what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 756 RSS Feed

Files Date: 2012-10-01 to 2012-10-31

EMC Avamar Client For VMware Information Disclosure
Posted Oct 29, 2012
Site emc.com

The Avamar Server root user password is stored in plain text on Avamar VMWare proxy client. This could allow a malicious user with network access to proxy client and Avamar Server to gain privileged access to the Avamar server.

tags | advisory, root
advisories | CVE-2012-4610
SHA-256 | 42555590e2ec1eaa4ed0e58462ba49dc8fd26c16852f27e2bdf6f80bb817912e
TP-LINK TL-WR841N Local File Inclusion
Posted Oct 29, 2012
Authored by Matan Azugi

TP-LINK TL-WR841N suffers from a local file inclusion vulnerability. Firmware versions 3.13.9 Build 120201 Rel.54965n and below are affected.

tags | exploit, local, file inclusion
SHA-256 | 30b33ca4e19b4006382480798e9d11511f9fab053f7f020f3416d3cf693d302a
Slackware Security Advisory - mozilla-firefox Updates
Posted Oct 29, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 13.37, 14.0, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
SHA-256 | b3530772c2e519ca40f58872a39ef3d1c3c568a41a37bf4943b3f7cd0265fd4f
Positive Hack Days III Call For Papers
Posted Oct 29, 2012
Site phdays.com

Call For Papers for Positive Hack Days III which will take place May 22nd through the 23rd, 2013 in Moscow, Russia.

tags | paper, conference
SHA-256 | 237eb04df98bf6a16b35515b1159888b207611bd72f3be73b9dd33105d775d8c
DIMVA 2013 Call For Papers
Posted Oct 29, 2012
Site dimva.org

Call For Papers for DIMVA 2013, the 10th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment. This conference will be held from July 18th through the 19th, 2013 in Berlin, Germany.

tags | paper, conference
SHA-256 | 9ddb48597e48c32b3f1033d4fa44bd5a3f93eb6c773439796f3781e973b3a09b
360-FAAR Firewall Analysis Audit And Repair 0.3.4
Posted Oct 29, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release resolves Cisco ICMP default services with out printing stringified hash references in the cs output sections. Cisco network and range objects are listed as such in object-groups instead of as hosts. The cisco output writer uses 'object' in access-lists instead of IP NM, as well as listing range objects using 'range' in access-lists as well as groups. The NAT translation now supports SRC NAT translation for known network objects in rr mode filters.
tags | tool, perl
systems | unix
SHA-256 | 83a14cd01c162dbb2b4f78021b1b6a8d2a95fc60ef2cb2d383c7c55458a39622
Secunia Security Advisory 51144
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | ffc00ca2f9a908e46dec016bb7a8b16923322b279631060c67fe58158b246bea
Secunia Security Advisory 51152
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ERPScan has reported a vulnerability in SAP NetWeaver Process Integration, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 2d6807ea481f9b69db211fe8f581d889683598c20c45bd0627ca7d22573b2518
Secunia Security Advisory 51115
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for exim4. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | f633d5ddb7743f28fda9f71d0d87659940f8023d21bd4ee685b6db34f5eae6bb
Secunia Security Advisory 51151
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ERPScan has reported a vulnerability in Oracle Business Intelligence, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ef6f1af2c2008304225c80b1b14790e0dfd64dd07eff9da161c91cf4bffc0e99
Secunia Security Advisory 51146
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, redhat
SHA-256 | 985fb172a58814d1499ccd7da2a669c0ba03f92af15fa62ba5c618135e262d97
Secunia Security Advisory 51147
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
SHA-256 | a6d20c0c7e9a201910ffd9d38caa6fc8e25c61bc38ea0dcdea1feb5802aabc00
Secunia Security Advisory 51111
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for rtfm. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, debian
SHA-256 | 0d4eb7d52fbe4e46a3dc7abd115d0a558f410c852380b9c2d1a29f34023fc2ff
Secunia Security Advisory 51154
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 6b905e4277fce4fc889eb97d40442bf619cc159192e9ee19fc1789b7238c992e
Secunia Security Advisory 51112
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for request-tracker3.8. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct spoofing attacks, bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, spoof, vulnerability, csrf
systems | linux, debian
SHA-256 | 8dce55e4b09c534669667c8eaca07fa840578e864796ecc3c26089485d97f61c
Secunia Security Advisory 51155
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for exim. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 1e07b274ee5ff2dc78544963b5b613c491dc53de876849737d3f06be02d2ea13
Secunia Security Advisory 51153
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for exim4. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
SHA-256 | 74d9ca41fd0ea7cd018a60b054c9c3b110a912de43ea2b0d16bbf72c99223ee6
HP Operations Agent Opcode coda.exe 0x8c Buffer Overflow
Posted Oct 28, 2012
Authored by Luigi Auriemma, juan vazquez | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in HP Operations Agent for Windows. The vulnerability exists in the HP Software Performance Core Program component (coda.exe) when parsing requests for the 0x8c opcode. This Metasploit module has been tested successfully on HP Operations Agent 11.00 over Windows XP SP3 and Windows 2003 SP2 (DEP bypass). The coda.exe components runs only for localhost by default, network access must be granted through its configuration to be remotely exploitable. On the other hand it runs on a random TCP port, to make easier reconnaissance a check function is provided.

tags | exploit, overflow, tcp
systems | windows
advisories | CVE-2012-2020, OSVDB-83674
SHA-256 | b17f8aa903e5e1fb8c11edc59aa31a5d56b46b6c73d9f2b8f5465c470c2951aa
HP Operations Agent Opcode coda.exe 0x34 Buffer Overflow
Posted Oct 28, 2012
Authored by Luigi Auriemma, juan vazquez | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in HP Operations Agent for Windows. The vulnerability exists in the HP Software Performance Core Program component (coda.exe) when parsing requests for the 0x34 opcode. This Metasploit module has been tested successfully on HP Operations Agent 11.00 over Windows XP SP3 and Windows 2003 SP2 (DEP bypass). The coda.exe components runs only for localhost by default, network access must be granted through its configuration to be remotely exploitable. On the other hand it runs on a random TCP port, to make easier reconnaissance a check function is provided.

tags | exploit, overflow, tcp
systems | windows
advisories | CVE-2012-2019, OSVDB-83673
SHA-256 | 809a9aac4f2a408b3f9058799cf1083d77ec0a7e8360fb3dc6acb06f3554aeee
ManageEngine Security Manager Plus 5.5 build 5505 SQL Injection
Posted Oct 28, 2012
Authored by egypt, sinn3r, xistence | Site metasploit.com

This Metasploit module exploits a SQL injection found in ManageEngine Security Manager Plus advanced search page, which results in remote code execution under the context of SYSTEM in Windows; or as the user in Linux. Authentication is not required in order to exploit this vulnerability.

tags | exploit, remote, code execution, sql injection
systems | linux, windows
SHA-256 | ae2e0907bda1eeb2906f4560caa8085b35712d1a7fe05eeb19dddd8fe8de7ac1
Xplico Network Forensic Analysis Tool 1.0.1
Posted Oct 28, 2012
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages.

Changes: PCAP2WAV, RTP2WAV interface added. RTP dissector improved. IRC dissector improvements. nDPI integration. Various other additions and improvements.
tags | tool, imap, forensics
systems | linux
SHA-256 | f5025f8f3cf38601f02fc821e95e9ff7774909fa90c2605ec0dfe5c8b46ff0a5
Aladdin Knowledge System Ltd Buffer Overflow
Posted Oct 28, 2012
Authored by b33f

Aladdin Knowledge System Ltd PrivAgent.ocx ChooseFilePath buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 6b0e1f5b8ce0b43f6fe89b5aefc2eb998856bca69d78c4825813a7b9d9459d3d
Bypassing Avast Sandbox Using Alternate Data Streaming
Posted Oct 28, 2012
Authored by W1ckerMan

This is a brief whitepaper detailing how to bypass the Avast! sandbox using alternate data streaming.

tags | paper
SHA-256 | 586680dac0f8f3d57c5eef0b2ad0936aa1ccd4bdf17ed5704a5051a36a13ff3f
hMailServer 5.3.3 Remote Denial Of Service
Posted Oct 27, 2012
Authored by John Smith

hMailServer version 5.3.3 IMAP remote crash proof of concept exploit.

tags | exploit, remote, denial of service, imap, proof of concept
SHA-256 | 454219d88cfcbbb8095c691c1741bbe47a484f55661fbda3a4c11ecd92d298bb
Microsoft Windows Help Program Memory Corruption
Posted Oct 27, 2012
Authored by coolkaveh

Microsoft Windows Help memory corruption proof of concept exploit.

tags | exploit, proof of concept
systems | windows
SHA-256 | 82d19ca3b60a9332405e2523a1e48b00ebbabb65324fe0407d610384e7436670
Page 2 of 31
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close