what you don't know can hurt you
Showing 1 - 24 of 24 RSS Feed

Files Date: 2013-09-10

Synology DSM 4.3-3776 XSS / File Disclosure / Command Injection
Posted Sep 10, 2013
Authored by Andrea Fabrizi

Synology DSM versions 4.3-3776 and below suffer from remote file download, content disclosure, cross site scripting, and command injection vulnerabilities.

tags | exploit, remote, vulnerability, xss
MD5 | 6c00be8290adce9b359270546e099bd6
Red Hat Security Advisory 2013-1210-01
Posted Sep 10, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1210-01 - Updated rhevm packages that fix one security issue and various bugs are now available.

tags | advisory
systems | linux, redhat
advisories | CVE-2013-4181
MD5 | 48de6b4841ed203ea77bded101d4ad65
eTransfer Lite 1.0 Cross Site Scripting
Posted Sep 10, 2013
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

eTransfer Lite version 1.0 suffers from a script insertion vulnerability that allows for cross site scripting.

tags | exploit, xss
MD5 | e3eb1f39e6123f1c8557dc13c4892408
Talkie Bluetooth Video iFiles 2.0 XSS / DoS / LFI / File Upload
Posted Sep 10, 2013
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Talkie Bluetooth Video iFiles version 2.0 suffers from arbitrary file upload, denial of service, local file inclusion, and cross site scripting vulnerabilities.

tags | exploit, denial of service, arbitrary, local, vulnerability, xss, file inclusion, file upload
MD5 | 79a6ec9085aa963844081442e11bb4c9
Microsoft Security Bulletin Release for September, 2013
Posted Sep 10, 2013
Site microsoft.com

This bulletin summary lists 13 released Microsoft security bulletins for September, 2013.

tags | advisory
MD5 | cad08dcae48c01c474ca2b1b0e8c03ec
HP Security Bulletin HPSBPV02918
Posted Sep 10, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBPV02918 - Potential security vulnerabilities have been identified with HP ProCurve Manager (PCM), HP PCM+ and HP Identity Driven Manager (IDM). These vulnerabilities could be exploited remotely to allow SQL injection, remote code execution and session reuse. Revision 1 of this advisory.

tags | advisory, remote, vulnerability, code execution, sql injection
advisories | CVE-2005-2572, CVE-2013-4809, CVE-2013-4810, CVE-2013-4811, CVE-2013-4812, CVE-2013-4813
MD5 | 99f02f2c8afa60f003cbe57d23383f59
Another File Integrity Checker 3.4
Posted Sep 10, 2013
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Three new classes were added: Afick::Aliases, Afick::Macros, and Afick::Directives. A new macro was added: archive_retention. On Windows, installation of the Tk module is now forced. afickonfig now works on all config types. An inconsistency between command line parameters and config directives was fixed.
tags | tool, integrity
systems | linux, windows, unix
MD5 | cb19e7d6f6d11ca66ed1882e2a9f6ac8
eM Client 5.0.18025.0 Cross Site Scripting
Posted Sep 10, 2013
Authored by loneferret

eM Client e-mail client version 5.0.18025.0 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | 2de1171d49248dfed29a3e6e307ba37b
Open-Xchange AppSuite 7.2.2 Improper Authentication / Information Disclosure
Posted Sep 10, 2013
Authored by Martin Braun

Open-Xchange AppSuite versions 7.0.0 through 7.2.2 suffer from configuration issues, improper authentication, and information exposure vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2013-5200
MD5 | e3bcf683e9c6eb7bb719d274c9c17713
FreeBSD Security Advisory - nullfs(5) links
Posted Sep 10, 2013
Authored by Konstantin Belousov | Site security.freebsd.org

FreeBSD Security Advisory - The nullfs(5) filesystem allows all or a part of an already mounted filesystem to be made available in a different part of the global filesystem namespace. It is commonly used to make a set of files available to multiple chroot(2) or jail(2) environments without replicating the files in each environment. A common idiom, described in the FreeBSD Handbook, is to mount one subtree of a filesystem read-only within a jail's filesystem namespace, and mount a different subtree of the same filesystem read-write. The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not check whether the source and target of the link are both in the same nullfs instance. It is therefore possible to create a hardlink from a location in one nullfs instance to a file in another, as long as the underlying (source) filesystem is the same. If multiple nullfs views into the same filesystem are mounted in different locations, a user with read access to one of these views and write access to another will be able to create a hard link from the latter to a file in the former, even though they are, from the user's perspective, different filesystems. The user may thereby gain write access to files which are nominally on a read-only filesystem.

tags | advisory
systems | freebsd
advisories | CVE-2013-5710
MD5 | fe3496a802ef303a50977b9200e73a80
FreeBSD Security Advisory - ioctl(2) Insufficient Credential Checks
Posted Sep 10, 2013
Authored by Loganaden Velvindron, Gleb Smirnoff | Site security.freebsd.org

FreeBSD Security Advisory - The ioctl(2) system call allows an application to perform device- or protocol-specific operations through a file or socket descriptor associated with a specific device or protocol. As is commonly the case, the IPv6 and ATM network layer ioctl request handlers are written in such a way that an unrecognized request is passed on unmodified to the link layer, which will either handle it or return an error code. Network interface drivers, however, assume that the SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been handled at the network layer, and therefore do not perform input validation or verify the caller's credentials. Typical link-layer actions for these requests may include marking the interface as "up" and resetting the underlying hardware. An unprivileged user with the ability to run arbitrary code can cause any network interface in the system to perform the link layer actions associated with a SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR or SIOCSIFNETMASK ioctl request; or trigger a kernel panic by passing a specially crafted address structure which causes a network interface driver to dereference an invalid pointer. Although this has not been confirmed, the possibility that an attacker may be able to execute arbitrary code in kernel context can not be ruled out.

tags | advisory, arbitrary, kernel, protocol
systems | freebsd
advisories | CVE-2013-5691
MD5 | 63e2ef236f0fd330d48b4724959355f7
FreeBSD Security Advisory - sendfile(2) Kernel Memory Disclosure
Posted Sep 10, 2013
Authored by Ed Maste | Site security.freebsd.org

FreeBSD Security Advisory - The sendfile(2) system call allows a server application (such as an HTTP or FTP server) to transmit the contents of a file over a network connection without first copying it to application memory. High performance servers such as Apache and ftpd use sendfile. On affected systems, if the length passed to sendfile(2) is non-zero and greater than the length of the file being transmitted, sendfile(2) will pad the transmission up to the requested length or the next pagesize boundary, whichever is smaller. The content of the additional bytes transmitted in this manner depends on the underlying filesystem, but may potentially include information useful to an attacker. An unprivileged user with the ability to run arbitrary code may be able to obtain arbitrary kernel memory contents.

tags | advisory, web, arbitrary, kernel
systems | freebsd
advisories | CVE-2013-5666
MD5 | 5b77f46ddda4cdbf66adc9fbaf7f4e9d
GameHouse Unsafe Permissions / Use-After-Free
Posted Sep 10, 2013
Authored by Carsten Eiram

This whitepaper is aptly named An Analysis of the (In)Security State of the GameHouse Game Installation Mechanism. It discusses unsafe permission and use-after-free vulnerabilities and how it exposes users' systems.

tags | advisory, vulnerability
MD5 | 7573d36c8e5c60c8b9b2b0ec133898d3
D-Link DIR-505 Bypass / Privilege Escalation/ Traversal / Code Injection
Posted Sep 10, 2013
Authored by Alessandro Di Pinto

D-Link DIR-505 devices suffer from privilege escalation issues due to hard-coded credentials, path traversal, command injection, weak encryption, and authentication bypass vulnerabilities. Firmware versions 1.06 and below are affected.

tags | exploit, vulnerability
MD5 | a65dd7dd4ffb4b6e32c4377853108c1f
Mandriva Linux Security Advisory 2013-229
Posted Sep 10, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-229 - A denial of service flaw was found in the way SSL module implementation of Python 3 performed matching of the certificate's name in the case it contained many '*' wildcard characters. A remote attacker, able to obtain valid certificate with its name containing a lot of '*' wildcard characters could use this flaw to cause denial of service (excessive CPU consumption) by issuing request to validate such a certificate for / to an application using the Python's ssl.match_hostname() functionality.

tags | advisory, remote, denial of service, python
systems | linux, mandriva
advisories | CVE-2013-2099
MD5 | 115f04300c8aadd79b8c495a5a32f43a
Ubuntu Security Notice USN-1949-1
Posted Sep 10, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1949-1 - It was discovered that ImageMagick incorrectly handled decoding GIF image comments. If a user or automated system using ImageMagick were tricked into opening a specially crafted GIF image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2013-4298
MD5 | 446bd753c6e83543d111d7ad587f0d6c
Mandriva Linux Security Advisory 2013-228
Posted Sep 10, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-228 - Multiple cross-site scripting vulnerabilities in Cacti 0.8.8b and earlier allow remote attackers to inject arbitrary web script or HTML via the id parameter to cacti/host.php. SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, arbitrary, php, vulnerability, xss, sql injection
systems | linux, mandriva
advisories | CVE-2013-5588, CVE-2013-5589
MD5 | bba52010bb16b1de58492d1e337b2dbe
Slackware Security Advisory - subversion Updates
Posted Sep 10, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New subversion packages are available for Slackware 14.0 and -current to fix a security issue. Related CVE Numbers: CVE-2013-4277.

tags | advisory
systems | linux, slackware
advisories | CVE-2013-4277
MD5 | 8dd9d8d0b7e5b94a8ae83952a1a4bb18
Target Longlife Media Player 2.0.2.0 Crash Proof Of Concept
Posted Sep 10, 2013
Authored by gunslinger

Target Longlife Media Player version 2.0.2.0 crash proof of concept denial of service exploit that creates a malicious wav file.

tags | exploit, denial of service, proof of concept
MD5 | db43db134bc4e8106faf4273e6074650
CIS Manager SQL Injection
Posted Sep 10, 2013
Authored by Ashiyane Digital Security Team

Sites powered by CIS Manager suffer from a remote SQL injection vulnerability. Note that this advisory has site-specific information.

tags | exploit, remote, sql injection
MD5 | fcec92a6330ef06b1ac100b0366b7ecc
Interalp Touristik SQL Injection
Posted Sep 10, 2013
Authored by Ashiyane Digital Security Team

Sites powered by Interalp Touristik suffer from a remote SQL injection vulnerability. Note that this advisory has site-specific information.

tags | exploit, remote, sql injection
MD5 | 10e17facd1817942a7d28c652e8b1dde
Winfakt Cross Site Scripting / SQL Injection
Posted Sep 10, 2013
Authored by Ashiyane Digital Security Team

Site powered by WinFakt! Webwinkel suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this advisory has site-specific information.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 475cd54d0e4ec90b5a762cbc22db325c
Infoideias Cross Site Scripting / SQL Injection
Posted Sep 10, 2013
Authored by Ashiyane Digital Security Team

Site powered by Infoideias suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this advisory has site-specific information.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 52edd9462be36cd7033627319f5de4ae
Lua-Programming Language 1.6 File Upload
Posted Sep 10, 2013
Authored by Larry W. Cashdollar

Lua-Programming Language version 1.6 for iOS suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
systems | apple
MD5 | 139a992449f564dac5072f810be478f2
Page 1 of 1
Back1Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    16 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close