exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 63 of 63 RSS Feed

Files Date: 2013-01-08 to 2013-01-09

Secunia Security Advisory 51778
Posted Jan 8, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE had released an update for mariadb. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, suse
SHA-256 | 1f577e8496390fbe5233d121f131288cc988757163001a4b52481c372819efa3
GNU Privacy Guard 1.4.13
Posted Jan 8, 2013
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.
tags | tool, encryption
advisories | CVE-2012-6085
SHA-256 | 5a3f99d43688d818995fcbb02f31c1a995d47379b8b81fa12708c6b3e47823d2
HP Security Bulletin HPSBOV02833 SSRT101043
Posted Jan 8, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBOV02833 SSRT101043 - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on OpenVMS Integrity Servers. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other exploits. Revision 1 of this advisory.

tags | advisory, java, remote, vulnerability
advisories | CVE-2012-1531, CVE-2012-1532, CVE-2012-1533, CVE-2012-3143, CVE-2012-3159, CVE-2012-3216, CVE-2012-4416, CVE-2012-5068, CVE-2012-5069, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5077, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5085, CVE-2012-5086, CVE-2012-5087, CVE-2012-5089
SHA-256 | 67fab78b1e2f733577923b7a2d7943654d0b5fd4af2e8843287d1be1685a0b77
Ettercap 0.7.5.1 Stack Overflow
Posted Jan 8, 2013
Authored by Sajjad Pourali

Ettercap versions 0.7.5.1, 0.7.5, and 0.7.4 and below suffer from a stack overflow vulnerability. Version 0.7.4.1 is not affected.

tags | exploit, overflow
advisories | CVE-2012-0722
SHA-256 | 441cfdeb1206f31b83110efd5e60a48cc510f71789d13efdc3787ca345080ca6
Foxit Reader 5.4.4.1128 Plugin For Firefox Buffer Overflow
Posted Jan 8, 2013
Authored by rgod | Site retrogod.altervista.org

The Foxit Reader plugin for Firefox suffers from an overly long query string remote stack buffer overflow vulnerability in npFoxitReaderPlugin.dll. Versions 5.4.4.1128 and below are affected.

tags | exploit, remote, overflow
SHA-256 | 6a542e992542383195aaa18e60759b3a2bfb1211b67ab8744bdec617dbce8df3
Facebook For Android Information Disclosure
Posted Jan 8, 2013
Authored by Takeshi Terada

The LoginActivity of the Facebook for Android application has an improper intent handling flaw that allows for malicious Android applications to perform private file theft. Version 1.8.2 was released to address this vulnerability.

tags | exploit, info disclosure
SHA-256 | bfd6840f9cf9dfaa8007ee516aa404c4986914448f276af4a47c918238fb498d
Chrome For Android Cookie Theft
Posted Jan 8, 2013
Authored by Takeshi Terada

Symbolic links can be used for spoofing Content-Type of local files and this enables malicious Android applications the ability to steal Chrome's cookie file. Version 18.0.1025308 was released to address this vulnerability.

tags | exploit, local, spoof
advisories | CVE-2012-4909
SHA-256 | 20dd3d870f049909a9ad1c797062381c1dafee9065f6baad9f3348dc65d0e398
Chrome For Android Bypassing SOP Flaw
Posted Jan 8, 2013
Authored by Takeshi Terada

Chrome for Android's Same-Origin Policy for local files (file: URI) can be bypassed by using symbolic links. It results in theft of Chrome's private files by malicious Android applications. Version 18.0.1025308 was released to address this vulnerability.

tags | exploit, local, bypass
advisories | CVE-2012-4908
SHA-256 | 31b4f82055384f1f95a84986da35e99a7077219bca1316b3a7026760d9c6556a
Nuit Du Hack 2013 Call For Papers
Posted Jan 8, 2013
Authored by Nuit Du Hack

The Nuit Du Hack Call For Papers has been announced. It will be held June 22nd, 2013 at the Disneyland Paris Conference Centre.

tags | paper, conference
SHA-256 | 2db234b3fad1226b1e44f8f4e233e8ee8ef993f2b031c5d51cff148c0b5b3167
Chrome For Android API Exposure
Posted Jan 8, 2013
Authored by Takeshi Terada

By abusing Java objects exposed to JavaScript, malicious web pages can execute arbitrary commands on Chrome for Android, if the accessibility setting of the device is enabled. Version 18.0.1025308 was released to address this vulnerability.

tags | exploit, web, arbitrary, javascript
advisories | CVE-2012-4907
SHA-256 | 95e692ac40350a557feb45c1ae2225015502f27f4e789618b992e21f7de06b96
Chrome For Android Download Function Information Disclosure
Posted Jan 8, 2013
Authored by Takeshi Terada

Chrome for Android suffers from an issue where a malicious application has the ability to steal private information. Version 18.0.1025308 was released to address this vulnerability.

tags | exploit, info disclosure
advisories | CVE-2012-4906
SHA-256 | d32b410ecbaee0bf30696c5cc4ecfbba670e0931bde59217b08a9f1e54df5589
Gentoo Linux Security Advisory 201301-01
Posted Jan 8, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201301-1 - Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may allow execution of arbitrary code or local privilege escalation. Versions less than 10.0.11 are affected.

tags | advisory, arbitrary, local, vulnerability
systems | linux, gentoo
advisories | CVE-2011-3101, CVE-2007-2436, CVE-2007-2437, CVE-2007-2671, CVE-2007-3073, CVE-2008-0016, CVE-2008-0017, CVE-2008-0367, CVE-2008-3835, CVE-2008-3836, CVE-2008-3837, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064, CVE-2008-4065, CVE-2008-4066, CVE-2008-4067, CVE-2008-4068, CVE-2008-4069, CVE-2008-4070, CVE-2008-4582, CVE-2008-5012, CVE-2008-5013, CVE-2008-5014
SHA-256 | 741702614c26339e63b97a9b8ab9a9381edca7bbd021557829522edcdfbddb9c
Red Hat Security Advisory 2013-0141-01
Posted Jan 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0141-01 - JBoss Enterprise Portal Platform is the open source implementation of the Java EE suite of services and Portal services running atop JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Enterprise Middleware components that have been tested and certified together to provide an integrated experience. Multiple reflected cross-site scripting flaws were found in GateIn Portal. If a remote attacker could trick a user, who was logged into the GateIn Portal interface, into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user's GateIn Portal session.

tags | advisory, java, remote, web, arbitrary, xss
systems | linux, redhat
advisories | CVE-2012-5531
SHA-256 | dd8b8eebab027cc88f0d34936c9de553d9a2da9de3741d89e5b7be8c91fd7df0
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close