exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 2013-03-08

Ubuntu Security Notice USN-1758-1
Posted Mar 8, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1758-1 - It was discovered that Firefox contained a memory safety issue. If a user were tricked into opening a specially crafted page with the HTML editor, a remote attacker could exploit this to execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-0787
SHA-256 | fc396be00725ab95d22e9cf1d886ab13cc19aa4e976e77848cc98d6af080fd25
GroundWork Monitor Enterprise 6.7.0 SQL Injection / Command Execution
Posted Mar 8, 2013
Authored by Johannes Greil | Site sec-consult.com

GroundWork Monitor Enterprise version 6.7.0 suffers from remote SQL injection, file disclosure, command injection, and cross site scripting vulnerabilities. This is the second of two advisories documenting all the issues in GroundWork. Detailed proof of concepts were removed by the author because GroundWork is refusing to fix the underlying security issues.

tags | advisory, remote, vulnerability, xss, sql injection, proof of concept
SHA-256 | dee12f394845970be25c5bec4cdb8f4b96ef27fcdb45f2b56195fa023bcfd2a5
GroundWork Monitor Enterprise 6.7.0 XSS / Disclosure / Command Execution
Posted Mar 8, 2013
Authored by Johannes Greil | Site sec-consult.com

GroundWork Monitor Enterprise version 6.7.0 suffers from insufficient authentication, file disclosure, file modification, cross site scripting, XML external entity injection, command injection, and various other vulnerabilities. Detailed proof of concepts were removed by the author because GroundWork is refusing to fix the underlying security issues.

tags | advisory, vulnerability, xss, proof of concept, xxe
SHA-256 | 96c7a6d3d01751ea9ff17e2fa08b0d6e1ef1b0d0d735f08fb7964d7f9ea4c83e
Mandriva Linux Security Advisory 2013-021
Posted Mar 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-021 - Multiple security issues were identified and fixed in OpenJDK. The 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via vectors that trigger a write of arbitrary memory in the JVM, as exploited in the wild in February 2013. Unspecified vulnerability in the 2D component in the Java Runtime Environment component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493. The updated packages provides icedtea6-1.11.9 which is not vulnerable to these issues.

tags | advisory, java, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2013-0809, CVE-2013-1493
SHA-256 | 5b454321a55eb475ee4170f49c5dd25c68794fe01d96b8252b64fbb67b52fb24
McAfee Vulnerability Manager 7.5 Cross Site Scripting
Posted Mar 8, 2013
Authored by Asheesh Kumar Mani Tripathi

McAfee Vulnerability Manager version 7.5 suffers from a cross site scripting vulnerability due to improperly sanitizing user-supplied Cookie values.

tags | exploit, xss
SHA-256 | 566957c0cfaab8f9b783af3bdf8496ff6eb513ff719e2c486f97028c19b84632
Mandriva Linux Security Advisory 2013-020
Posted Mar 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-020 - Multiple vulnerabilities was found and corrected in Wireshark. Fixes focused on infinite loops and crashes in various dissectors. This advisory provides the latest version of Wireshark which is not vulnerable to these issues.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2012-5239, CVE-2013-1572, CVE-2013-1573, CVE-2013-1574, CVE-2013-1575, CVE-2013-1576, CVE-2013-1577, CVE-2013-1578, CVE-2013-1579, CVE-2013-1580, CVE-2013-1581, CVE-2013-1582, CVE-2013-1583, CVE-2013-1584, CVE-2013-1585, CVE-2013-1586, CVE-2013-1588, CVE-2013-1589, CVE-2013-1590, CVE-2013-2478, CVE-2013-2480, CVE-2013-2481, CVE-2013-2482, CVE-2013-2483, CVE-2013-2484, CVE-2013-2485, CVE-2013-2488
SHA-256 | b7b8f054f36ad8b61ab799052c446d8acca39e071ad2fabfc93334ad794194a5
Red Hat Security Advisory 2013-0614-01
Posted Mar 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0614-01 - XULRunner provides the XUL Runtime environment for applications using the Gecko layout engine. A flaw was found in the way XULRunner handled malformed web content. A web page containing malicious content could cause an application linked against XULRunner to crash or execute arbitrary code with the privileges of the user running the application.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2013-0787
SHA-256 | 38973fe391c8b58afe213772184b5dc17c5bce2b4f8ae96ce3d50714da12e38a
SCADA 3S CoDeSys Gateway Server Directory Traversal
Posted Mar 8, 2013
Authored by Enrique Sanchez | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability that allows arbitrary file creation, which can be used to execute a mof file in order to gain remote execution within the SCADA system.

tags | exploit, remote, arbitrary
advisories | CVE-2012-4705
SHA-256 | cb4ca7e2b6ed001985ac60257eb7224986eb62545c9d0e35bf5632761adc890b
Firebird Relational Database CNCT Group Number Buffer Overflow
Posted Mar 8, 2013
Authored by Spencer McIntyre | Site metasploit.com

This Metasploit module exploits a vulnerability in Firebird SQL Server. A specially crafted packet can be sent which will overwrite a pointer allowing the attacker to control where data is read from. Shortly, following the controlled read, the pointer is called resulting in code execution. The vulnerability exists with a group number extracted from the CNCT information, which is sent by the client, and whose size is not properly checked. This Metasploit module uses an existing call to memcpy, just prior to the vulnerable code, which allows a small amount of data to be written to the stack. A two-phases stackpivot allows to execute the ROP chain which ultimately is used to execute VirtualAlloc and bypass DEP.

tags | exploit, code execution
advisories | CVE-2013-2492
SHA-256 | 7de29ccbc4fc0af57c3834340b87fbe2ce27419e8888190bc1a4620767590552
Suricata IDPE 1.3.6
Posted Mar 8, 2013
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Several stability and accuracy issues were fixed.
tags | tool, intrusion detection
systems | unix
SHA-256 | 6f3ccd7369f578df4ea22d0f7448568f9ac35af0c3b64afebcda5861951bbb6e
HP Security Bulletin HPSBGN02854 SSRT100881
Posted Mar 8, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN02854 SSRT100881 - Potential security vulnerabilities have been identified with HP Intelligent Management Center (iMC Standard and Enterprise Editions), HP Intelligent Management Center for Automated Network Manager (ANM), iMC TACACS+ Authentication Manager (TAM), and iMC User Access Manager (UAM). The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS), remote code execution, and remote disclosure of information. Revision 1 of this advisory.

tags | advisory, remote, vulnerability, code execution, xss
advisories | CVE-2012-5200, CVE-2012-5201, CVE-2012-5202, CVE-2012-5203, CVE-2012-5204, CVE-2012-5205, CVE-2012-5206, CVE-2012-5207, CVE-2012-5208, CVE-2012-5209, CVE-2012-5210, CVE-2012-5211, CVE-2012-5212, CVE-2012-5213
SHA-256 | 0ac63d7c8bd7939657d0c6cb9ab8758d89e0159d5c09f9d5fe9646bc7969beb1
Mandriva Linux Security Advisory 2013-019
Posted Mar 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-019 - A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols handled session renegotiation. A man-in-the-middle attacker could use this flaw to prefix arbitrary plain text to a client's session (for example, an HTTPS connection to a website. This could force the server to process an attacker's request as if authenticated using the victim's credentials. This update addresses this flaw by implementing the TLS Renegotiation Indication Extension, as defined in RFC 5746. The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, arbitrary, protocol
systems | linux, mandriva
advisories | CVE-2009-3555, CVE-2013-1619
SHA-256 | 0aa58a05023ecaae15a6d536a958775447e0d5df7c99b2a7e6c3cf316869b997
HP Security Bulletin HPSBPI02851 SSRT101078
Posted Mar 8, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI02851 SSRT101078 - A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2012-5215
SHA-256 | 384d168c76042dadca1eb0fd82ad80e7b86ae67cca964e1cdf87ba039e20f8bc
Question2Answer Cross Site Request Forgery
Posted Mar 8, 2013
Authored by MustLive

This is a demonstration cross site request forgery exploit for Question2Answer that also takes advantage of an insufficient anti-automation issue.

tags | exploit, csrf
SHA-256 | e8a626660486f464fd58c9ab8052bbb89a6150a1f60768dade0cfcad6e8669e4
ALLMediaServer 0.94 SEH Overflow
Posted Mar 8, 2013
Authored by metacom

ALLMediaServer version 0.94 SEH overflow exploit that spawns calc.exe.

tags | exploit, overflow
SHA-256 | 581d11bf437584999c610e53bfc9f899cf4e9ab8f2b4079740da0b9dff03d908
Google Fusion Tables Cross Site Scripting
Posted Mar 8, 2013
Authored by Junaid Hussain

Google Fusion Tables suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c519dac8f756067d0fa8add23bde2f82d6721b4e72018779151d20aa116ec072
Slackware Security Advisory - sudo Updates
Posted Mar 8, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New sudo packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues. Related CVE Numbers: CVE-2013-1775,CVE-2013-1776.

tags | advisory
systems | linux, slackware
advisories | CVE-2013-1775, CVE-2013-1776
SHA-256 | 0756d6ac674176840736b20e3a780b4c015680c196a06f38bf65f1c511e7f822
HP Security Bulletin HPSBMU02849 SSRT101124
Posted Mar 8, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02849 SSRT101124 - A potential security vulnerability has been identified with HP ServiceCenter. The vulnerability could be remotely exploited to allow a remote Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, remote, denial of service
advisories | CVE-2012-5214
SHA-256 | 941d692cbf8b313cef9e596c9ba62ef5bdfa2eeab1be233d72bdcd9355c885a9
Ubuntu Security Notice USN-1755-2
Posted Mar 8, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1755-2 - USN-1755-1 fixed vulnerabilities in OpenJDK 6. This update provides the corresponding updates for OpenJDK 7. It was discovered that OpenJDK did not properly validate certain types of images. A remote attacker could exploit this to cause OpenJDK to crash. Various other issues were also addressed.

tags | advisory, remote, vulnerability
systems | linux, ubuntu
advisories | CVE-2013-0809, CVE-2013-1493, CVE-2013-0809, CVE-2013-1493
SHA-256 | f6df39f955594ea9216c4b8dd6ae813b8290b144bf93b3ea8c98f431ac8ef370
Red Hat Security Advisory 2013-0613-01
Posted Mar 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0613-01 - JBoss Enterprise Portal Platform is the open source implementation of the Java EE suite of services and Portal services running atop JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Enterprise Middleware components that have been tested and certified together to provide an integrated experience. It was found that the GateIn Portal export/import gadget allowed an export ZIP to be uploaded and imported to a site without authentication. A remote attacker could use this flaw to modify the contents of a site, remove the site, or modify access controls applied to portlets in the site.

tags | advisory, java, remote
systems | linux, redhat
advisories | CVE-2013-0314, CVE-2013-0315
SHA-256 | ea45d5058310a1479dff0e4483ee59cab6438a0aebb64173c6ff232e7ed8ddb0
Red Hat Security Advisory 2013-0612-01
Posted Mar 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0612-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. It was discovered that Ruby's REXML library did not properly restrict XML entity expansion. An attacker could use this flaw to cause a denial of service by tricking a Ruby application using REXML to read text nodes from specially-crafted XML content, which will result in REXML consuming large amounts of system memory. It was found that the RHSA-2011:0910 update did not correctly fix the CVE-2011-1005 issue, a flaw in the method for translating an exception message into a string in the Exception class. A remote attacker could use this flaw to bypass safe level 4 restrictions, allowing untrusted code to modify arbitrary, trusted strings, which safe level 4 restrictions would otherwise prevent.

tags | advisory, remote, denial of service, arbitrary, ruby
systems | linux, redhat
advisories | CVE-2012-4481, CVE-2013-1821
SHA-256 | 32e3a547a3c0a24367f1996785cb9cda8c3f06349a10fc8e3db711bfb8a5421d
Red Hat Security Advisory 2013-0611-01
Posted Mar 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0611-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. It was discovered that Ruby's REXML library did not properly restrict XML entity expansion. An attacker could use this flaw to cause a denial of service by tricking a Ruby application using REXML to read text nodes from specially-crafted XML content, which will result in REXML consuming large amounts of system memory. All users of Ruby are advised to upgrade to these updated packages, which contain backported patches to resolve this issue.

tags | advisory, denial of service, ruby
systems | linux, redhat
advisories | CVE-2013-1821
SHA-256 | c3980a088e566cc19050f1da5ff225025caeb15e2f077158cb8730b7a09d6a12
Red Hat Security Advisory 2013-0610-01
Posted Mar 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0610-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the user-space component for running virtual machines using KVM. A flaw was found in the way QEMU-KVM emulated the e1000 network interface card when the host was configured to accept jumbo network frames, and a guest using the e1000 emulated driver was not. A remote attacker could use this flaw to crash the guest or, potentially, execute arbitrary code with root privileges in the guest. All users of qemu-kvm-rhev are advised to upgrade to these updated packages, which correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

tags | advisory, remote, arbitrary, root
systems | linux, redhat
advisories | CVE-2012-6075
SHA-256 | f9283d87e85e0d4f8a1880b89b72c5d932cd753099d7ea82160e3a865ca280ba
Red Hat Security Advisory 2013-0609-01
Posted Mar 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0609-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. A flaw was found in the way QEMU-KVM emulated the e1000 network interface card when the host was configured to accept jumbo network frames, and a guest using the e1000 emulated driver was not. A remote attacker could use this flaw to crash the guest or, potentially, execute arbitrary code with root privileges in the guest. All users of qemu-kvm should upgrade to these updated packages, which contain backported patches to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

tags | advisory, remote, arbitrary, root
systems | linux, redhat
advisories | CVE-2012-6075
SHA-256 | 1b51b67d705de66bc4ced0edf093badfa1d4adcea70ebbf5ce1ddf20b5d9d3d1
Red Hat Security Advisory 2013-0608-01
Posted Mar 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0608-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel. A flaw was found in the way QEMU-KVM emulated the e1000 network interface card when the host was configured to accept jumbo network frames, and a guest using the e1000 emulated driver was not. A remote attacker could use this flaw to crash the guest or, potentially, execute arbitrary code with root privileges in the guest. All users of kvm are advised to upgrade to these updated packages, which contain backported patches to correct this issue. Note that the procedure in the Solution section must be performed before this update will take effect.

tags | advisory, remote, arbitrary, kernel, root
systems | linux, redhat
advisories | CVE-2012-6075
SHA-256 | f2e010070aad2343f47b3e482e950b8c4228c64cb7b9aaf1697885a65a553a9c
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close