Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2013-03-06

Squid 3.x Denial Of Service
Posted Mar 6, 2013
Authored by AKAT-1, 22733db72ab3ed94b5f8a1ffcde850251fe6f466, c8e74ebd8392fda4788179f9a02bb49337638e7b

Squid versions 3.2.5 and 3.2.7 suffer from denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
MD5 | 1cb62f6a323218eef0ad3b12d7a271bd
WDivulge Hidden File Web Scanner
Posted Mar 6, 2013
Authored by Blake | Site soldierx.com

wdivulge is a tool designed to find and download hidden files from a webserver. This is most commonly pictures, but you can adjust the file definitions to bruteforce any type of file that you'd like. wdivulge technically falls under the definition of a web fusker.

tags | tool, web, scanner
systems | unix
MD5 | e307aa5eac1b61766935bb69e47defae
Varnish 2.1.5 / 3.0.3 Denial Of Service
Posted Mar 6, 2013
Authored by AKAT-1, 22733db72ab3ed94b5f8a1ffcde850251fe6f466, c8e74ebd8392fda4788179f9a02bb49337638e7b

Varnish versions 2.1.5 and 3.0.3 suffer from multiple denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
MD5 | dc77b2c2ffaa2b65ba18ea9a55344dff
Local File Inclusion Whitepaper
Posted Mar 6, 2013
Authored by TheMirkin

This is a brief whitepaper about local file inclusion. Written in Turkish.

tags | paper, local, file inclusion
MD5 | 087a1f6b7c97cfc86e40cf707787edda
Local File Disclosure Whitepaper
Posted Mar 6, 2013
Authored by TheMirkin

This is a brief whitepaper about local file disclosure. Written in Turkish.

tags | paper, local
MD5 | e528528c518c17495b835a00b805de1d
Samsung TV Denial Of Service
Posted Mar 6, 2013
Authored by AKAT-1, 22733db72ab3ed94b5f8a1ffcde850251fe6f466, c8e74ebd8392fda4788179f9a02bb49337638e7b

Samsung TVs suffer from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 17925dd5e2791b7c80a55dc6f6dbfca2
SIP Witch 0.7.4 Denial Of Service
Posted Mar 6, 2013
Authored by AKAT-1, 22733db72ab3ed94b5f8a1ffcde850251fe6f466, c8e74ebd8392fda4788179f9a02bb49337638e7b

SIP Witch version 0.7.5 with libosip2-4.0.0 suffers from a NULL pointer dereference denial of service vulnerability.

tags | exploit, denial of service
MD5 | f723bd2abf5c58896d9bd637419d4b41
Subversion 1.6.17 Denial Of Service
Posted Mar 6, 2013
Authored by AKAT-1, 22733db72ab3ed94b5f8a1ffcde850251fe6f466, c8e74ebd8392fda4788179f9a02bb49337638e7b

Apache Subversion version 1.6.17 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 05909192c0e12b15ec9375e2f0c61de7
Mandriva Linux Security Advisory 2013-017
Posted Mar 6, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-017 - A denial of service flaw was found in the way libxml2 performed string substitutions when entity values for entity references replacement was enabled. A remote attacker could provide a specially-crafted XML file that, when processed by an application linked against libxml2, would lead to excessive CPU consumption. The updated packages have been upgraded to the 2.7.6 version and patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2013-0338
MD5 | 6ab797aa7c8311a05ef7593e74ee9290
Red Hat Security Advisory 2013-0596-01
Posted Mar 6, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0596-01 - The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. The openstack-keystone packages have been upgraded to upstream version 2012.2.3, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following security issues: It was found that Keystone failed to properly validate disabled user accounts, or user accounts associated with disabled tenants or domains, when Amazon Elastic Compute Cloud style credentials were in use. Such users could use this flaw to access resources they should no longer have access to.

tags | advisory, python
systems | linux, redhat
advisories | CVE-2013-0282, CVE-2013-1664, CVE-2013-1665
MD5 | 3a3ef6ca92bb67d86abefe8097565289
Red Hat Security Advisory 2013-0594-01
Posted Mar 6, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0594-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Buffer overflow flaws were found in the udf_load_logicalvol() function in the Universal Disk Format file system implementation in the Linux kernel. An attacker with physical access to a system could use these flaws to cause a denial of service or escalate their privileges.

tags | advisory, denial of service, overflow, kernel
systems | linux, redhat
advisories | CVE-2012-3400
MD5 | a7ec6504d6a06520257e5a6153da3772
Red Hat Security Advisory 2013-0595-01
Posted Mar 6, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0595-01 - PackStack is a command line utility that uses Puppet modules to support rapid deployment of OpenStack on existing servers over an SSH connection. PackStack is suitable for deploying both single node proof of concept installations and more complex multi-node installations. A flaw was found in PackStack. During manifest creation, the manifest file was written to /tmp/ with a predictable file name. A local attacker could use this flaw to perform a symbolic link attack, overwriting an arbitrary file accessible to the user running PackStack with the contents of the manifest, which could lead to a denial of service. Additionally, the attacker could read and potentially modify the manifest being generated, allowing them to modify systems being deployed using OpenStack.

tags | advisory, denial of service, arbitrary, local, proof of concept
systems | linux, redhat
advisories | CVE-2013-0261, CVE-2013-0266
MD5 | 5ca6871466c9f740299d8d74863c6737
Ubuntu Security Notice USN-1755-1
Posted Mar 6, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1755-1 - It was discovered that OpenJDK did not properly validate certain types of images. A remote attacker could exploit this to cause OpenJDK to crash. It was discovered that OpenJDK did not properly check return values when performing color conversion for images. If a user were tricked into opening a crafted image with OpenJDK, such as with the Java plugin, a remote attacker could cause OpenJDK to crash or execute arbitrary code outside of the Java sandbox with the privileges of the user invoking the program. Various other issues were also addressed.

tags | advisory, java, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-0809, CVE-2013-1493, CVE-2013-0809, CVE-2013-1493
MD5 | 35385fc326eb663986491c843482491f
Debian Security Advisory 2639-1
Posted Mar 6, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2639-1 - Several vulnerabilities have been discovered in PHP, the web scripting language.

tags | advisory, web, php, vulnerability
systems | linux, debian
advisories | CVE-2013-1635, CVE-2013-1643
MD5 | 864f35344d20a3efbad92d698edc94a1
Security BSides Las Vegas 2013 Call For Presenters
Posted Mar 6, 2013
Authored by BSides Las Vegas

BSides Las Vegas 2013 has announced its Call For Presenters. It will take place July 31st through August 1st, 2013 in Las Vegas, Nevada.

tags | paper, conference
MD5 | 96a74874743b00a0c947e4c848337641
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close