exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2014-03-21

Ubuntu Security Notice USN-2151-1
Posted Mar 21, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2151-1 - Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman, Dan Gohman and Christoph Diehl discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. Atte Kettunen discovered an out-of-bounds read during WAV file decoding. If a user had enabled audio, an attacker could potentially exploit this to cause a denial of service via application crash. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-1493, CVE-2014-1497, CVE-2014-1505, CVE-2014-1508, CVE-2014-1509, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512, CVE-2014-1513, CVE-2014-1514
SHA-256 | b9c5d05796f3964f78637e76f8a8bd653489461cb18c7c6f49a37f26b22188a3
Nessus 5.2.1 Local Privilege Escalation
Posted Mar 21, 2014
Authored by Neil Jones | Site nccgroup.com

An authenticated Nessus scan of a target machine may result in local privilege escalation on that target machine if scanned with the Malicious Process Detection plugin (Plugin ID 59275). The Malicious Process Detection plugin created a service which ran as SYSTEM however this binary could be modified by a low level user allowing for privilege escalation. Nessus appliance engine version 5.2.1 the plugin set 201402092115 is affected.

tags | advisory, local
SHA-256 | 8648f4d711efe44b31bdee0acb14cb37b88fd4f1a78ae2f87ff9765acf082452
STAR57 6.20.090330 Remote Command Execution
Posted Mar 21, 2014
Authored by Felipe Andrian Peixoto

STAR57 version 6.20.090330 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 433eba217ae3e6257289bddd815eaf98f552a7c8d6d092e667f2d8aa0c9d3f23
innoEDIT 6.2 Remote Command Execution
Posted Mar 21, 2014
Authored by Felipe Andrian Peixoto

innoEDIT version 6.2 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | a84ae0a9198c45f8c61093d04e2ace4490cd15507d7a8f10f9f4446e77bcd88e
Lynis Auditing Tool 1.4.7
Posted Mar 21, 2014
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: This released adds a new group property for the report. Additionally, it has two new AIDE configuration tests, adds grep to the list of binaries, and shows a suggestion when using NIS/NIS+.
tags | tool, scanner
systems | unix
SHA-256 | 634569923deb4852e20d6122ff4c30d976bb45da41677eac0dcd3125c233ef4d
An Address To The Secret Society Of PoC || GTFO
Posted Mar 21, 2014
Authored by pocgtfo

This is the fourth issue of PoC || GTFO.

tags | magazine
SHA-256 | 7094f5c6a3936e0d0b8f5e42b4d1940413f568e9a3617be0d7d6dc73cb3420e1
Children's Bible Coloring Book Of PoC || GTFO Issue 0x02
Posted Mar 21, 2014
Authored by pocgtfo

This is the third issue of PoC || GTFO.

tags | magazine
SHA-256 | f427e8d95c0ac15abe61d96fb75cfb55df1fd5ac9e713cf968f3602267ca155e
Proceeding Of The Society Of PoC || GTFO Issue 0x01
Posted Mar 21, 2014
Authored by pocgtfo

This is the second issue of PoC || GTFO.

tags | magazine
SHA-256 | a0f93a265d38257a06fd7fd210f73ea9c55a94ac1305c65c0510ada236c2cc88
International Journal Of PoC || GTFO Issue 0x00
Posted Mar 21, 2014
Authored by pocgtfo

This is the first issue of the International Journal of PoC || GTFO.

tags | magazine
SHA-256 | c4d1d1091187b98a9bb28452bc6564a1e8c0ce10d20ba2b4a20f8b7798f7ab64
SkypeFreak Forensic Tool
Posted Mar 21, 2014
Authored by Osanda Malith

This tool can be used to enumerate Skype users profiles, contacts, messages, and calls from the main.db file. This is automated easy to use application in which to perform forensic spelunking of Skype data.

tags | tool, forensics
SHA-256 | c5eb5f2d1fcead4e96207e4b85959a611b231d00883e83e72cbcb504f8e2d96d
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close