exploit the possibilities
Showing 1 - 25 of 47 RSS Feed

Files Date: 2011-07-27

Ubuntu Security Notice USN-1177-1
Posted Jul 27, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1177-1 - Andrew Griffiths discovered that QEMU did not correctly drop privileges when using the 'runas' argument. Under certain circumstances a local attacker could exploit this to escalate privileges.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2011-2527
MD5 | ebf8b58a68b5a0cf325b533650f8b3b4
Zero Day Initiative Advisory 11-241
Posted Jul 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-241 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Webkit Library. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the NamedNodeMap::setAttributes method defined within the NamedNodeMap.cpp file distributed with WebKit. The code responsible for copying attributes between DOM nodes does not verify that a mutation may have occurred when an attribute's attributeChanged method is called. By crafting a page that deletes instances of that attribute when the above mentioned method is called the code within setAttributes can be made to operate on freed objects. An attacker can take advantage of this by spraying the heap in a way that will not result in null pointers being referenced. This can lead to arbitrary code execution under the context of the user running the browser.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-0254
MD5 | 3e4e6a4b94b203251d3df570bed47fb3
Zero Day Initiative Advisory 11-240
Posted Jul 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-240 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library's support of SVG markers. When updating a marker, the application will duplicate the reference of an object without updating its reference count. When freeing this object, a use-after-free vulnerability can be made to occur. This can be leveraged by a remote attacker to execute code under the context of the user running the application.

tags | advisory, remote, arbitrary
systems | apple
advisories | CVE-2011-1453
MD5 | 3d01009b0937287f4463d7e4bef21a56
Stunnel SSL Wrapper 4.42b2
Posted Jul 27, 2011
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: This release fixes a Windows service crash of stunnel 4.40.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
MD5 | db793abd65e04ef2b5c104b30e546e8f
SSLSniff 0.8
Posted Jul 27, 2011
Authored by moxie | Site thoughtcrime.org

This tool was originally written to demonstrate and exploit IE's vulnerability to a specific "basicConstraints" man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes. It is designed to MITM all SSL connections on a LAN and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that you provide.

Changes: Added an iOS fingerprinting mode. Added support for intermediary certificates in authority mode.
tags | encryption
systems | unix
MD5 | 030fe31af33c22a932393c7a5f33bb2e
Zero Day Initiative Advisory 11-239
Posted Jul 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-239 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library's implementation of a FrameOwner element. When building this tree, the application will create a duplicate reference of an element. By freeing the referenced element, a use-after-free condition can be made to occur which can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-0233
MD5 | aed4f56b4eb6816960cd28f530b233bf
Red Hat Security Advisory 2011-1100-01
Posted Jul 27, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1100-01 - The IcedTea-Web project provides a Java web browser plug-in and an implementation of Java Web Start, which is based on the Netx project. It also contains a configuration tool for managing deployment settings for the plug-in and Web Start implementations. A flaw was discovered in the JNLP implementation in IcedTea-Web. An unsigned Java Web Start application could use this flaw to manipulate the content of a Security Warning dialog box, to trick a user into granting the application unintended access permissions to local files.

tags | advisory, java, web, local
systems | linux, redhat
advisories | CVE-2011-2513, CVE-2011-2514
MD5 | 7413665e2d73df3e184e5b74e5f80c33
Mandriva Linux Security Advisory 2011-121
Posted Jul 27, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-121 - All current released versions of Samba are vulnerable to a cross-site request forgery in the Samba Web Administration Tool (SWAT). By tricking a user who is authenticated with SWAT into clicking a manipulated URL on a different web page, it is possible to manipulate SWAT. All current released versions of Samba are vulnerable to a cross-site scripting issue in the Samba Web Administration Tool (SWAT). On the Change Password field, it is possible to insert arbitrary content into the user field.

tags | advisory, web, arbitrary, xss, csrf
systems | linux, mandriva
advisories | CVE-2011-2522, CVE-2011-2694
MD5 | ae6dd4dc8f05874e334e55138e63d8ad
Samba Web Administration Tool Cross Site Request Forgery
Posted Jul 27, 2011
Authored by Narendra Shinde

SWAT (Samba Web Administration Tool) in Samba versions 3.0.x through 3.5.9 suffers from a cross site request forgery vulnerability.

tags | exploit, web, csrf
advisories | CVE-2011-2522
MD5 | 216a5e5c11d92819fd472e5318f10d13
Mandriva Linux Security Advisory 2011-120
Posted Jul 27, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-120 - Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, allows remote attackers to execute arbitrary code or cause a denial of service via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2011-0226
MD5 | df2e5e805cd1e6dcf88e00ad14e2a867
Red Hat Security Advisory 2011-1090-01
Posted Jul 27, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1090-01 - The rhev-hypervisor package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. A flaw was found that allowed napi_reuse_skb() to be called on VLAN packets. An attacker on the local network could trigger this flaw by sending specially-crafted packets to a target system, possibly causing a denial of service.

tags | advisory, denial of service, local
systems | linux, redhat
advisories | CVE-2011-1576
MD5 | c401e241e9663e73e113093535b5ac91
MinaliC Webserver 2.0 Source Disclosure
Posted Jul 27, 2011
Authored by X-h4ck

MinaliC Webserver version 2.0 suffers from a remote source disclosure vulnerability. This is the same issue that was previously discovered in version 1.0.

tags | exploit, remote, info disclosure
MD5 | 3e09e1fd686d3c841e4258105eb7e501
Sagem 3304 Router PPPOE Password Retrieval
Posted Jul 27, 2011
Authored by Security Tracker

Sagem 3304 router PPPOE password retrieval shell script exploit that leverages quickconfname_ADSL.html being unprotected.

tags | exploit, shell
MD5 | 34969ffffac165555f8557cfa6343acf
Chome Web Solutions SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

Chrome Web Solutions suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, web, vulnerability, sql injection
MD5 | 3720dfce2f5880ea1011adc7e6cf13c3
Solutiontech SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

Solutiontech suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a10e336fec54ca8e22048508162a26dd
Coherendz SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

Coherendz suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 627a87ecdc67d6712aa27725aca8fe48
iCube Lab SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

iCube Lab suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ff1f6536345f52fdbabf6ae6540e35a4
G2webCMS SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

G2webCMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | decc8b3370073c322a92b52ba0c15de3
Football CMS SQL Injection
Posted Jul 27, 2011
Authored by Amir-Magic

Football CMS suffers from a remote SQL injection vulnerability in view_table_lig.php.

tags | exploit, remote, php, sql injection
MD5 | 8b7e1fd504a6c580f14a3fde142e80f3
Imperva's Web Application Attack Report July 2011
Posted Jul 27, 2011
Authored by Imperva | Site imperva.com

As a part of its ongoing Hacker Intelligence Initiative, Imperva's Application Defense Center (ADC) observed and categorized attacks across 30 applications as well as onion router (TOR) traffic, monitoring more than 10 million individual attacks targeted at web applications over a period of six months. This report discusses and analyzes their findings.

tags | paper, web
MD5 | ce98f375f1789b2b3f1b274fd8d33a0f
Secunia Security Advisory 45423
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for oprofile. This fixes a weakness, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
MD5 | 5e9296d163763e48af2563de003ccf62
Secunia Security Advisory 45366
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in GLPI, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
MD5 | ad7efe6e6c43d4adf220b9ec3a581c2f
Secunia Security Advisory 45391
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - OpenVZ has issued an update for the kernel. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and to potentially gain escalated privileges and by malicious, local users in a guest virtual machine and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
MD5 | 8d33e6390287b5fe494dd0d1ef809627
Secunia Security Advisory 45384
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libsndfile. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
systems | linux, ubuntu
MD5 | 76958a3f76bb9fdc3be78ed4630a125f
Secunia Security Advisory 45421
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, ubuntu
MD5 | f54947baebb7ccfcf40540b39fd26546
Page 1 of 2
Back12Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    1 Files
  • 18
    Apr 18th
    1 Files
  • 19
    Apr 19th
    19 Files
  • 20
    Apr 20th
    18 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close