what you don't know can hurt you
Showing 1 - 25 of 47 RSS Feed

Files Date: 2010-10-19

GNU Privacy Guard 1.4.11
Posted Oct 19, 2010
Site gnupg.org

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.

Changes: Bugs were fixed. Portability changes were made. Minor changes were made for better compatibility with GnuPG-2 (the modular implementation).
tags | encryption
MD5 | 8fb66227dcd10d87585d7241db158302
Linux RDS Protocol Local Privilege Escalation
Posted Oct 19, 2010
Authored by Dan Rosenberg | Site vsecurity.com

On October 13th, VSR identified a vulnerability in the RDS protocol, as implemented in the Linux kernel. Because kernel functions responsible for copying data between kernel and user space failed to verify that a user-provided address actually resided in the user segment, a local attacker could issue specially crafted socket function calls to write arbitrary values into kernel memory. By leveraging this capability, it is possible for unprivileged users to escalate privileges to root.

tags | advisory, arbitrary, kernel, local, root, protocol
systems | linux
advisories | CVE-2010-3904
MD5 | 0e9e2bb825f575a3913d96c0801df0b5
Debian Linux Security Advisory 2121-1
Posted Oct 19, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2121-1 - Several remote vulnerabilities have been discovered in TYPO3.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2010-3714, CVE-2010-3715, CVE-2010-3716, CVE-2010-3717
MD5 | aa86c5b5e1f82e4cbb96c476332a7f18
Mass Player 2.1 Denial Of Service
Posted Oct 19, 2010
Authored by Sweet

Mass Player version 2.1 denial of service exploit that creates a malicious MP3.

tags | exploit, denial of service
MD5 | 76881a6008b5a07e9ef3089628b7b944
Linux Kernel 2.6.36-rc8 RDS Privilege Escalation
Posted Oct 19, 2010
Authored by Dan Rosenberg | Site vsecurity.com

Linux kernel versions 2.6.36-rc8 and below RDS privilege escalation exploit.

tags | exploit, kernel
systems | linux
advisories | CVE-2010-3904
MD5 | 54ff3c68fb1a6ff5120c84c765210789
Joomla Pinboard Remote File Inclusion
Posted Oct 19, 2010
Authored by jos_ali_joe

The Joomla Pinboard component suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | fc2dfbac98b950b24ed75e99f2ff5c4d
Ubuntu Security Notice 1006-1
Posted Oct 19, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1006-1 - A large number of security issues were discovered in the WebKit browser and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Please consult the bug listed at the top of this advisory to get the exact list of CVE numbers fixed for each release.

tags | advisory, remote, web, denial of service, arbitrary, javascript, code execution, xss
systems | linux, ubuntu
MD5 | 882e05c1089afe76c3d4e0879bcc7f01
Ubuntu Security Notice 1005-1
Posted Oct 19, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1005-1 - It was discovered that poppler contained multiple security issues when parsing malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-3702, CVE-2010-3703, CVE-2010-3704
MD5 | 31a0e8eb5c2be7709488077e6eb272ff
Alpha 2 Player Denial Of Service
Posted Oct 19, 2010
Authored by anT!-Tr0J4n

Alpha 2 Player suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 714346ddfdc72e0bd8733f4bfa85997b
Hanso Converter Buffer Overflow
Posted Oct 19, 2010
Authored by anT!-Tr0J4n

Hanso Converter proof of concept buffer overflow exploit.

tags | exploit, overflow, proof of concept
MD5 | ca214d8f33d9958cb3c459741e95fe94
Comet Bird 3.6.10 Denial Of Service
Posted Oct 19, 2010
Authored by anT!-Tr0J4n

Comet Bird version 3.6.10 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | d54072308b1897cbf8b6624d87f1939f
phpCheckZ 1.1.0 Blind SQL Injection
Posted Oct 19, 2010
Authored by Salvatore Fresta

phpCheckZ version 1.1.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6229c97b1f2bbbc88ba4fba9f525ffbb
Joomla Flash Fun Local File Inclusion
Posted Oct 19, 2010
Authored by jos_ali_joe

The Joomla Flash Fun component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | a1c28076c6f67d2c4f0ab61a8f56566f
Joomla Eventcal Remote File Inclusion
Posted Oct 19, 2010
Authored by jos_ali_joe

The Joomla Eventcal component suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 2601ffbf7c944eb28c2785b07804dfa6
phpBB 2 Remote File Inclusion
Posted Oct 19, 2010
Authored by jos_ali_joe

Fully modded phpBB 2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | ac5b96d0b1d63b2a11fda27028414a80
Oracle JRE Same-of-Origin (SOP) Policy Bypass
Posted Oct 19, 2010
Authored by Roberto Suggi Liverani | Site security-assessment.com

The Oracle JRE - java.net.URLConnection class - suffers from a same-of-origin (SOP) policy bypass vulnerability. Malicious java applet proof of concept code included.

tags | exploit, java, proof of concept, bypass
advisories | CVE-2010-3573
MD5 | 9d2815e05de87254ba5b655090d696aa
Acer OrbiCam 9.4.4.1084 DLL Hijacking
Posted Oct 19, 2010
Authored by Inj3cti0n P4ck3t

Acer OrbiCam version 9.4.4.1084 DLL hijacking exploit for mfc71ptb.dll and mfc71loc.dll.

tags | exploit
MD5 | dc1baecd94946e0c226177bd1a1a2f64
Zero Day Initiative Advisory 10-217
Posted Oct 19, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-217 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Informix Database Server. SQL query execution privileges are required to exploit this vulnerability. The specific flaw exists when processing the arguments to the DBINFO keyword in a SQL query. User-supplied data is copied into a stack-based buffer without proper bounds checking resulting in an exploitable overflow. Exploitation can result in arbitrary code execution under the context of the database server.

tags | advisory, remote, overflow, arbitrary, code execution
MD5 | 1386cb3d1d53f970e76f59166700dfea
Zero Day Initiative Advisory 10-216
Posted Oct 19, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-216 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Informix Dynamic Server. Authentication is required in that an attacker must have valid credentials to connect to the database. The specific flaw exists within the oninit.exe process bound by default to TCP port 9088 or 1526. A lack of sanity checking within a logging function can result in a stack based buffer overflow leading to arbitrary code execution under the context of the SYSTEM user.

tags | advisory, overflow, arbitrary, tcp, code execution
MD5 | 433d8c5d391d4dcbeef34586a69bc3e1
Zero Day Initiative Advisory 10-215
Posted Oct 19, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-215 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Informix Dynamic Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RPC protocol parsing library, librpc.dll, utilized by the ISM Portmapper service (portmap.exe) bound by default to TCP port 36890. A lack of sanity checking on supplied parameter sizes can result in an integer overflow and subsequent heap buffer under allocation which can finally lead to an exploitable memory corruption.

tags | advisory, overflow, arbitrary, tcp, protocol
MD5 | 39bb6e4a855ca404aaa20555878734f0
Secunia Security Advisory 41907
Posted Oct 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Phoenix Project Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 55f1368a61d84039a4c5a385c2bfbcbb
Secunia Security Advisory 41886
Posted Oct 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for java-1.6.0-openjdk. This fixed multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to disclose potentially sensitive information, manipulate certain data, and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, fedora
MD5 | 6e2307b8018dddcf8ffa791b80bfb259
Secunia Security Advisory 41864
Posted Oct 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | 8a7c80d6f92af2e306e78652bec6df7a
Secunia Security Advisory 41910
Posted Oct 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Cool iPhone Ringtone Maker, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | apple, iphone
MD5 | 0dcaaf911327102bcd8027089698d90a
Secunia Security Advisory 41879
Posted Oct 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Free 3GP Video Converter, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 4e42b10edeaa63dc25b0c26bdb1bdd40
Page 1 of 2
Back12Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close