what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2013-02-19

Hiding Data In Hard-Drive's Service Areas
Posted Feb 19, 2013
Authored by Ariel Berkman | Site recover.co.il

In this paper the author demonstrates how spinning hard-drives' service areas can be used to hide data from the operating-system (or any software using the standard OS's API or the standard ATA commands to access the hard-drive). These reserved areas are used by hard-drive vendors to store modules that in turn operate the drive, and in a sense, together with the ROM, serve as the hard-drive’s internal storage and OS. By sending Vendor Specific Commands (VSCs) directly to the hard-drive, one can manipulate these areas to read and write data that are otherwise inaccessible. This should not be confused with DCO or HPA which can be easily detected, removed and accessed via standard ATA commands.

tags | paper
SHA-256 | 56c7d0d4187efd4b11c8476ff27ccc113b0205c32f936a78c17c88cafa947b3d
FreeBSD Security Advisory - BIND Denial Of Service
Posted Feb 19, 2013
Site security.freebsd.org

FreeBSD Security Advisory - BIND 9 is an implementation of the Domain Name System (DNS) protocols. The named(8) daemon is an Internet Domain Name Server. DNS64 is an IPv6 transition mechanism that will return a synthesized AAAA response even if there is only an A record available. Due to a software defect a crafted query can cause named(8) to crash with an assertion failure.

tags | advisory, protocol
systems | freebsd
advisories | CVE-2012-5688
SHA-256 | 7a8b0adfcf6016b307c0e17b5c45fdec29ac76e9591aba0e5450056bd38ad916
FreeBSD Security Advisory - glob(3) Resource Exhaustion
Posted Feb 19, 2013
Site security.freebsd.org

FreeBSD Security Advisory - The glob(3) function is a pathname generator that implements the rules for file name pattern matching used by the shell. GLOB_LIMIT is supposed to limit the number of paths to prevent against memory or CPU attacks. The implementation however is insufficient. An attacker that is able to exploit this vulnerability could cause excessive memory or CPU usage, resulting in a denial of service.

tags | advisory, denial of service, shell
systems | freebsd
advisories | CVE-2010-2632
SHA-256 | f2e502ca64a6aa303c90908a48c574ac08e6abef1995c2a730359cea8c7e9fec
OWASP Bricks Betwa Release
Posted Feb 19, 2013
Site owasp.org

Bricks is a web application security learning platform built on PHP and MySQL. The project focuses on variations of commonly seen application security issues. Each 'Brick' has some sort of security issue which can be leveraged manually or using automated software tools. The mission is to 'Break the Bricks' and thus learn the various aspects of web application security. Bricks is a completely free and open source project brought to you by OWASP.

tags | tool, web, php
systems | unix
SHA-256 | f3e19532950821b7e4e8be8f975a13a51aa346f3186c6e45ca89fc5b7386dc28
Kodak Insite Creative Workflow System SQL Injection
Posted Feb 19, 2013
Authored by Robert at Hipcrime

Kodak's Insite Creative Workflow System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dfd8885731a743f54a2b98717b42b9119da28cb80197e4c3bcd619044a40a31f
Red Hat Security Advisory 2013-0270-01
Posted Feb 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0270-01 - The Jakarta Commons HttpClient component can be used to build HTTP-aware client applications. The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject's Common Name or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name. All users of jakarta-commons-httpclient are advised to upgrade to these updated packages, which correct this issue. Applications using the Jakarta Commons HttpClient component must be restarted for this update to take effect.

tags | advisory, web, spoof
systems | linux, redhat
advisories | CVE-2012-5783
SHA-256 | af53df44563319536fdb4f79b98fb9e261956bbde7062a8807de4b5a1079804c
Red Hat Security Advisory 2013-0271-01
Posted Feb 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0271-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. It was found that, after canceling a proxy server's authentication prompt, the address bar continued to show the requested site's address. An attacker could use this flaw to conduct phishing attacks by tricking a user into believing they are viewing a trusted site.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2013-0775, CVE-2013-0776, CVE-2013-0780, CVE-2013-0782, CVE-2013-0783
SHA-256 | 7ba6d8ae97e003c7ecb415a182499f52ce0de1d8723d72ffae4b6ec98bd321a9
APT1 - Exposing One Of China's Cyber Espionage Units
Posted Feb 19, 2013
Site mandiant.com

Since 2004, Mandiant has investigated computer security breaches at hundreds of organizations around the world. The majority of these security breaches are attributed to advanced threat actors referred to as the "Advanced Persistent Threat" (APT). They first published details about the APT in their January 2010 M-Trends report. As they stated in the report, their position was that "The Chinese government may authorize this activity, but there's no way to determine the extent of its involvement." Now, three years later, they have the evidence required to change their assessment. The details they have analyzed during hundreds of investigations have convinced them that the groups conducting these activities are based primarily in China and that the Chinese Government is aware of them.

tags | paper
SHA-256 | 1b3f3823efbf29735c351791998505a39d8807b0c3599ce1e8c1d5b0fab9843c
Red Hat Security Advisory 2013-0269-01
Posted Feb 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0269-01 - Apache Axis is an implementation of SOAP. It can be used to build both web service clients and servers. Apache Axis did not verify that the server hostname matched the domain name in the subject's Common Name or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name. All users of axis are advised to upgrade to these updated packages, which correct this issue. Applications using Apache Axis must be restarted for this update to take effect.

tags | advisory, web, spoof
systems | linux, redhat
advisories | CVE-2012-5784
SHA-256 | d9cdac0fcd5149ca0ace42fe10b6132c75222c4606964c787f153fd6985357f9
Red Hat Security Advisory 2013-0268-01
Posted Feb 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0268-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. Warning: Before applying the update, back up your existing JBoss Enterprise Web Server installation .

tags | advisory, remote, web, csrf
systems | linux, redhat
advisories | CVE-2012-4431
SHA-256 | 94eee7960c392c24e87d8653bcee0f0ecd29a942c28785158881dbcf707cc305
Red Hat Security Advisory 2013-0267-01
Posted Feb 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0267-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. Warning: Before applying the update, back up your existing JBoss Enterprise Web Server installation .

tags | advisory, remote, web, csrf
systems | linux, redhat
advisories | CVE-2012-4431
SHA-256 | ada87f1cd23add09ede83792a895ace408134083633cc2e27cd811e66fc79145
Red Hat Security Advisory 2013-0266-01
Posted Feb 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0266-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. A flaw was found in the way Tomcat handled sendfile operations when using the HTTP NIO connector and HTTPS. A remote attacker could use this flaw to cause a denial of service. The HTTP NIO connector is used by default in JBoss Enterprise Web Server. The Apache Portable Runtime connector from the Tomcat Native library was not affected by this flaw.

tags | advisory, remote, web, denial of service, csrf
systems | linux, redhat
advisories | CVE-2012-2733, CVE-2012-4431, CVE-2012-4534, CVE-2012-5885, CVE-2012-5886, CVE-2012-5887
SHA-256 | 838e0b0453161e876d6ad39703ceea8e53d3dc5c7776541bd1681cd631c9061c
APT1 Digital Appendix And Indicators
Posted Feb 19, 2013
Site mandiant.com

This archives lets you access more than 3,000 APT1 indicators including domain names, IP addresses, X.509 encryption certificates and MD5 hashes of malware in APT1's arsenal of digital weapons.

tags | paper
SHA-256 | 315f3c19f14b4adc1e2c28ef69eef91c1a63e02e0e24f73d5d28f72e58ea29af
Red Hat Security Advisory 2013-0265-01
Posted Feb 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0265-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. A flaw was found in the way Tomcat handled sendfile operations when using the HTTP NIO connector and HTTPS. A remote attacker could use this flaw to cause a denial of service. The HTTP NIO connector is used by default in JBoss Enterprise Web Server. The Apache Portable Runtime connector from the Tomcat Native library was not affected by this flaw.

tags | advisory, remote, web, denial of service, csrf
systems | linux, redhat
advisories | CVE-2012-2733, CVE-2012-4431, CVE-2012-4534, CVE-2012-5885, CVE-2012-5886, CVE-2012-5887
SHA-256 | 6511b80f8afd37774dceb238e867e6df16dccae6e5a11cbab1bec49a8584d7f2
Foswiki MAKETEXT 1.1.7 / 1.0.10 Code Execution
Posted Feb 19, 2013
Authored by George Clark, Paul Harvey, Crawford Currie, John Lightsey

This advisory alerts you of a potential security issue with your Foswiki installation. A vulnerability has been reported against the core Perl module CPAN:Locale::Maketext, which Foswiki uses to provide translations when {UserInterfaceInternationalization} is enabled in the configuration. Because of this vulnerability it may be possible for a user to invoke arbitrary perl modules on the server through a crafted macro.

tags | advisory, arbitrary, perl
advisories | CVE-2012-6329, CVE-2013-1666
SHA-256 | 023db9151bd2be81fe7fb2120f8132f7dc0869271e0ab523331a0d259b93ee55
MyFi Wireless Disk 1.2 CSRF / LFI / Code Execution
Posted Feb 19, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

MyFi Wireless Disk version 1.2 suffers from cross site request forgery, local file inclusion, and remote command injection vulnerabilities.

tags | exploit, remote, local, vulnerability, file inclusion, csrf
SHA-256 | 6ed86f1279f3c02e7df43034482ff6bf89be0c4ffd9b21dc08e458c3678096fe
CKEditor 4.0.1 CSRF / XSS / Path Disclosure
Posted Feb 19, 2013
Authored by Akastep

CKEditor version 4.0.1 suffers from cross site request forgery, cross site scripting, and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion, info disclosure, csrf
SHA-256 | 2c20ce891948eae0f4f51822b52a5828b5323feb467a4e2335e8e988ab6aa4ce
RTTucson Quotations Database Script XSS / SQL Injection
Posted Feb 19, 2013
Authored by 3spi0n

RTTucson Quotations Database Script suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | e5827e24c69396c14e4480fd2c50f3fe2ce11d0b285b3482dd4d59c0272dcc18
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close