ignore security and it'll go away
Showing 1 - 25 of 31 RSS Feed

Files Date: 2011-07-01

Debian Security Advisory 2270-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2270-1 - It was discovered that incorrect sanitising of virtio queue commands in KVM, a solution for full virtualization on x86 hardware, could lead to denial of service of the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, x86
systems | linux, debian
advisories | CVE-2011-2512
MD5 | 549d9954811d8668a26e5d80206b96f5
Debian Security Advisory 2269-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2269-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-0083, CVE-2011-0085, CVE-2011-2362, CVE-2011-2363, CVE-2011-2365, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2376
MD5 | feeeafec478e923ac8fbc7500c000c2b
Debian Security Advisory 2266-2
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2266-2 - The update for CVE-2010-2531 for the old stabledistribution (lenny) introduced a regression, which lead to additional output being written to stdout.

tags | advisory
systems | linux, debian
advisories | CVE-2010-2531, CVE-2011-0420, CVE-2011-0421, CVE-2011-0708, CVE-2011-1153, CVE-2011-1466, CVE-2011-1471, CVE-2011-2202
MD5 | 2b9ab744fd68682fb29e029a44b94f01
Debian Security Advisory 2268-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2268-1 - Several vulnerabilities have been found in Iceweasel, a web browser based on Firefox.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2011-0083, CVE-2011-0085, CVE-2011-2362, CVE-2011-2363, CVE-2011-2365, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2376
MD5 | 6277a36a43fc5908cddbbc271fa10f2c
WiRouter KeyRec 1.0.8
Posted Jul 1, 2011
Authored by Salvatore Fresta | Site salvatorefresta.net

WiRouter KeyRec is a powerful and platform independent piece of software that recovers the default WPA passphrases of the supported router's models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley).

Changes: This release adds a function for calculating the Magic Numbers and the function for printing of the WEP key of AGPF router models.
tags | tool, wireless
MD5 | 1c83a41add80c95812b5b6b9665fb3f8
Debian Security Advisory 2267-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2267-1 - It was discovered that Perl's Safe module - a module to compile and execute code in restricted compartments - could by bypassed.

tags | advisory, perl
systems | linux, debian
advisories | CVE-2010-1447
MD5 | 9c9fc4c6ed6cb0558f62024af96e8180
Zero Day Initiative Advisory 11-232
Posted Jul 1, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-232 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the iNOdeMngChecker.exe component which listens by default on TCP port 9090. When handling the 0x0A0BF007 packet type the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2011-1867
MD5 | 516a551703cef3718b775943f6afd335
OpenSSH 3.4p1 FreeBSD Remote Root Exploit
Posted Jul 1, 2011
Authored by Kingcope

OpenSSH version 3.4p1 remote root exploit for FreeBSD.

tags | exploit, remote, root
systems | freebsd
MD5 | 6e0c631b6a5eea296f3b34bb65b32351
Pentesting In Local Networks Part 1
Posted Jul 1, 2011
Authored by ph0x90bic

Whitepaper called Pentesting in Local Networks Part 1. It discusses performing recon, ARP poisoning, traffic analysis techniques, and more.

tags | paper, local
MD5 | 38898281f2a6ee37346d3adef4d80b39
Nmap Port Scanner 5.59BETA1
Posted Jul 1, 2011
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Added 40 scripts, brute forcing of BackOrifice remote administration, host discovery via the DNS Service Discovery protocol, and various other updates and additions.
tags | tool, remote, udp, tcp, protocol, nmap
systems | linux, unix
MD5 | 6851e6d0f79f33c80c2b5c2cc192413c
Packet Storm New Exploits For June, 2011
Posted Jul 1, 2011
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 206 exploits added to Packet Storm in June, 2011.

tags | exploit
systems | linux
MD5 | 7b948ed92a8467abcfba1bd2069c53ca
NetBSD 5.1 libc/net Stack Buffer Overflow
Posted Jul 1, 2011
Authored by Maksymilian Arciemowicz

NetBSD version 5.1 libc/net suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
systems | netbsd
advisories | CVE-2011-1656
MD5 | 3ed028887b35b95f3e578b504cc48a86
Winamp 5.61 Heap / Integer Overflows
Posted Jul 1, 2011
Authored by Luigi Auriemma | Site aluigi.org

Winamp versions 5.61 and below suffer from multiple heap overflows and corruption and an integer overflow. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | f0934f93cee3ce90bfe420cc671e7607
Shanghai Freemen SQL Injection
Posted Jul 1, 2011
Authored by Bl4ck.Viper

Shanghai Freemen suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 739074553f177d778455a1d983a5189c
Joomla mdigg SQL Injection
Posted Jul 1, 2011
Authored by Caddy-Dz

The Joomla Mdigg component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e60786b2ed73ecec2b5e3b80f6c29215
DomainShopScript Cross Site Scripting
Posted Jul 1, 2011
Authored by r007k17-w

DomainShopScript suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0c6e8d49379b4db76eb6b213651a7f06
Ollance Cross Site Scripting / SQL Injection
Posted Jul 1, 2011
Authored by r007k17-w

The Ollance login script suffers from cross site scripting and remote SQL injection vulnerabilities. The SQL injection vulnerability allows for authentication bypass.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | c8183b24c7c53299f8d9bc3b7bc31728
Ashampoo 3D CAD Professional 3.0.1 Insecure Method
Posted Jul 1, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Ashampoo 3D CAD Professional version 3.0.1 suffers from an insecure method vulnerability.

tags | exploit
MD5 | e71cd9f4f4b2bf8bc6c86e744975026c
WordPress 3.1.3 / 3.2-RC1 SQL Injection
Posted Jul 1, 2011
Authored by K. Gudinavicius | Site sec-consult.com

WordPress versions 3.1.3 and 3.2-RC1 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 918503c3d3cf156633039dc9afd97367
Apple Developer Cross Site Scripting / Redirect
Posted Jul 1, 2011
Authored by Aung Khant | Site yehg.net

The Apple Developer site suffered from open redirect, cross site scripting, and http response splitting vulnerabilities.

tags | exploit, web, vulnerability, xss
systems | apple
MD5 | 88976c1597d45143940f792735b40bfa
Secunia Security Advisory 45119
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Rational DOORS Web Access, where two have an unknown impact and one can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, vulnerability, xss
MD5 | c8483725d147fb6d5d787362e4ce5be3
Secunia Security Advisory 45129
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Intelligent Management Center products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 58f0082a297f034cf9119b1a0a129799
Secunia Security Advisory 45053
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Justin Klein Keane has discovered two vulnerabilities in AeroMail, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
MD5 | fab39aff0333f0d5e1644eb10e519b86
Secunia Security Advisory 44988
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in libvirt, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | ea4bc3fdb9955d516b66e8ca35592fdf
Secunia Security Advisory 45120
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | 6396de4fc2c4ac51ca0dc2b96f3e8f7b
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close