exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 61 RSS Feed

Files Date: 2009-09-11

ShmooCon VI Call For Papers
Posted Sep 11, 2009
Site shmoocon.org

Call For Papers for ShmooCon VI. This conference will be held February 5th through the 7th, 2010 at the Wardman Park Marriott in Washington D.C., USA.

tags | paper, conference
SHA-256 | 2ce39f79b09313136d4d7a485df21d24c7f3cf070eaec57535d03de860aefb6f
Mandriva Linux Security Advisory 2009-232
Posted Sep 11, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-232 - A security vulnerability has been identified and fixed in libsamplerate. Lev Givon discovered a buffer overflow in libsamplerate that could lead to a segfault with specially crafted python code. This problem has been fixed with libsamplerate-0.1.7 but older versions are affected. This update provides a solution to this vulnerability.

tags | advisory, overflow, python
systems | linux, mandriva
SHA-256 | 1c0b306e55ccbf49d474cf47f1400104caf0be94c944b7ccb3fb6c9738b7e3a9
Mandriva Linux Security Advisory 2009-197
Posted Sep 11, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-197-2 - Security issues in nss prior to 3.12.3 could lead to a man-in-the-middle attack via a spoofed X.509 certificate and md2 algorithm flaws, and also cause a denial-of-service and possible code execution via a long domain name in X.509 certificate. This update provides the latest versions of NSS and NSPR libraries which are not vulnerable to those attacks. This update also provides fixed packages for Mandriva Linux 2008.1 and fixes mozilla-thunderbird error messages.

tags | advisory, spoof, code execution
systems | linux, mandriva
advisories | CVE-2009-2408, CVE-2009-2409, CVE-2009-2404
SHA-256 | 394905da2291d3fb11814cfdd3fb15394407e4aae6c16a48e8e81df3b42b194f
Mozilla Firefox Remote Command Execution
Posted Sep 11, 2009
Authored by Dan Kaminsky | Site doxpara.com

Mozilla Firefox versions up through 3.0.13 suffer from an arbitrary command execution vulnerability due to the pkcs11.addmodule function.

tags | exploit, arbitrary
SHA-256 | d27911cb4945b160c3febbb8a671498c09e9a56d2ba6f7c5749ad00881cf8fd4
Mandriva Linux Security Advisory 2009-228
Posted Sep 11, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-228 - neon before 0.28.6, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability.

tags | advisory, arbitrary, spoof
systems | linux, mandriva
advisories | CVE-2009-2474
SHA-256 | 18e9fa5f9f8141d73b14184dbaa578570f376ab2fbed07496797d27052465122
IBM AIX 5.6/6.1 File Overwrite
Posted Sep 11, 2009
Authored by Marco Ivaldi

IBM AIX versions 5.6 and 6.1 _LIB_INIT_DBG arbitrary file overwrite via libc debug.

tags | exploit, arbitrary
systems | aix
SHA-256 | 7f054254bca5207953d6b438ec277152539965bd3ee3d193b3a690ceeb72fe4f
Mandriva Linux Security Advisory 2009-231
Posted Sep 11, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-231 - Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries. This update provides a solution to this vulnerability.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-3050
SHA-256 | 1465772bf9a9ab6076220912dfcb7f48b2c4d4a7aba914839979e69e39b5b539
Joomla Hotel Booking System XSS / SQL Injection
Posted Sep 11, 2009
Authored by M.Hasran Addahroni | Site advisories.echo.or.id

The Joomla Hotel Booking System component suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | a49fe708601c6ee96b3fc50e7b90e373b830793f8f2376c0ee631decbf03ff66
Haraldscan Bluetooth Discovery Scanner
Posted Sep 11, 2009
Authored by Terence Stenvold | Site code.google.com

Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python.

Changes: This release adds a -u option to update MACLIST to the most recent version. It adds a proper GPLv3 disclaimer and license. It fixes other minor bugs (mostly not noticed by users). This is a Linux-only release.
tags | tool, python, wireless
SHA-256 | e1acbe28ca0cb7d248381a15c9b91ebfbc8996cdea42d0d19582b69cc938beb0
PDFResurrect PDF Analyzer 0.8
Posted Sep 11, 2009
Authored by enferex | Site 757labs.com

PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.

Changes: This is a bugfix release. A indefinite stall would occur if a trailer for linearized PDF could not be found. This case is probably because the PDF is using xref streams.
tags | tool, forensics
SHA-256 | 267e613adcd2e4def5a8b399243921d9e748a1b9c49c328a68a4fff6c8882117
Simple SQL Injection Whitepaper
Posted Sep 11, 2009
Authored by jiko

Whitepaper called Simple SQL Injection. Written in Arabic.

tags | paper, sql injection
SHA-256 | 0a6069a2d97eb2998fc1070fe0a769864563542217c8929a1722d24a6a805e9c
Whitepaper Discussing Glob() And Curl()
Posted Sep 11, 2009
Authored by Thibow | Site informatique-inside.com

Whitepaper discussing vulnerabilities surrounding Glob() and Curl(). Written in French.

tags | paper, vulnerability
SHA-256 | 5baae62c129bdf7bd18d5a681202174e2821fb14c3c8215e932757f95ec13011
Kolibri+ Web Server 2 Disclosure
Posted Sep 11, 2009
Authored by Dr_IDE

Kolibri+ Web Server 2 suffers from an arbitrary source code disclosure vulnerability.

tags | exploit, web, arbitrary, info disclosure
SHA-256 | b9fb89e9b9efd9c89769ca3ddd8d6a93d0896da3824ea547fc56ec995c1a6bc9
Siemens Gigaset SE361 Wlan Reboot Exploit
Posted Sep 11, 2009
Authored by crashbrz

Siemens Gigaset SE361 Wlan suffers from a remote reboot vulnerability when flooded on port 1723.

tags | exploit, remote, denial of service
SHA-256 | 2a2bd6983b072a972e8446bdbb5fe466edcdc7ef12d0b1d0c07eff67abf0187c
MMS Notification Obfuscation
Posted Sep 11, 2009
Authored by c0rnholio

Multiple smartphones suffer from a MMS notification sender obfuscation vulnerability.

tags | exploit
SHA-256 | 9b72cd06b397840847cce9cb396cdf66d2cc9ed0580d3fa3d798c5dddd61ea23
WAP Push SI Impersonation
Posted Sep 11, 2009
Authored by c0rnholio

Multiple smartphones suffer from a SMS sender obfuscation vulnerability via the WAP Push SI.

tags | exploit
SHA-256 | 00ff10611118c037c4a9456b0da3ee52fb6bd213c6e22e7cc8822855e013f71c
Linux sock_sendpage() NULL Pointer Dereference
Posted Sep 11, 2009
Authored by Ramon de C Valle | Site risesecurity.org

Linux 2.4 and 2.6 kernel sock_sendpage() NULL pointer dereference exploit. The third and final version of this exploit. This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission.

tags | exploit, kernel, ppc
systems | linux
SHA-256 | 4c81627c007c2bba523f9c37b9474159727cda368af2e7454b6bc420e0606a47
Mandriva Linux Security Advisory 2009-230
Posted Sep 11, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-230 - Security vulnerabilities has been identified and fixed in pidgin.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-2694, CVE-2009-3025, CVE-2009-3026, CVE-2009-2703, CVE-2009-3083, CVE-2009-3084, CVE-2009-3085
SHA-256 | 21e4fec4f4426731e84e353e4f3e1e763c7511c9995ae7f25519ceb23e1e4370
Dradis Information Sharing Tool 2.4.0
Posted Sep 11, 2009
Authored by etd | Site dradis.nomejortu.com

dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.

Changes: In the server component, you can drag\'n\'drop your notes. New Rake tasks were added to backup the project, reset the environment, etc. The upload plugin gives better feedback in case of an exception. Nmap Upload now uses the Nmap::Parser library. A plugin was added to import data from the OSVDB. Bugs were fixed in the client component.
tags | web
SHA-256 | 66b866e356a910a6068f3db98437de71ecd2498a176f2a70a9dfb180147619e4
Image Voting 1.0 SQL Injection
Posted Sep 11, 2009
Authored by SkuLL-HacKeR

Image Voting version 1.0 suffers from a remote SQL injection vulnerability in index.php.

tags | exploit, remote, php, sql injection
SHA-256 | d8eeca73f07c211c58ca0bff26d7537f724d4e79572c381de248c48f00f7ec71
Mandriva Linux Security Advisory 2009-229
Posted Sep 11, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-229 - Buffer overflow in the SIEVE script component (sieve/script.c) in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14 allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error. This update provides a solution to this vulnerability.

tags | advisory, overflow, arbitrary, local, imap
systems | linux, mandriva
advisories | CVE-2009-2632
SHA-256 | 9bb448e15cdf259d1279023492e6cdb5ec84a7f35b44d9d2335c5ee680112c5a
Debian Linux Security Advisory 1878-2
Posted Sep 11, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1878-2 - Raphael Geissert discovered that uscan, a program to check for availability of new source code versions which is part of the devscripts package, runs Perl code downloaded from potentially untrusted sources to implement its URL and version mangling functionality. This update corrects regressions introduced by the devscripts security update, DSA-1878-1.

tags | advisory, perl
systems | linux, debian
advisories | CVE-2009-2946
SHA-256 | 3b1b40fb5fbd7b62d4ca8cadc1b1d71d6cbbcffcc47448316d4bc800398bd578
Ubuntu Security Notice 829-1
Posted Sep 11, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-829-1 - It was discovered that Qt did not properly handle certificates with NULL characters in the Subject Alternative Name field of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2009-2700
SHA-256 | 76761fdd911615a3fddf094eefe7ccb681d7586a72b4cf9f7b14dca74b09ee79
Zero Day Initiative Advisory 09-065
Posted Sep 11, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-065 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists during the redrawing of tree columns contained within a XUL document. Due to the reuse of a previously freed object, attacker controlled memory can be executed. Successful exploitation of this vulnerability can lead to remote compromise of the affected system under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary
advisories | CVE-2009-3077
SHA-256 | dc0eeda124168b2e7cde5ea71494d45fb98d4c87f9cf5fbcf4be3dff16cae405
Kolibri+ Webserver 2 Remote SEH Overwrite
Posted Sep 11, 2009
Authored by Blake

Kolibri+ Webserver 2 remote SEH overwrite exploit that makes use of a GET request.

tags | exploit, remote
SHA-256 | bd85f6c54f94bd9d250b9177a43c0b4734ade699bb08465bbc280de22b9acf1e
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close