accept no compromises
Showing 1 - 25 of 32 RSS Feed

Files Date: 2011-06-10

Another File Integrity Checker 2.17
Posted Jun 10, 2011
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Arguments for the --list option should now be separated by a comma instead a space character. Search for the default config file is now the same for Unix and Linux: /etc/afick.conf and then afick.conf. The version is now shared between afick and afick-tk. Arguments for --list can also be given in several calls.
tags | tool, integrity
systems | linux, windows, unix
MD5 | 827f131c6a5c7f7e9b0dca5e1fe50c6f
Debian Security Advisory 2257-1
Posted Jun 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2257-1 - Rocco Calvi discovered that the XSPF playlist parser of vlc, a multimedia player and streamer, is prone to an integer overflow resulting in a heap-based buffer overflow. This might allow an attacker to execute arbitrary code by tricking a victim into opening a specially crafted file.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-2194
MD5 | fb064886ebefb6172566b64669ab0049
Oracle Java ICC Profile "scrn" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "scrn" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
MD5 | f5d5d914d9b92f8d92e5d0897467e9cb
Oracle Java ICC Profile "pseq" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "pseq" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
MD5 | b79ccd5abde176390b601d70750409a3
Oracle Java ICC Profile "ncl2" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "ncl2" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
MD5 | 320076eb46f338db9af51220f4a75641
Oracle Java ICC Profile "mluc" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "mluc" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
MD5 | 4437c42efc2d4b8b6fa646cd6775e9e2
Oracle Java ICC Profile "bfd" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer truncation error in the Color Management Module (CMM) when processing a malformed "bfd" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, arbitrary
MD5 | c9a9a7c807fd29200f8450d7c8513f13
Oracle Java ICC Profile "clrt" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "clrt" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
MD5 | 0fcedad3f6dcc060fa6fc16df36c99a2
Debian Security Advisory 2256-1
Posted Jun 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2256-1 - Tavis Ormandy discovered that the Tag Image File Format (TIFF) library is vulnerable to a buffer overflow triggered by a crafted OJPEG file which allows for a crash and potentially execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2009-5022
MD5 | 2c3e3bd6c0ed3069b6553de1ab17113b
Ubuntu Security Notice USN-1145-1
Posted Jun 10, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1145-1 - It was discovered that QEMU did not properly perform validation of I/O operations from the guest which could lead to heap corruption. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Nelson Elhage discovered that QEMU did not properly handle memory when removing ISA devices. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2011-1750, CVE-2011-1751
MD5 | 0c39e8e7861f16f527f8fc05ade5707b
Pacer Edition CMS 2.1 Local File Inclusion
Posted Jun 10, 2011
Authored by LiquidWorm | Site zeroscience.mk

Pacer Edition CMS version 2.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | e61bf8d70ffa20ede22f63943e958822
IT Reflect SQL Injection
Posted Jun 10, 2011
Authored by eXeSoul

IT Reflect suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e36a996fe2ce30b4bbf52c7fd149387b
FreeBSD/x86 /bin/sh Shellcode
Posted Jun 10, 2011
Authored by KedAns-Dz

36 bytes small execve('/bin/sh') FreeBSD/x86 shellcode.

tags | x86, shellcode
systems | freebsd
MD5 | add618862ffb1d81c0200bc43b928fe0
Secunia Security Advisory 44906
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged multiple vulnerabilities in Reflection for Secure IT, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | 527e53350f6579bd2d7c7122fc1df664
Secunia Security Advisory 44896
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in D-Bus, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | 779323ff2bf243149e1075b020fa55ca
Secunia Security Advisory 44905
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged two vulnerabilities in Reflection X 2011 and Reflection Suite for X 2011, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | 1d21534924c956c03bc1f697dc91cade
Secunia Security Advisory 44896
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in D-Bus, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | 779323ff2bf243149e1075b020fa55ca
Secunia Security Advisory 44905
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged two vulnerabilities in Reflection X 2011 and Reflection Suite for X 2011, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | 1d21534924c956c03bc1f697dc91cade
Secunia Security Advisory 44853
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Cosign module for Drupal, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 62701423389753ce57ae69c82702e79b
Secunia Security Advisory 44882
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for phpMyAdmin. This fixes a weakness and a vulnerability, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, fedora
MD5 | 9bff2be4b5a714d939cbeb08aabcf0b4
Secunia Security Advisory 44884
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4f905cbc1e639dd9ec72f5ecd156bfc2
Secunia Security Advisory 44748
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3Com Intelligent Management Center, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 09ff90222d429ee617de52ed883375b2
Secunia Security Advisory 44843
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Spam module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | e251c1adb66f7bec6c9cf6b67e6cda17
Secunia Security Advisory 44881
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for rdesktop. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
MD5 | 4e168c4ec819c96dd231e7c130962aec
Secunia Security Advisory 44876
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cyrus-imapd. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | linux, redhat
MD5 | 255c9cbf3ffe33aca9d6267a17123ed8
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    11 Files
  • 21
    Jul 21st
    4 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close