exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2011-12-06 to 2011-12-07

Secunia Security Advisory 47097
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for nginx-1.0. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | 9dc2e6726802cca01c55f1f658a43870eefdbf890376f15dc049a6b07411f81b
Secunia Security Advisory 47129
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been discovered in Microsoft Internet Explorer, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | a76fcf44e70083668fa59634b13baa32364b3b8016ee345cd06c44afb1770545
Secunia Security Advisory 47120
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Research Center has reported a weakness in Kayako Fusion, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
SHA-256 | 8c82e022a9b2e0444323328bde8f0507e9b7286223dd3e0fe3ed3673a55f490d
Secunia Security Advisory 47106
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in WSN products, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | ff81800a15e14048c5db244a8b8e10c7e049ae6619822f947e1b93852989419f
Secunia Security Advisory 47022
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kingcope has discovered a vulnerability in FreeBSD, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | freebsd
SHA-256 | da0f55379af90a62d1150a575c4a0b80b25cd3fa31cc818ee55df7883dab396a
Secunia Security Advisory 47064
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the GNU C Library, which potentially can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | ef1754590cba32ae3d8fc9893d7dd41e16a32420594700337fef3142706bea26
Secunia Security Advisory 47076
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Moodle, which can be exploited by malicious people to conduct HTTP header injection attacks, disclose potentially sensitive information, and bypass certain security restrictions.

tags | advisory, web, vulnerability
SHA-256 | ec512c8338574863f2d6b237a50405eb883ba61a9404ea5c57d806ea3fed3a71
Secunia Security Advisory 47103
Posted Dec 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Moodle, which can be exploited by malicious people to disclose potentially sensitive information, conduct HTTP header injection and spoofing attacks, and bypass certain security restrictions.

tags | advisory, web, spoof, vulnerability
SHA-256 | 2260463872d22bb82de76c44f4d5a189d74659df6cf102aacad9b4c0e7a8b3b1
Meditate Web Content Editor 1.2 SQL Injection
Posted Dec 6, 2011
Authored by Stefan Schurtz

Meditate Web Content Editor version 1.2 suffers form a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 0136f211c726e49b7cf23fcd31dbf5f6dd1bd0fa254d16fe516ad7c267dc552e
Ubuntu Security Notice USN-1287-1
Posted Dec 6, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1287-1 - Nick Bowler discovered the kernel GHASH message digest algorithm incorrectly handled error conditions. A local attacker could exploit this to cause a kernel oops.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2011-4081
SHA-256 | 2f285d3cd1a6c72328680095ff512948f180dde5c75a3cec4aaaa58f625debb7
Ettercap Network Sniffer / Interceptor 0.7.4
Posted Dec 6, 2011
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like SSH and HTTPS). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.

Changes: Many long standing bugs were fixed: a resource depletion issue, buffer access out-of-bounds issues, DNS dissector not working on 64-bit systems, multiple buffer overflows, multiple memory leaks, multiple files with obsolete code, SEND L3 errors experienced by some users, and a compilation error under Mac OS X Lion. The build system was updated.
tags | tool, web, sniffer, protocol
systems | unix
SHA-256 | 9b5abd2dad2b6df91658086ceed6962a6b985ac25de8fa38f0195d68639ba55b
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close