the specification of INCrypt32 by reverse engineering an iCLASS card and investigate the security of INCrypt32. As a result, we show that the secret key of size 64 bits can be recovered using only 218 MAC queries if the attacker can request MAC for chosen messages of arbitrary length. If the length of messages is limited to pre-determined values by the authentication protocol, the required number of MAC queries grows to 242 to recover the secret key.

tags | paper, arbitrary, crypto, protocol
MD5 | ee33f7e2da98c62d3b33c6294941bbe8
BASE 1.4.5 SQL Injection
Posted Feb 7, 2012
Authored by a.kadir altan

BASE version 1.4.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | dfff208a2c1e8c992125e975e359cdf5
XRayCMS 1.1.1 SQL Injection
Posted Feb 7, 2012
Authored by chap0

XRayCMS version 1.1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ea3a89fb589c0613fafb161173401c55
Conduit Wibiya Open URL Redirection
Posted Feb 7, 2012
Authored by r007k17-w

Conduit Wibiya suffers from an open redirection vulnerability.

tags | exploit
MD5 | e183d6200ecdb1fcdee0e69c7dceb6cd
Egg Hunting Against BisonWare FTP Server
Posted Feb 7, 2012
Authored by Ashfaq Ansari

This whitepaper goes into detail on how to use egg hunting shellcode in order to exploit a BisonWare FTP server.

tags | paper, shellcode
MD5 | 3b77aa7034edc0a6eb15c7fb213af029
LibGuides Cross Site Scripting
Posted Feb 7, 2012
Authored by Sony

LibGuides suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 73e6a69e422c9d476184bba39b9c95b0
Brainkeeper Enterprise Wiki Cross Site Scripting
Posted Feb 7, 2012
Authored by Sony

Brainkeeper Enterprise Wiki suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0155fa02ceee2b9193c53a82fa5dc2ef
Red Hat Security Advisory 2012-0101-01
Posted Feb 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0101-01 - Red Hat Network Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and remote management of multiple Linux deployments with a single, centralized tool. If a user submitted a system registration XML-RPC call to an RHN Satellite server and that call failed, their RHN user password was included in plain text in the error messages both stored in the server log and mailed to the server administrator. With this update, user passwords are excluded from these error messages to avoid the exposure of authentication credentials.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2012-0059
MD5 | 3abfe178b3d51135b846e6674592c501
Red Hat Security Advisory 2012-0100-01
Posted Feb 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0100-01 - Multiple format string flaws were found in Condor. An authenticated Condor service user could use these flaws to prevent other jobs from being scheduled and executed, crash the condor_schedd daemon, or, possibly, execute arbitrary code with the privileges of the "condor" user.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2011-4930
MD5 | 8a7a2b9bb43df37353affb90559c8e15
Red Hat Security Advisory 2012-0099-01
Posted Feb 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0099-01 - Multiple format string flaws were found in Condor. An authenticated Condor service user could use these flaws to prevent other jobs from being scheduled and executed or crash the condor_schedd daemon.

tags | advisory
systems | linux, redhat
advisories | CVE-2011-4930
MD5 | 78bf28b39570ae927a819f61c98bcb94
Red Hat Security Advisory 2012-0102-01
Posted Feb 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0102-01 - Red Hat Network Proxy provides a mechanism for caching content, such as package updates from Red Hat or custom content created for an organization on an internal, centrally-located server. If a user submitted a system registration XML-RPC call to an RHN Proxy server and that call failed, their RHN user password was included in plain text in the error messages both stored in the server log and mailed to the server administrator. With this update, user passwords are excluded from these error messages to avoid the exposure of authentication credentials.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-0059
MD5 | 2d395e9cc7586480875bd2b071bc5a7e
Debian Security Advisory 2405-1
Posted Feb 7, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2405-1 - Several vulnerabilities have been found in the Apache HTTPD Server.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-3607, CVE-2011-3368, CVE-2011-3639, CVE-2011-4317, CVE-2012-0031, CVE-2012-0053
MD5 | 5a79e4aa83dfdf8a9466052499b4f384
Debian Security Advisory 2404-1
Posted Feb 7, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2404-1 - Nicolae Mogoraenu discovered a heap overflow in the emulated e1000e network interface card of QEMU, which is used in the xen-qemu-dm-4.0 packages. This vulnerability might enable to malicious guest systems to crash the host system or escalate their privileges.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2012-0029
MD5 | 1f7c59d504f1cf88f659d8ae0b450ccb
Page 2 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close