exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 47 of 47 RSS Feed

Files Date: 2012-09-28 to 2012-09-29

Secunia Security Advisory 50779
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 97a7cfddfe64cd7787e5a1ad65449303b5f60ab7ff5d3781b8c483a0e7e7092d
Secunia Security Advisory 50784
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a weakness and a vulnerability in IBM Rational Change, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks.

tags | advisory, spoof, xss
SHA-256 | 9185a6cafd8e22f870d3b44850e233a0a1d63c43c8da5001777f97de1c6ff8c1
Secunia Security Advisory 50778
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | d83e60b7a915440567036ea0493b1533fa1acbdbd601c80469c5bdeef6a714cf
Secunia Security Advisory 50774
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco IOS and Cisco IOS XE, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco, osx
SHA-256 | 404769fde5c6566da00c069570d6688a6a7831fbc7dd44bab6be8e3cd3a42237
Secunia Security Advisory 50780
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Samsung Galaxy S III, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 939d54052f7f5931d554b11cfdb777715f342c05b6124124222823930d9140cb
Secunia Security Advisory 50771
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | f67a486eee4f07d5a63f39477a354f04a8652a2a10787453a8d90f5c7724b233
Secunia Security Advisory 50773
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | 1d2921d36501d793f94c3a0527cc2c4a44c98ae7f0a25b8024630355f29edab2
Secunia Security Advisory 50772
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco IOS and Cisco IOS XE, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco, osx
SHA-256 | da97ce5bef8af05a583d5d0dd62c5d18615f36a55ce2aae577781b3cdd7e9e07
Secunia Security Advisory 50718
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for postgresql and postgresql-libs. This fixes a weakness and two vulnerabilities, which can be exploited by malicious people to conduct brute force attacks, disclose certain sensitive information, and compromise a user's system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | e6d29045976e54503799ea1fef37368d555ad50ba32db04bf2da77e94e21958e
Secunia Security Advisory 50763
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for iceape. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 8a8fcbfc8f1b80e9656f7ff4d5be12603609dbba9792999a070d966d103191c7
Secunia Security Advisory 50754
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for dhcp. This fixes a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
SHA-256 | 641eac1b40724b15e258ee63dae6932c26ad1a9845961ab117231202b696a475
Secunia Security Advisory 50756
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 0aa1f8f4c0c742502aaf8eb11feec0c6229aca735665eb4aa67919c255662254
Secunia Security Advisory 50761
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for tiff. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | ac0ecaf646869465557aca4a26e2f9eff3d39ecc45d82fe13a2c719c0a01f5e2
Secunia Security Advisory 50647
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Thomson TWG850 Cable Modem, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 209105203d9d0a14a0c5663f62f8d07b5292ae8920d1d16bcac6046a9495645e
Secunia Security Advisory 50760
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Trend Micro Control Manager, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | a961f280546278624807a37c7340c65dfba3fdf97f6b55a4f9cc2fd796fa6251
Secunia Security Advisory 50764
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM Rational ClearQuest, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | d896db01ed003dc5aedc23a79be41088553c849a25da9ccb610b803da8afde19
AdSuck DNS Server 2.4.3
Posted Sep 28, 2012
Authored by Marco Peereboom | Site peereboom.us

Adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: Updated hosts files. OS X support has been added.
tags | tool, local, spoof
systems | linux, unix
SHA-256 | 4a6d3161ecafc7fe7872ee3e79e620bf4206266bb8146d28bdaa56a6a6441968
Samba SetInformationPolicy AuditEventsInfo Heap Overflow
Posted Sep 28, 2012
Authored by unknown, Blasty, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module triggers a vulnerability in the LSA RPC service of the Samba daemon because of an error on the PIDL auto-generated code. Making a specially crafted call to SetInformationPolicy to set a PolicyAuditEventsInformation allows to trigger a heap overflow and finally execute arbitrary code with root privileges. The module uses brute force to guess the system() address and redirect flow there in order to bypass NX. The start and stop addresses for brute forcing have been calculated empirically. On the other hand the module provides the StartBrute and StopBrute which allow the user to configure his own addresses.

tags | exploit, overflow, arbitrary, root
advisories | CVE-2012-1182, OSVDB-81303
SHA-256 | 9949872fc1ebdc3a22c30908a1250ac0f492dd32e5fa7cdf09b5146958389629
Hashkill 0.3.0
Posted Sep 28, 2012
Authored by gat3way | Site gat3way.eu

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 4 attack methods (dictionary, bruteforce, hybrid) and has 31 plugins for different types of hashes (md5, sha1, phpbb3, mysql, md5 (unix), des(unix), sha(unix), vbulletin, smf, etc). It is multithreaded and supports session save/restore.

Changes: Completely new architecture. True multi-GPU support. A new very powerful and flexible rule engine implemented. Many more changes, features, and updates.
tags | tool, cracker
systems | linux, unix
SHA-256 | 5f6ccb96277ad049c3765c9cc331fb0821255d47d81991d24fc14bed83bbfa75
OSSEC WUI 0.3 Cross Site Scripting
Posted Sep 28, 2012
Authored by Alejandro Ramos

OSSEC WUI version 0.3 suffers from a POST cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8d079d840ac8fd5072d58b0e908b4760ef10866ac645e9b7f97eeed627b61d1a
Apple Mac OS X Lion Arbitrary Code Execution
Posted Sep 28, 2012
Authored by Andy Davis | Site ngssecure.com

Andy Davis of NCC Group has discovered an arbitrary code execution vulnerability in Apple OS X Lion versions 10.7 to 10.7.4 and OS X Lion Server versions 10.7 to 10.7.4.

tags | advisory, arbitrary, code execution
systems | apple, osx
SHA-256 | 4d92bdc3d4a04a081d6ffd6f55afa9423679f106f5b331ef53e98497ba57edae
JAMF Casper Suite MDM Cross Site Request Forgery
Posted Sep 28, 2012
Authored by Jacob Holcomb

JAMF Casper Suite MDM suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2012-4051
SHA-256 | cf040459d9566c7ec0296767cfadc0a7c77290c27d5f32c1c12b7b58c1b369b8
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close