what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Webpower UPS 5.53 Denial Of Service
Posted Jul 3, 2023
Authored by Yehia Elghaly

Webpower UPS version 5.53 suffers from an HTTP denial of service vulnerability. This product stop being supported nearly 10 years ago.

tags | exploit, web, denial of service
SHA-256 | f469bceea0605105d3cbe67c57d08944f6c39dfa4a407ca86cbb376fc34668be

Related Files

Secunia Security Advisory 46024
Posted Sep 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for cups. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 777ed10c22310b1db75756ba8ed41c04a1bc24b3969af25667c108e2fd8ab255
Ubuntu Security Notice USN-1207-1
Posted Sep 14, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1207-1 - Tomas Hoger discovered that the CUPS image library incorrectly handled LZW streams. A remote attacker could use this flaw to cause a denial of service or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2011-2896, CVE-2011-3170
SHA-256 | 8bfbe70cc4ca5596b2643fbe481e5936b02ca2b48ee88041d00a2056cdfa2b54
Secunia Security Advisory 45945
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, fedora
SHA-256 | 205742f45cf019e2f9547d7eba5caa5640e194a5b2d566c8ffaac04b4ef5736a
Tor-ramdisk i686 UClibc-based Linux Distribution x86_64 20110830
Posted Sep 7, 2011
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: This release bumps tor to the latest stable 0.2.2.32, libevent to 2.0.13, busybox to 1.18.5, and the kernel to 2.6.32.45 plus Gentoo's hardened-patches 2.6.32-68.extras. The kernel was patched to allow tor to bind to any port, not just non-root ports.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 9f52d9df65a617bc701d9cdbdad4bd0c5941999c8b81dfbacb8f61f8b2e1eb71
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20110830
Posted Sep 7, 2011
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Changes: This release bumps tor to the latest stable 0.2.2.32, libevent to 2.0.13, busybox to 1.18.5, and the kernel to 2.6.32.45 plus Gentoo's hardened-patches 2.6.32-68.extras. The kernel was patched to allow tor to bind to any port, not just non-root ports.
tags | tool, x86, kernel, peer2peer
systems | linux
SHA-256 | 1085235659d66a4e8b278a57cced928a440107b3303d518858024a65d6b9c3d9
OpenSSH 5.9p1
Posted Sep 6, 2011
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: This release added experimental sandboxing of network-facing code during the pre-authentication phase and SHA2-based HMAC modes for the SSH transport. sshd now sends logs from the privilege-separated process via a pipe, eliminating the need for /var/empty/dev/log. There were many more bugfixes and changes.
tags | encryption
systems | linux, unix, openbsd
SHA-256 | 6497ed9245fd883ef37cc984504ec91b1b780335510e1b353bedc9a0d6466a63
Adobe Groups Cross Site Scripting
Posted Sep 6, 2011
Authored by Sony

Adobe Groups suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1b443f2aa9acfe0a5279a5cc708ab5b3eb09a22f8d900bb72c27d01b4a75a93f
TOR Virtual Network Tunneling Tool 0.2.2.32
Posted Sep 1, 2011
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This is the first stable release in the 0.2.2 branch. This release features improved client performance and hidden service reliability, better compatibility for Android, correct behavior for bridges that listen on more than one address, more extensible and flexible directory object handling, better reporting of network statistics, improved code security, and many other features and bugfixes.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | 8744328c10b54950e08ee404a75a0e76865be0615cad6f7ffc8c75af7151ef4d
Secunia Security Advisory 45796
Posted Aug 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in CUPS, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | ab8cf27cae60b0ba3eced474dd93366c24887e712ef3e1a766a029a9530eb4ab
Secunia Security Advisory 45713
Posted Aug 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in CUPS, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 189a6a3bc269315a899494d710d602f1129af233b6abfd24962eab84171bf7f8
Ubuntu Security Notice USN-1194-1
Posted Aug 23, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1194-1 - It was discovered that the foomatic-rip Foomatic filter incorrectly handled command-line options. An attacker could use this flaw to cause Foomatic to execute arbitrary code as the "lp" user. In the default installation, attackers would be isolated by the CUPS AppArmor profile.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2011-2697, CVE-2011-2964
SHA-256 | d5f428d304c124d6a8dc9a307acfce02f4e686d5840fe64e6fa59bc75875da98
WordPress File Groups 1.1.2 SQL Injection
Posted Aug 18, 2011
Authored by Miroslav Stampar

WordPress File Groups plugin versions 1.1.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | da50af2627e8c92741bcc4092656427b01f3fbffc604f71ad782f4791300118c
Secunia Security Advisory 45673
Posted Aug 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Miroslav Stampar has discovered a vulnerability in the File Groups plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2d306a29a0969429ce652e17e52b7a64cf46c15ff136669d402bbde768f5b082
Ubuntu Security Notice USN-1181-1
Posted Jul 29, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1181-1 - It was discovered that libsoup did not properly validate its input when processing SoupServer requests. A remote attacker could exploit this to access files via directory traversal.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2011-2524
SHA-256 | 14e4949d1f5bc313734e55b50adf2646d195731a6e58ea63f28211c4574fdbca
Red Hat Security Advisory 2011-1102-01
Posted Jul 29, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1102-01 - libsoup is an HTTP client/library implementation for GNOME. A directory traversal flaw was found in libsoup's SoupServer. If an application used SoupServer to implement an HTTP service, a remote attacker who is able to connect to that service could use this flaw to access any local files accessible to that application via a specially-crafted request. All users of libsoup should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running applications using libsoup's SoupServer must be restarted for the update to take effect.

tags | advisory, remote, web, local
systems | linux, redhat
advisories | CVE-2011-2524
SHA-256 | 2d111ef0e64d2744457f6d7bec28ca03c7a869c7b009fdbc59b288e639888134
Secunia Security Advisory 45349
Posted Jul 25, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in McAfee GroupShield, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | aa752efbe0432eca848bef9a70ed6d4feeb4629518734d64388d7abf7e6130be
Avon Groups SQL Injection
Posted Jul 25, 2011
Authored by Ehsan_Hp200

Avon Groups suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | baf56e993558ba553ed7744d1e7ad0f9204179c70721baf17503fec654e2df74
Checkpoint FW Cleanup Tool-2
Posted Jun 6, 2011
Authored by Cem Uluyazi, Peter Kuchar

This shell script is to find unused service objects in objects_5_0.C and rulebases_5_0.fws files on Checkpoint Firewalls. It searches for unused services both in service groups and the rulebase, then generates the output list as a text file. If you have the copies of files objects_5_0.C and rulebases_5_0.fws, you can run the script in a bash environment.

tags | tool, shell, firewall, bash
systems | unix
SHA-256 | f364e2e1c181a703d1339e2b608e9304e51fd8f57b139fc754785772749f7da3
Checkpoint FW Cleanup Tool-1
Posted Jun 6, 2011
Authored by Cem Uluyazi, Peter Kuchar

This shell script is to find unused objects in objects_5_0.C and rulebases_5_0.fws files on Checkpoint Firewalls. It searches for unused objects both in object groups and the rulebase, then generates the output list as a text file. If you have the copies of files objects_5_0.C and rulebases_5_0.fws, you can also run the script in a bash environment.

tags | tool, shell, firewall, bash
systems | unix
SHA-256 | 3f04eebb14bcb24142a45260f523afa2976af233ae6bfa598b42a59b3e34c637
GNU SIP Witch Telephony Server 1.0.0
Posted May 15, 2011
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: This release is intended to provide a stable release family to power existing secure calling services for public and private use while GNU Free Call services are developed for sipwitch 2.0.
tags | telephony
systems | unix
SHA-256 | bff01b00a04b4f8d246cef236da44a4b42ee12eab2af28f943e5c55dfca9f9ce
OpenSSH 5.8p2
Posted May 4, 2011
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Fixed a local private host key compromise on platforms without host-level randomness support.
tags | encryption
systems | linux, unix, openbsd
SHA-256 | e5a1c821dd8dc33a94c445290956d52e03b3c450f9cd448b96d92317fd4cce42
Mandriva Linux Security Advisory 2011-067
Posted Apr 6, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-067 - The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service via a request that contains a lock token. Additionally for Corporate Server 4 and Enterprise Server 5 subversion have been upgraded to the 1.6.16 version due to of numerous upstream fixes and new features, the serf packages has also been upgraded to the now required 0.3.0 version.

tags | advisory, remote, web, denial of service
systems | linux, mandriva
advisories | CVE-2011-0715
SHA-256 | 3cec616a438351034abd1c3dda5c73b15ac0e5c808ea9988cf3f894ae6f07cda
Ubuntu Security Notice USN-1093-1
Posted Mar 25, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1093-1 - Joel Becker discovered that OCFS2 did not correctly validate on-disk symlink structures. Ben Hutchings discovered that the ethtool interface did not correctly check certain sizes. Eric Dumazet discovered that many network functions could leak kernel stack contents. Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. A large number of additional vulnerabilities have also been address.

tags | advisory, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2010-2478, CVE-2010-2942, CVE-2010-2943, CVE-2010-2954, CVE-2010-2955, CVE-2010-2960, CVE-2010-2962, CVE-2010-2963, CVE-2010-3067, CVE-2010-3078, CVE-2010-3079, CVE-2010-3080, CVE-2010-3084, CVE-2010-3296, CVE-2010-3297, CVE-2010-3298, CVE-2010-3310, CVE-2010-3432, CVE-2010-3437, CVE-2010-3442, CVE-2010-3477, CVE-2010-3705, CVE-2010-3848, CVE-2010-3849, CVE-2010-3850, CVE-2010-3858, CVE-2010-3859, CVE-2010-3861
SHA-256 | c0782ec52287eab8561329a78cec59713d72aef79fd6b9dd6d11304a47144159
Secunia Security Advisory 43521
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cups. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks, disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, csrf
systems | linux, debian
SHA-256 | da92f7f4709d31f93ef75506e6dfd099ce52d0fcbe6795af1c71d9147224610d
GNU SIP Witch Telephony Server 0.10.2
Posted Mar 18, 2011
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: cmake build was introduced. A new desktop permissions mode was added for integration between sipwitch service running as a privileged daemon and the user desktop. The utilities were reorganized and simplified.
tags | telephony
systems | unix
SHA-256 | b4b02f031240e624405bb78c70f1bf7bc072a81cb290c25606afecbe4600b6b5
Page 4 of 4
Back1234Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close