exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2012-11-13 to 2012-11-14

HT Editor 2.0.20 Buffer Overflow
Posted Nov 13, 2012
Authored by ZadYree

HT Editor version 2.0.20 buffer overflow ROP proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 49bab92cc9715b4094781b154fb2921a41a348687cb6f6d38dd2f7646e1a7587
A-PDF All To MP3 Converter 2.3.0 Buffer Overflow
Posted Nov 13, 2012
Authored by metacom

A-PDF All to MP3 Converter version 2.3.0 local buffer overflow exploit that spawns a bind shell on tcp/4444.

tags | exploit, overflow, shell, local, tcp
SHA-256 | cbce68c6b52ddeaed7cf23015787fc7c91f4d9db829f6799dff02e277c9f1f98
Secunia Security Advisory 51200
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
SHA-256 | b524279aeee71897eaa1e7264bf786633afaf22febac12a033bc8773dcc35895
Secunia Security Advisory 51242
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 1ff55f323f0fb80fd9dc1ccc009191779314508a8794bffb221f58d5fe7424c5
Secunia Security Advisory 51221
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | windows
SHA-256 | 7e31bc059fadcb042aea4685e488184f7b61b7a209c7f027e6aa1dbcb46df460
Secunia Security Advisory 51235
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability have been reported in Microsoft Internet Information Services, which can be exploited by malicious, local users and malicious people to disclose certain sensitive information.

tags | advisory, local
SHA-256 | 89ed246c26a8e17ec38354916a75c936e26dbf7268616e645eec07dafea03733
Secunia Security Advisory 51239
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.

tags | advisory, local, vulnerability
systems | windows
SHA-256 | 2c4ecfa64e39fe7ba5e867f7df3fbc3d4a56b72556c35dd009d02ad964d31e9f
Secunia Security Advisory 51236
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft .NET Framework, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | cd7b149c6d2ea2d965ad618e04c8c8033d27339277fbfd983734380f3d2d5693
Secunia Security Advisory 51202
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 735013be6312d0163f358f94a7376998e36464e701dfc3dee6b053881a0173f5
Secunia Security Advisory 51274
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for gegl. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, redhat
SHA-256 | 964d14061cc5108ef1def0e4a2c27533fc2f82c51ee44b99059562b57cc485aa
Secunia Security Advisory 51198
Posted Nov 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in netOffice Dwins, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | d7f1e4b86f0c9b449578b071f27037d5768cccc1dbd3093f2576420e71f85128
Java Applet JAX-WS Remote Code Execution
Posted Nov 13, 2012
Authored by unknown, juan vazquez | Site metasploit.com

This Metasploit module abuses the JAX-WS classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in November of 2012. The vulnerability affects Java version 7u7 and earlier.

tags | exploit, java, arbitrary
advisories | CVE-2012-5076, OSVDB-86363
SHA-256 | 84f8085a7aae3cc5d26830a695a8c574d4ef5c13dfc3a77061731b06b87041f1
Red Hat Security Advisory 2012-1456-01
Posted Nov 13, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1456-01 - Red Hat Storage is software only, scale-out storage that provides flexible and affordable unstructured data storage for the enterprise. GlusterFS, a key building block of Red Hat Storage, is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnects into one large, parallel network file system. Multiple insecure temporary file creation flaws were found in Red Hat Storage. A local user on the Red Hat Storage server could use these flaws to cause arbitrary files to be overwritten as the root user via a symbolic link attack.

tags | advisory, arbitrary, local, root
systems | linux, redhat
advisories | CVE-2012-4417
SHA-256 | e547ca0ceaf2ae55bf5820dcd30d1b136fcececdf53421a2186da6e2ae54d548
Red Hat Security Advisory 2012-1455-01
Posted Nov 13, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1455-01 - GEGL is a graph-based image processing framework. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the gegl utility processed .ppm image files. An attacker could create a specially-crafted .ppm file that, when opened in gegl, would cause gegl to crash or, potentially, execute arbitrary code. This issue was discovered by Murray McAllister of the Red Hat Security Response Team.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-4433
SHA-256 | e7259c52f0f030b915de52b99e3b7f4431b4ba30262fc2889fe8b4624a57d1b5
Ubuntu Security Notice USN-1630-1
Posted Nov 13, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1630-1 - It was discovered that Libav incorrectly handled certain malformed media files. If a user were tricked into opening a crafted media file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-2772, CVE-2012-2775, CVE-2012-2776, CVE-2012-2777, CVE-2012-2779, CVE-2012-2784, CVE-2012-2786, CVE-2012-2787, CVE-2012-2788, CVE-2012-2789, CVE-2012-2790, CVE-2012-2793, CVE-2012-2794, CVE-2012-2796, CVE-2012-2798, CVE-2012-2800, CVE-2012-2801, CVE-2012-2802
SHA-256 | b39e910317de11213300a2245f845231ea08cff36cc11632c18331b82eee58a5
Ubuntu Security Notice USN-1629-1
Posted Nov 13, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1629-1 - Tomas Mraz discovered that libproxy incorrectly handled certain PAC files. A remote attacker could use this issue to cause libproxy to crash, or to possibly execute arbitrary code.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-4504, CVE-2012-4505
SHA-256 | 2968459de6c88dc6181d4d9051c736f11dd989c514cf37bee924e54a846b2ca1
Debian Security Advisory 2573-1
Posted Nov 13, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2573-1 - Ralf Paffrath reported that Radsecproxy, a RADIUS protocol proxy, mixed up pre- and post-handshake verification of clients. This vulnerability may wrongly accept clients without checking their certificate chain under certain configurations.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2012-4523, CVE-2012-4566
SHA-256 | c52a0d7665ed19b4e404db0700cf9d400d7e8c62f3067b7fe38e99e5f6899da6
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close