exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2012-01-07

Secunia Security Advisory 47426
Posted Jan 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | 27c5d23c6be9a30824814a60aacf25021583d39f03e237fb26e4d5e3b490d3ef
Secunia Security Advisory 47392
Posted Jan 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for krb5. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 235175ebb08fecd53ef1f1503dd967d9ced6d7b96fc4929f5b05e163637ce06f
Secunia Security Advisory 47443
Posted Jan 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Registration Codes module for Drupal, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | b46e74eb9b9ce670dd310a84d58a1ca0f206ba7dbdb53c3644485a2b6d3aead0
Secunia Security Advisory 47452
Posted Jan 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in UBB.threads, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | e7b3e0ad4ad461ac8227bdc59cbc718ea2998ad3690a9f3e30ba0da04581bb60
OpenSSL Toolkit 1.0.0f
Posted Jan 7, 2012
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: A fix was introduced for a security issue where an extension of the Vaudenay padding oracle attack on CBC mode encryption enables an efficient plaintext recovery attack against the OpenSSL implementation of DTLS. Various other bugfixes and improvements were made.
tags | tool, encryption, protocol
systems | unix
advisories | CVE-2011-4108, CVE-2011-4576, CVE-2011-4619, CVE-2012-0027, CVE-2011-4577
SHA-256 | faf1eab0ef85fd6c3beca271c356b31b5cc831e2c6b7f23cf672e7ab4680fde1
Technical Cyber Security Alert 2012-6A
Posted Jan 7, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-6A - Wi-Fi Protected Setup (WPS) provides simplified mechanisms to configure secure wireless networks. The external registrar PIN exchange mechanism is susceptible to brute force attacks that could allow an attacker to gain access to an encrypted Wi-Fi network.

tags | advisory
SHA-256 | b37c21ad33cd8507ebeea5cd4b34829a2fda35d92dc3ebc05875fc4c7aa0c110
Ubuntu Security Notice USN-1306-2
Posted Jan 7, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1306-2 - USN-1306-1 fixed vulnerabilities in Firefox. This update provides updated Mozvoikko and ubufox packages for use with Firefox 9. Alexandre Poirot, Chris Blizzard, Kyle Huey, Scoobidiver, Christian Holler, David Baron, Gary Kwong, Jim Blandy, Bob Clary, Jesse Ruderman, Marcia Knous, and Rober Longson discovered several memory safety issues which could possibly be exploited to crash Firefox or execute arbitrary code as the user that invoked Firefox. Various other issues were also addressed.

tags | advisory, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2011-3658, CVE-2011-3660, CVE-2011-3661, CVE-2011-3663, CVE-2011-3665
SHA-256 | fb1b31af3076d871d28a266beb07383380a0af8d461b803c1151a07c03fc997c
Ubuntu Security Notice USN-1306-1
Posted Jan 7, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1306-1 - Alexandre Poirot, Chris Blizzard, Kyle Huey, Scoobidiver, Christian Holler, David Baron, Gary Kwong, Jim Blandy, Bob Clary, Jesse Ruderman, Marcia Knous, and Rober Longson discovered several memory safety issues which could possibly be exploited to crash Firefox or execute arbitrary code as the user that invoked Firefox. Aki Helin discovered a crash in the YARR regular expression library that could be triggered by javascript in web content. Various other issues were also addressed.

tags | advisory, web, arbitrary, javascript
systems | linux, ubuntu
advisories | CVE-2011-3658, CVE-2011-3660, CVE-2011-3661, CVE-2011-3663, CVE-2011-3665
SHA-256 | e2aa447b98554257f109cac90d0c5d53f206d2e9d086a68a789b01c68ee3ed64
Novell Netware XNFS.NLM NFS Rename Remote Code Execution
Posted Jan 7, 2012
Authored by Francis Provencher

Novell Netware version 6.5 SP8 suffers from a XNFS.NLM NFS Rename remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 00b22eb07f1cc14aa9a35dae7eb6cc09b9489454a5d12142e3febb92a409a2e8
Novell Netware XNFS.NLM STAT Notify Remote Code Execution
Posted Jan 7, 2012
Authored by Francis Provencher

Novell Netware version 6.5 SP8 suffers from a XNFS.NLM STAT Notify remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 5d3a4261c59dc1dd0fadd112e2583f47f27209f3d5a2e638e6575eccb0716806
WordPress Pay With Tweet Cross Site Scripting / SQL Injection
Posted Jan 7, 2012
Authored by Gianluca Brindisi

WordPress Pay With Tweet plugin versions 1.1 and below suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | ee9730e6f56417b923772a21ff799336d514dbe588c151cd1d5fbe7f8863f5d5
TinyWebGallery 1.8.3 Remote Command Execution
Posted Jan 7, 2012
Authored by Expl0!Ts

TinyWebGallery version 1.8.3 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 159bf1d3ec69e72736a26f8bea8c478e4b3a9326f5becd2e136477e2d1e0573e
Look411.com Cross Site Scripting
Posted Jan 7, 2012
Authored by Girish Shrimali

Look411.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 163f9f60f91928cf0ccc4915c472e3824eb9fa8436375980ea242d9514dcb6fd
Atar2b CMS 4.0.1 SQL Injection
Posted Jan 7, 2012
Authored by Net.Edit0r, BHG Security Center, G3n3Rall

Atar2b CMS version 4.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 601a89c4c9768908e2e87694aa87d3029081e8732cda3d09886186e5dbf3aa1e
Goto System SQL Injection
Posted Jan 7, 2012
Authored by ruben_linux

Goto System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 620bec0e53e63e9f36373909ac6b5c9455621cf51bd5b781f88c0e4ebd0a745b
DIGIT CMS 1.0.7 Cross Site Scripting / SQL Injection
Posted Jan 7, 2012
Authored by Net.Edit0r, BHG Security Center, G3n3Rall

DIGIT CMS version 1.0.7 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | f35ad762f228af8f8a3487ef7a01c9305f2268b1bd8b4832da330c23b01fc3d0
Debian Security Advisory 2381-1
Posted Jan 7, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2381-1 - It was discovered that the IPv6 support code in Squid does not properly handle certain DNS responses, resulting in deallocation of an invalid pointer and a daemon crash.

tags | advisory
systems | linux, debian
advisories | CVE-2011-4096
SHA-256 | 17e34658a97477a20eed60bd15f3b6425fcbe048094fb417f5bec8484204a56c
VBDrupal Cross Site Scripting
Posted Jan 7, 2012
Authored by Sony

VBDrupal suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 72532f1c94060a4586aecb31b2ddccb024595e1ebee9913901d39335038c2cf6
IRIS SQL Injection
Posted Jan 7, 2012
Authored by Farbod Mahini, H4ckCity Security Team | Site h4ckcity.org

IRIS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 028ef517cf5b64dad025673f6726b80958f3ac473a11f36896fd07c9056afcc3
IpTools 0.1.4 Directory Traversal
Posted Jan 7, 2012
Authored by demonalex

IpTools (Tiny TCP/IP server) version 0.1.4 suffers from a directory traversal vulnerability.

tags | exploit, tcp, file inclusion
SHA-256 | e7c4d4712ec9ceb7a44066fe92fa6f19a4cf1f4390164fa03d4a9a2519bcdd6f
IpTools 0.1.4 Overflow
Posted Jan 7, 2012
Authored by demonalex

IpTools (Tiny TCP/IP server) version 0.1.4 suffers from denial of service and overflow vulnerabilities.

tags | exploit, denial of service, overflow, tcp, vulnerability
SHA-256 | bdf1ea586fea677491e015279797adfa7ca3848e267daac8854bb6a545bbfac1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close