what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

CyberArk Credential Provider Race Condition / Authorization Bypass
Posted Sep 2, 2021
Authored by Klayton Monroe | Site korelogic.com

CyberArk's Credential Provider loopback communications on TCP port 18923 are encrypted with key material that has extremely low entropy. In all currently-known use cases, the effective key space is less than 2^16. For an attacker who understands the key derivation scheme and encryption mechanics, knowledge of the source port and access to the payloads of a given client-server exchange are sufficient to reduce effective key space to one. In cases where the source port is not known, the encrypted payloads will be unable to withstand a brute force attack. Additionally, the user identification mechanism used by CyberArk's Credential Provider is vulnerable to a race condition where an unauthorized/unprivileged user can submit one or more encrypted query requests. If the race is won, the attacker will be able to retrieve sensitive information including passwords and password metadata. Versions prior to 12.1 are affected.

tags | exploit, tcp
advisories | CVE-2021-31797
SHA-256 | 7dede6bcc7b3021a2a5c5df1eb3c7bc0663ae7d954677866d63352936b9f568a

Related Files

Ubuntu Security Notice USN-1139-1
Posted May 30, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1139-1 - It was discovered that Bind incorrectly handled certain bad signatures if multiple trust anchors existed for a single zone. A remote attacker could use this flaw to cause Bind to stop responding, resulting in a denial of service. This issue only affected Ubuntu 8.04 LTS and 10.04 LTS. Frank Kloeker and Michael Sinatra discovered that Bind incorrectly handled certain very large RRSIG RRsets included in negative responses. A remote attacker could use this flaw to cause Bind to stop responding, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2010-3762, CVE-2011-1910
SHA-256 | 82a2c36b85a888540cafda385a6411a7d5d9aa9aa7f327427e24d3e0ecb19e3a
Secunia Security Advisory 44547
Posted May 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in klibc, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | ef3e860ebb85463f84e2c4f292232f096c6e968f7cde876b8dba02ed0a98d9b3
Shackleton Rollin Remote File Disclosure
Posted Apr 28, 2011
Authored by KnocKout

Shackleton Rollin suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 8a4b30a459bf89489b49464052951aba45564c8d22f8d0c574a62823ada4d336
AdSuck DNS Server 2.3
Posted Apr 15, 2011
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: This release fixes a buffer underflow that could result in a crash. It adds SOA when replying NXDOMAIN. It has an Additional section when spoofing to an IP address. The dhclient script has been fixed. Updated hosts files from various sources.
tags | tool, local, spoof
systems | linux, unix
SHA-256 | 668367ef17eb4a5745b7af8e8ee359ced213d5dedc82c273be711440bd96a9ed
Mandriva Linux Security Advisory 2011-068
Posted Apr 7, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-068 - Several invalid HTTPS certificates were placed on the certificate blacklist to prevent their misuse. Users on a compromised network could be directed to sites using the fraudulent certificates and mistake them for the legitimate sites. This could deceive them into revealing personal information such as usernames and passwords. It may also deceive users into downloading malware if they believe it's coming from a trusted site. The NSS and NSPR packages were updated to the latest versions as well as the rootcerts packages providing the latest root CA certs from mozilla as of 2011/03/23. The firefox packages were updated to the latest 3.6.16 version which is not vulnerable to this issue. The mozilla thunderbird 3.1.9 packages were patched with the same fix as of firefox as a precaution.

tags | advisory, web, root
systems | linux, mandriva
SHA-256 | e8f12aa8728abc22813c5a873b4826eae6cfbeb81154145db07a394e39fb0c07
Ubuntu Security Notice USN-1101-1
Posted Apr 1, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1101-1 - It was discovered that several invalid HTTPS certificates were issued and revoked. An attacker could exploit these to perform a man in the middle attack to view sensitive information or alter encrypted communications. These were placed on the certificate blacklist to prevent their misuse.

tags | advisory, web
systems | linux, ubuntu
SHA-256 | 4f783d63e13eb667ba2d8d8fc67df66ed847ad52e1a97be9be9c7631206774da
Ubuntu Security Notice USN-1091-1
Posted Mar 25, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1091-1 - It was discovered that several invalid HTTPS certificates were issued and revoked. An attacker could use these to perform a man-in-the-middle attack. These were placed on the certificate blacklist to prevent their misuse.

tags | advisory, web
systems | linux, ubuntu
SHA-256 | 9d997fd1dc5b1db8c58570b121a52741aeebed05a884b64d8071a28909e56804
Debian Security Advisory 2200-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2200-1 - This update for Iceweasel, a web browser based on Firefox, updates the certificate blacklist for several fraudulent HTTPS certificates. More details can be found in a blog posting by Jacob Appelbaum of the Tor project.

tags | advisory, web
systems | linux, debian
SHA-256 | f1e23c36d6a829293d1483985bc0e10981c1291974554cca193e881d7ff1b9a2
Debian Security Advisory 2199-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2199-1 - This update for the Iceape internet suite, an unbranded version of Seamonkey, updates the certificate blacklist for several fraudulent HTTPS certificates.

tags | advisory, web
systems | linux, debian
SHA-256 | 4a9a08d11b2656009237865299dc8612e4e9eb84def6fdb07e57c074c2bb4564
Secunia Security Advisory 43828
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Xr0b0t has discovered a vulnerability in Kleophatra CMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6b421d56b5d730aab96073898480ed380b39314e7c48b8f915d98f5d0a879b5b
Secunia Security Advisory 43785
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the BookLibrary component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | bc2b70af96c61f6c4c1fe19a05ae19be75cbe298149d02f604b3eaac85639340
Kleophatra 0.1.4 Shell Upload
Posted Mar 19, 2011
Authored by Xr0b0t

Kleophatra version 0.1.4 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | b35cb5484b63e8b8f949c43b8450815541513a2d305147309d6fb2451b8693a8
AdSuck DNS Server 2.2
Posted Mar 18, 2011
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: This release fixes the documentation and provides more examples.
tags | tool, local, spoof
systems | linux, unix
SHA-256 | b414e6ef18929479fd85c8ac470bbcca64a069901694fe449ce4ecc38898863b
2010 Annual Study - U.S. Cost Of A Data Breach
Posted Mar 8, 2011
Authored by Ponemon Institute, Symantec

Whitepaper called 2010 Annual Study: U.S. Cost of a Data Breach. Compliance pressures, cyber attacks targeting sensitive data drive leading IT organizations to respond quickly and pay more. This is a benchmark study of 51 U.S. companies about the financial impact, customer turnover and preventive solutions related to breaches of sensitive information.

tags | paper
SHA-256 | 9cc176c8381bb68607f066dfc318ae42eb811a57dcdcb62a70a04cca68503a77
Tickling CGI Problems
Posted Mar 3, 2011
Authored by Shane A. Macaulay, Derek Callaway | Site security-objectives.com

Tickling CGI Problems is a whitepaper that focuses on the security of Tcl CGI scripts.

tags | paper, cgi
SHA-256 | 1298ddc346dcf21a262702c2826861718c460a4dec46483f991250a955c817bb
Greeklog CMS Blind SQL Injection
Posted Feb 22, 2011
Authored by H3X

Greeklog CMS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 12097a9a3575a918dc8f872c873f828c62588881b307322532a3adc6df584aa5
AdSuck DNS Server 2.1
Posted Feb 22, 2011
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: The cache is purged when signaled to do so. This fixes a bug where the road warrior setup might reply with a stale IP address.
tags | tool, local, spoof
systems | linux, unix
SHA-256 | 0200981b0eb3aa45e4b667643a0afec6e0276c8491f709a09fb9b0f42c2fa2ae
StreamArmor 1.5
Posted Feb 14, 2011
Site streamarmor.com

StreamArmor is a sophisticated tool for discovering hidden alternate data streams (ADS) that can also clean them completely from the system. StreamArmor comes with a fast multi-threaded ADS scanner which can recursively scan over the entire system and quickly uncover all hidden streams. All such discovered streams are represented using specific color patterns based on threat level which makes it easy for human eye to distinguish between suspicious and normal streams.

Changes: Various updates.
SHA-256 | c4abda4dc0f936509d8cc7ca35674cf26dcd0c3faf8b62d020758ff3d43a2ff2
AdSuck DNS Server 2.0
Posted Feb 8, 2011
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: Caching capability was added. libevent is now used in order to speed up processing.
tags | tool, local, spoof
systems | linux, unix
SHA-256 | e7851d1beac311f336d308cac45b2a483b5032ac03a7e9cd35e9d4c2ef6c300e
Linux Security Checklist Tool 2.0.3
Posted Feb 3, 2011
Authored by situ

Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements.

tags | tool, perl
systems | linux, unix
SHA-256 | b95fbf25b0b3c21107a5f4e00b5cab884b3c4b39a41ba33531e455870fe91952
Secunia Security Advisory 42915
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Forum plugin for Geeklog, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 1c516c24177aee0342b1df5995ab13713075873068703e707587a2298d6ed827
Klaus-rabus Dipl.Graphics-Designer Ecommerce Cross Site Scripting / Local File Inclusion
Posted Jan 12, 2011
Authored by R3VAN_BASTARD

Klaus-rabus Dipl.Graphics-Designer Ecommerce version 1.x suffers from cross site scripting and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 37e6b73e3ddd10b6028b6f79df03838d1752f2eea080cd766b6adb7039f4ba4b
WikLink 0.1.3 SQL Injection
Posted Jan 10, 2011
Authored by Aliaksandr Hartsuyeu | Site evuln.com

WikLink version 0.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d1023ad733ef5d55dd7475ed48426a676ad8401b156b244bc1a52dfe2a4b25ca
WikLink 0.1.3 SQL Injection
Posted Jan 5, 2011
Authored by Aliaksandr Hartsuyeu | Site evuln.com

WikLink version 0.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 64d56e977b8efb16fc4d21a090ae5f1e2030a83eb2275b6a6ef5795e23bc6a70
Secunia Security Advisory 42775
Posted Jan 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Geeklog, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | d529b59f3f56cb48ce34fa1fbad86cb15410761654844c08aa076c4eeb555164
Page 3 of 4
Back1234Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    20 Files
  • 29
    Nov 29th
    9 Files
  • 30
    Nov 30th
    21 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close