seeing is believing
Showing 1 - 12 of 12 RSS Feed

Files Date: 2013-04-22

Red Hat Security Advisory 2013-0746-01
Posted Apr 22, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0746-01 - An updated rhev-hypervisor6 package that fixes several security issues and various bugs is now available. A flaw was found in the way KVM handled guest time updates when the buffer the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine state register crossed a page boundary. A privileged guest user could use this flaw to crash the host or, potentially, escalate their privileges, allowing them to execute arbitrary code at the host kernel level.

tags | advisory, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2013-1591, CVE-2013-1796, CVE-2013-1797, CVE-2013-1798
MD5 | bcb64333f0113760311cb42355f626f6
Red Hat Security Advisory 2013-0763-01
Posted Apr 22, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0763-01 - The JBoss Web Framework Kit combines popular open source web frameworks into a single solution for Java applications. This release of JBoss Web Framework Kit 2.2.0 serves as a replacement for JBoss Web Framework Kit 2.1.0. It includes various bug fixes and enhancements which are detailed in the JBoss Web Framework Kit 2.2.0 Release Notes.

tags | advisory, java, web
systems | linux, redhat
advisories | CVE-2009-2625, CVE-2012-5783
MD5 | df4205a95bae4fb88aa6f8480a42fea2
Mandriva Linux Security Advisory 2013-150
Posted Apr 22, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-150 - Multiple unspecified vulnerabilities have been found and corrected in mysql. The updated packages provides the latest supported mysql version from the 5.1.x branch (5.1.69).

tags | advisory, vulnerability
systems | linux, mandriva
MD5 | 3c2d92e29d1dbf936dcb4e8871eff5a3
Mandriva Linux Security Advisory 2013-148
Posted Apr 22, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-148 - Cross-site scripting vulnerability in Roundcube Webmail 0.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the signature in an email. A local file inclusion flaw was found in the way RoundCube Webmail, a browser-based multilingual IMAP client, performed validation of the 'generic_message_footer' value provided via web user interface in certain circumstances. A remote attacker could issue a specially-crafted request that, when processed by RoundCube Webmail could allow an attacker to obtain arbitrary file on the system, accessible with the privileges of the user running RoundCube Webmail client. The updated packages have been patched and upgraded to the 0.7.4 version which is not affected by these issues.

tags | advisory, remote, web, arbitrary, local, imap, xss, file inclusion
systems | linux, mandriva
advisories | CVE-2013-1904, CVE-2012-4668
MD5 | 387c1203ce4fdddbfa5536e61f101846
Tinc Virtual Private Network Daemon 1.0.21
Posted Apr 22, 2013
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: This release lets tinc drop packets that are forwarded via TCP if they are too big.
tags | tool, encryption
systems | unix
advisories | CVE-2013-1428
MD5 | d7bc9ca38672c9da08d74ff2a3e8e36d
pyClamd 0.3.3
Posted Apr 22, 2013
Authored by Alexandre Norman | Site xael.org

pyClamd is a python interface to Clamd (Clamav daemon). By using pyClamd, you can add virus detection capabilities to your python software in an efficient and easy way. Instead of pyClamav which uses libclamav, pyClamd may be used by a closed source product.

Changes: This release fixes bugs with multiple scans at once and with non-Latin filenames. It also adds a compatibility layer with part of the 0.2 API.
tags | virus, python
systems | unix
MD5 | 8bdc4c493bd7fe39b01adf16d92e9694
Red Hat Security Advisory 2013-0762-01
Posted Apr 22, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0762-01 - In accordance with the Red Hat Enterprise MRG Life Cycle policy, the Red Hat Enterprise MRG products, which include the MRG-Messaging, MRG-Realtime, and MRG-Grid, Version 1 and Version 2 offerings for Red Hat Enterprise Linux 5, will be retired on March 31, 2014, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including critical impact security patches or urgent priority bug fixes, for MRG-Messaging, MRG-Realtime, and MRG-Grid on Red Hat Enterprise Linux 5 after that date. In addition, after March 31, 2014, technical support through Red Hat's Global Support Services will no longer be provided for these products on Red Hat Enterprise Linux 5.

tags | advisory
systems | linux, redhat
MD5 | a5e5106d83a0a1e37183307d1ccffe1b
Windows PHP Reverse Shell
Posted Apr 22, 2013
Authored by blkhtc0rp

php_rshell is a ruby script which converts a binary backdoor to hex and creates a windows php reverse backdoor that will be executed on the server.

tags | php, ruby
systems | windows
MD5 | 8b3b1b6be1b5224897a8f0d269d44d81
Janissaries Joomla Civicrm Shell Upload
Posted Apr 22, 2013
Authored by miyachung

Janissaries Joomla Civicrm component exploitation tool that uploads a shell.

tags | exploit, shell
MD5 | b8236f495a037eb3efd5b064859f840e
FreeSWITCH vBilling SQL Injection
Posted Apr 22, 2013
Authored by Michal Blaszczak

vBilling for FreeSWITCH suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 4ac7a3c9534b7086c9b17e22ca3ee99d
Tiny Windows Reverse Shell
Posted Apr 22, 2013
Authored by blkhtc0rp

This archive includes the source and a binary for a small Windows reverse shell.

tags | shell
systems | windows
MD5 | 41ee2f54e096324f36fef76e0e314112
Java 1.7.0_21-b11 Code Execution
Posted Apr 22, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Java versions 1.7.0_21-b11 and below suffers from an arbitrary code execution vulnerability.

tags | advisory, java, arbitrary, code execution
MD5 | e4cd9e5c7f8d9e28f0422e22ea755816
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close