what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2012-12-31

GnuPG 1.4.12 Database Corruption
Posted Dec 31, 2012
Authored by KB Sriram

GnuPG versions 1.4.12 and below are vulnerable to memory access violations and public keyring database corruption when importing public keys that have been manipulated.

tags | advisory
advisories | CVE-2012-6085
SHA-256 | 0a3dbb2e061bd0a63a4632c1ff476033b308773427245372f500f2fae7b5b060
Debian Security Advisory 2596-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2596-1 - Thorsten Glaser discovered that the RSSReader extension for mediawiki, a website engine for collaborative work, does not properly escape tags in feeds. This could allow a malicious feed to inject JavaScript into the mediawiki pages.

tags | advisory, javascript
systems | linux, debian
SHA-256 | 79eaf44e7b6a8917207a8d8381616b357b2d89121c8130a3ba8f445f8ae2b581
Grep Integer Overflow
Posted Dec 31, 2012
Authored by Joshua Rogers

Grep versions prior to 2.11 suffer from an integer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2012-5667
SHA-256 | 67807e221404026810de6462ba04065c63a7aa98acbbef641e79defa6bf2a804
Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free
Posted Dec 31, 2012
Authored by Eric Romang, sinn3r, juan vazquez, mahmud ab rahman | Site metasploit.com

This Metasploit module exploits a vulnerability found in Microsoft Internet Explorer. A use-after-free condition occurs when a CButton object is freed, but a reference is kept and used again during a page reload, an invalid memory that's controllable is used, and allows arbitrary code execution under the context of the user. Please note: This vulnerability has been exploited in the wild targeting mainly China/Taiwan/and US-based computers.

tags | exploit, arbitrary, code execution
advisories | CVE-2012-4792
SHA-256 | e321b503a83791aeb063c8940adcdb875c9201669df143b59807fe08c4b13986
IBM Lotus QuickR qp2 ActiveX Buffer Overflow
Posted Dec 31, 2012
Authored by Gaurav Baruah, juan vazquez | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.

tags | exploit, overflow, activex
systems | windows
advisories | CVE-2012-2176, OSVDB-82166
SHA-256 | 2570396e9a994f0f9128106991e69dcb968d0dde0fbe6d004afd9587713e5cbb
IBM Lotus iNotes dwa85W ActiveX Buffer Overflow
Posted Dec 31, 2012
Authored by Gaurav Baruah, juan vazquez | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the dwa85W.dll installed with the IBM Lotus iNotes ActiveX installer. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the dwa85W.dll 85.3.3.0 as installed with Lotus Domino 8.5.3. In order to bypass ASLR the no aslr compatible module dwabho.dll is used. This one is installed with the iNotes ActiveX.

tags | exploit, overflow, activex
systems | windows
advisories | CVE-2012-2175, OSVDB-82755
SHA-256 | a5379e9a43da683cd4806d1f1e1d548d9998b0760444a32f658bcd9210c0c210
Debian Security Advisory 2595-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2595-1 - Marc Schoenefeld discovered that an integer overflow in the ICC parsing code of Ghostscript can lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2012-4405
SHA-256 | 0a1fc6a70cb480d30676a2fa913e6565780e8080f258871de2065018975eedf6
Debian Security Advisory 2594-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2594-1 - halfdog discovered that incorrect interrupt handling in Virtualbox, a x86 virtualization solution, can lead to denial of service.

tags | advisory, denial of service, x86
systems | linux, debian
advisories | CVE-2012-3221
SHA-256 | a0a58e0eb726449c1a5fadf1b3d6d148a4a061ed33d48f5d0628594a9e4ef29c
Ubuntu Security Notice USN-1680-1
Posted Dec 31, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1680-1 - It was discovered that MoinMoin did not properly sanitize its input when processing AnyWikiDraw and TWikiDraw actions. A remote attacker with write access could exploit this to overwrite arbitrary files and execute arbitrary code with the privileges of the web server (user 'www-data'). It was discovered that MoinMoin also did not properly sanitize its input when processing the AttachFile action. A remote attacker could exploit this to overwrite files via directory traversal. Various other issues were also addressed.

tags | advisory, remote, web, arbitrary
systems | linux, ubuntu
SHA-256 | 56353e2537c223147685fa74826d1d32e50546f485b155b80dc6d1e20b5932c9
Debian Security Advisory 2593-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2593-1 - It was discovered that missing input validation in the twikidraw and anywikidraw actions can result in the execution of arbitrary code. This security issue in being actively exploited.

tags | advisory, arbitrary
systems | linux, debian
SHA-256 | a2a4e1d7adb26f638f3ab31c219c2be71caa78a1d865d9fc49e5871f7518af5b
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close