what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service
Posted May 18, 2011
Authored by Lufeng Li

Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit.

tags | exploit, denial of service, kernel, local
systems | windows
SHA-256 | 4c62bc0bdb4613a8d22165e49dbe876c86fa1825bcd8b2047eae3fd7038cecc3

Related Files

Cisco Security Advisory 20120314-asaclient
Posted Mar 15, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco Clientless VPN solution as deployed by Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX control on client systems to perform port forwarding operations. Microsoft Windows-based systems that are running Internet Explorer or another browser that supports Microsoft ActiveX technology may be affected if the system has ever connected to a device that is running the Cisco Clientless VPN solution. A remote, unauthenticated attacker who could convince a user to connect to a malicious web page could exploit this issue to execute arbitrary code on the affected machine with the privileges of the web browser. The affected ActiveX control is distributed to endpoint systems by Cisco ASA. However, the impact of successful exploitation of this vulnerability is to the endpoint system only and does not compromise Cisco ASA devices. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.

tags | advisory, remote, web, arbitrary, activex
systems | cisco, windows
advisories | CVE-2012-0358
SHA-256 | d5eb4f15929e22adebee6cabc4901b0a19fd375282c7f4226edd361bb721237f
Technical Cyber Security Alert 2012-073A
Posted Mar 14, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-73A - There are multiple vulnerabilities in Microsoft Windows, Microsoft Visual Studio, and Microsoft Expression Design. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
systems | windows
SHA-256 | 5e7d3055e03be589eac0b63294de8a037c586b48fd7bee432155f1030b760819
Secunia Security Advisory 47919
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | e396ffc2ec0af9076c93223897d604b7ec49ecde9cd413e215fcd8fae3cd9d05
Secunia Security Advisory 48395
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | windows
SHA-256 | 35efd86b7300074fab6c890b6808a7ea68ca15d8c2d96591515d9cd15b3b5e22
Secunia Security Advisory 48394
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | e86abc5e38a95ae5de2fb87a91ffafd9702de11be5d4ec607545bd70c072f285
Secunia Security Advisory 48361
Posted Mar 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | fa11eff82c3950cfeaa3ae80c30ba052e4a91ab91740f995847d3c0fbbebe505
Zero Day Initiative Advisory 12-034
Posted Feb 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-034 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ASX meta files. When the code within wmp.dll attempts to process the version string within a meta file, it copies it to a fixed-length buffer on the stack without checking that the destination can contain the input data. This can be abused remotely by attackers to execute arbitrary code under the context of the user running the media application.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2012-0150
SHA-256 | a83c58db30683d599df4aeb59ef7425627e17a94a25da7f227d7ceab7170b361
Technical Cyber Security Alert 2012-45A
Posted Feb 15, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-45A - There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Silverlight, Office, and Microsoft Server Software. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
systems | windows
SHA-256 | 8457d85d15912aeb51608210888694a1a98c23b89b24233876fcddaa5bc42fa9
Secunia Security Advisory 47911
Posted Feb 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
systems | windows
SHA-256 | 320e11e07acc3a99807215dc85fd2bb7d959eccfcdd19d1e508f660811292f20
Secunia Security Advisory 47949
Posted Feb 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | b7a8046a4fcd88803750a2ff00233dac8f95a51888ab3433717d4f29e597535c
MS12-005 Microsoft Windows Assembly Execution
Posted Jan 15, 2012
Authored by Byoungyoung Lee

Proof of concept malicious .docm file that exploits the Microsoft Windows Assembly Execution vulnerability as described in MS12-005.

tags | exploit, proof of concept
systems | linux, windows
advisories | CVE-2012-0013
SHA-256 | 98bc8a29290ece74c67173b63b552c9c368c1ca5e2dadc7cc3c95eafdc97f3a9
Technical Cyber Security Alert 2012-10A
Posted Jan 11, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-10A - There are multiple vulnerabilities in Microsoft Windows and Microsoft Developer Tools and Software. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
systems | windows
SHA-256 | c9404ef20e1ea85a0199a296f3fc29a86450d8d3d82704ffccd9b3af577075ac
Secunia Security Advisory 45189
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | edbbe10ce1a486316c7bbf668a523fc52e89d99b79c1b2bbd442084283a4e5fb
Secunia Security Advisory 47485
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | windows
SHA-256 | 863727e71b5457a41c29a432aac1f3b8cf2ad54810fc7c6c2c14f7545fb2d993
Secunia Security Advisory 47356
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security features.

tags | advisory
systems | windows
SHA-256 | b5afc94ac322dd5513921076204c2f24455af1d5fe508e0603a21b26d82481e2
Secunia Security Advisory 47480
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 7909289c308819317964b6764b4094755775e0af592573e7dc3f8fec970eccd5
Secunia Security Advisory 47479
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | ccd670605d7ce8588871bd4ff27567202a99042c493b06d93dd22c3cf99326f5
Windows Media Player 11.0.5721.5262 Denial Of Service
Posted Dec 25, 2011
Authored by Level

Microsoft Windows Media Player version 11.0.5721.5262 remote denial of service exploit.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 8f956aea0456c97de55561f1b85fde6e2d17e46339271b02a273569d29f09677
Secunia Security Advisory 47256
Posted Dec 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Phone, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | d601ccb7ff992a42790dba8ecaa8246e8be0d11887d8ec7d2c601ebdbaab5794
Microsoft Windows Time Behaviour Remote Use-After-Free
Posted Dec 19, 2011
Authored by Nicolas Joly, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows. The vulnerability is caused by a use-after-free error in the "mshtml.dll" module when handling a specific Time behavior, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page.

tags | advisory, remote, web
systems | windows
SHA-256 | cba9bea32ea67c8da60c966ebfc113a9ade45175f2c308da67602f022e70e159
Microsoft Windows "datime.dll" Remote Code Execution
Posted Dec 19, 2011
Authored by Nicolas Joly, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows. The vulnerability is caused by a use-after-free error in the TIME (datime.dll) module when loaded via a specific behavior, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page.

tags | advisory, remote, web
systems | windows
SHA-256 | 363771ff8fedc0e7c3eb4df5ff9a4fe0bc4f64c4b34e44157b5e85bbbd053e8e
Microsoft Windows Media Player DVR-MS Buffer Overflow
Posted Dec 19, 2011
Authored by Sebastien Renaud, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows Media Player. The vulnerability is caused by a buffer overflow error in the XDSCodec & Encypter/Decrypter Tagger Filters "ENCDEC.DLL" within Windows Media Player when processing certain fields within a DVR-MS (Digital Video Recording) file, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page or a malicious ".dvr-ms" media file.

tags | advisory, remote, web, overflow
systems | windows
SHA-256 | abe71c0175b7a06c7b13a1c8e877a119177040e1b36f365f7231fe6642d78a92
Secunia Security Advisory 47237
Posted Dec 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 131075ffe1dd1552a9660910dfa2c86dcf7daea241caf13ec67b0077448e309e
RSASecurID Software Token 4.1 Insecure Library Loading
Posted Dec 15, 2011
Site emc.com

RSA, The Security Division of EMC, announces security fixes and improvements for RSA SecurID Software Token 4.1 for Microsoft Windows. This release addresses an Insecure Library Loading vulnerability within RSA SecurID Software Token for Windows. This release also provides an alternate installation package for customers who do not require the software token automation API features of the product.

tags | advisory
systems | windows
advisories | CVE-2011-4141
SHA-256 | 173128391433f9f53094b5c9d41cdbcabc710ca350ef8bec7635e2bac54b927a
Technical Cyber Security Alert 2011-347A
Posted Dec 14, 2011
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2011-347A - There are multiple vulnerabilities in Microsoft Windows, Office, and Internet Explorer. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
systems | windows
SHA-256 | b9cbd618dc5ad0ab1f0332bb4d47e133da88374e06cc85472a7ccb80e850fb21
Page 2 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close