what you don't know can hurt you
Showing 1 - 25 of 28 RSS Feed

Files Date: 2011-07-06

Ubuntu Security Notice USN-1164-1
Posted Jul 6, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1164-1 - Thomas Pollet discovered that the RDS network protocol did not check certain iovec buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. Dan Rosenberg discovered that the CAN protocol on 64bit systems did not correctly calculate the size of certain buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. Various other issues were also addressed.

tags | advisory, arbitrary, local, root, protocol
systems | linux, ubuntu
advisories | CVE-2010-4081, CVE-2010-3865, CVE-2010-3874, CVE-2010-3875, CVE-2010-3876, CVE-2010-3877, CVE-2010-3880, CVE-2010-4080, CVE-2010-4081, CVE-2010-4082, CVE-2010-4083, CVE-2010-4157, CVE-2010-4164, CVE-2010-4248, CVE-2010-4258, CVE-2010-4342, CVE-2010-4346, CVE-2010-4527, CVE-2010-4529, CVE-2010-4565, CVE-2010-4655, CVE-2010-4656, CVE-2011-0463, CVE-2011-0521, CVE-2011-0695, CVE-2011-0711, CVE-2011-0712, CVE-2011-1017
MD5 | e70bdd0acf312c2b66cea08dc84f7849
SyRiAn Sh3ll 7
Posted Jul 6, 2011
Authored by SyRiAn_SnIpEr, SyRiAn_34G13, Darkness Caesar

SyRiAn Sh3ll is a PHP backdoor that allows for database access, local exploitation of the host, and more.

tags | tool, local, php, rootkit
systems | linux, unix
MD5 | 14eb6477ac78b0442bf82f160abebc83
LFI Scanner 4.0
Posted Jul 6, 2011
Authored by Bl4ck.Viper

This is a simple perl script called Viper LFI Scanner that enumerates local file inclusion attempts when given a specific target.

Changes: New bypass method added and ability to read /etc/passwd.
tags | tool, local, scanner, perl, file inclusion
systems | unix
MD5 | da840c2308be4ed934ac1c510dd45afe
All Windows Null-Free CreateProcessA Calc Shellcode
Posted Jul 6, 2011
Authored by AutoSec Tools | Site autosectools.com

112 bytes small all Windows null-free CreateProcessA calc.exe shellcode.

tags | shellcode
systems | windows
MD5 | ba9a69346aa022a746db247c8f3836f5
Tech2.in.com Cross Site Scripting
Posted Jul 6, 2011
Authored by r007k17-w

Tech2.in.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | c44ef7e3640702dad59ab59b4feab643
Joomla 1.6.3 Cross Site Request Forgery
Posted Jul 6, 2011
Authored by Luis Santana

Joomla 1.6.3 cross site scripting to cross site request forgery exploit.

tags | exploit, xss, csrf
MD5 | b69ad7bb04580f36e839559a6e822b07
bbzl PHP 0.92 Remote File Inclusion
Posted Jul 6, 2011
Authored by Number 7

bbzl PHP version 0.92 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, php, code execution, file inclusion
MD5 | aa2c4f9dd5e82dba36ac868c74e59c7e
Secunia Security Advisory 45182
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for feh. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
MD5 | cc43a9929bb526a6ce7aa6bbad292e36
Secunia Security Advisory 45147
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox and MozillaThunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, suse
MD5 | 6945fdcbf3e230dc506c258b0cede391
Secunia Security Advisory 45143
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 9daf31139d453bbec46e14cda1e1f2ea
Secunia Security Advisory 45128
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the phpMyAdmin extension for TYPO3, which can be exploited by malicious users to disclose sensitive information and by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | ad0a87f715de5702187fce55ea5d3de1
Secunia Security Advisory 45089
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
MD5 | f29fa95d27d9fda2b741ff96e1b6e37c
Secunia Security Advisory 45112
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for SUSE Manager. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
MD5 | 7e769e469496be1db277662c8071dba7
Secunia Security Advisory 45132
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP-UX, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.

tags | advisory, denial of service, local
systems | hpux
MD5 | 9b2aa585e9c74ed38ea550bfd97cffe9
Secunia Security Advisory 45092
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for qemu-kvm. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, debian
MD5 | 1412aec3f5eca53d864e64e96bb58b26
Secunia Security Advisory 45145
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Kerberos Applications, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 95f3d7d384bfe0f8f288e10baf219777
Secunia Security Advisory 45157
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for krb5-appl. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, redhat
MD5 | 082f828ee5402377c473222279ddf16f
Secunia Security Advisory 45187
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Qemu, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, local
MD5 | 2174fec9873c81a241a5556fce44894c
Secunia Security Advisory 45188
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in KVM qemu-kvm, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, local
MD5 | 6f9d1fbe1ba1b6affcabe2b7829b2386
Secunia Security Advisory 45158
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for qemu-kvm. This fixes two vulnerabilities, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, redhat
MD5 | c25ee75b950ea54e3d271862d6a07f54
Secunia Security Advisory 45137
Posted Jul 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in aTube Catcher, which can be exploited by malicious people to manipulate certain data.

tags | advisory
MD5 | 58d743daee114a17d5a00748fb22fc08
DmxReady Secure Document Library 1.2 SQL Injection
Posted Jul 6, 2011
Authored by Bellatrix

DmxReady Secure Document Library version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8dcd247032b116fe76851d87eb73a8cf
Golden FTP 4.70 Overflow
Posted Jul 6, 2011
Authored by Joff Thyer

Golden FTP version 4.70 buffer overflow exploit that leverages PASS.

tags | exploit, overflow
MD5 | 77cb58ae9ed6211564dc09896059333f
ISC BIND 9 RPZ Configuration Remote Crash
Posted Jul 6, 2011
Site isc.org

Two defects were discovered in ISC's BIND 9 code. These defects only affect BIND 9 servers which have recursion enabled and which use a specific feature of the software known as Response Policy Zones (RPZ) and where the RPZ zone contains a specific rule/action pattern. Versions affected include 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1.

tags | advisory, denial of service
advisories | CVE-2011-2465
MD5 | 32207cd269f81001ea5e18f1a263a01a
RFC 6274 - Security Assessment Of The Internet Protocol Version 4
Posted Jul 6, 2011
Authored by Fernando Gont | Site ietf.org

The IETF has just published RFC 6274, entitled "Security Assessment of the Internet Protocol Version 4". It contains a large amount of information on how to improve the security of IPv4 implementations and IPv4 deployments.

tags | paper, protocol
MD5 | 6919485928a0a8157f6b4318bc5ed031
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close