what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files Date: 2009-11-06 to 2009-11-07

Phrack Magazine Issue 66
Posted Nov 6, 2009
Authored by phrack | Site phrack.org

Phrack Magazine Issue 66 - Phrack Prophile on the PaX Team, World News, Abusing the Objective C runtime, Exploit DLmalloc frees in 2009, and more.

tags | magazine
systems | unix
SHA-256 | 63ebcba5fe533f2e6a8d1af9e2b8f18753423141dbd4728f0e84d64554a227ac
Linux Kernel pipe.c Local Privilege Escalation
Posted Nov 6, 2009
Authored by Matthew Bergin

Proof of concept local privilege escalation exploit for the Linux kernel pipe.c vulnerability.

tags | exploit, kernel, local, proof of concept
systems | linux
SHA-256 | 8520212a783ddedab3d9b9af55edd94f3fee40c82f16d372fe68b4866ea21535
Blended Browser File Theft
Posted Nov 6, 2009
Authored by Inferno from Secure Thoughts

Google Chrome versions prior to 3.0.195.32 suffer from a vulnerability that allows for file theft.

tags | advisory
SHA-256 | 65b6230b7b654fce7de1ab9993edea3503041937895e5f419b4cda88ac0103ca
Mandriva Linux Security Advisory 2009-294
Posted Nov 6, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-294 - Security issues were identified and fixed in Firefox 3.5.x.

tags | advisory
systems | linux, mandriva
advisories | CVE-2009-1563, CVE-2009-3274, CVE-2009-3370, CVE-2009-3371, CVE-2009-3372, CVE-2009-3373, CVE-2009-3374, CVE-2009-3375, CVE-2009-3376, CVE-2009-3377, CVE-2009-3378, CVE-2009-3379, CVE-2009-3380
SHA-256 | 4addcca5fafa803913097baa6c63f7a85816ac4e4393a557c0051bbed68d1b5b
SSL/TLS Man-In-The-Middle
Posted Nov 6, 2009
Authored by Pavel Kankovsky

This is a proof of concept exploit for the man-in-the-middle vulnerability related to SSL/TLS.

tags | exploit, proof of concept
SHA-256 | 2b661f70766b0bbb234ee49ed56b97004e033d7c2f3d9430a1d4126fb06e3714
Ubuntu Security Notice 855-1
Posted Nov 6, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 855-1 - Mark Martinec discovered that HTML::Parser incorrectly handled strings with incomplete entities. An attacker could send specially crafted input to applications that use HTML::Parser and cause a denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2009-3627
SHA-256 | fc5f9a70082c36236c726e7102bbd6f762acbe9ae8cb6e13f5c303504e794eb9
Ubuntu Security Notice 854-1
Posted Nov 6, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 854-1 - Tomas Hoger discovered that the GD library did not properly handle the number of colors in certain malformed GD images. If a user or automated system were tricked into processing a specially crafted GD image, an attacker could cause a denial of service or possibly execute arbitrary code. It was discovered that the GD library did not properly handle incorrect color indexes. An attacker could send specially crafted input to applications linked against libgd2 and cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 6.06 LTS. It was discovered that the GD library did not properly handle certain malformed GIF images. If a user or automated system were tricked into processing a specially crafted GIF image, an attacker could cause a denial of service. This issue only affected Ubuntu 6.06 LTS. It was discovered that the GD library did not properly handle large angle degree values. An attacker could send specially crafted input to applications linked against libgd2 and cause a denial of service. This issue only affected Ubuntu 6.06 LTS.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-3475, CVE-2007-3476, CVE-2007-3477, CVE-2009-3293, CVE-2009-3546, CVE-2007-3476
SHA-256 | b73b36b887d79ca9e33bd11f21234253e6b1365bba9dccdfd6ef80ad069bb5e6
Zero Day Initiative Advisory 09-081
Posted Nov 6, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-081 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Power Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of URL parameters when posting to the login form of the web based management web server. Proper bounds checking is not applied when parsing the Login variable which can result in an exploitable stack overflow. Successful exploitation can lead to complete system compromise under the SYSTEM credentials.

tags | advisory, remote, web, overflow, arbitrary
advisories | CVE-2009-2685
SHA-256 | 4fe2c6ee8f4ae0da2ae82442b72be82eb4f7a98c1b56f5d96838548dde5e5b48
Debian Linux Security Advisory 1927-1
Posted Nov 6, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1927-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, sensitive memory leak or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability, memory leak
systems | linux, debian
advisories | CVE-2009-3228, CVE-2009-3238, CVE-2009-3547, CVE-2009-3612, CVE-2009-3620, CVE-2009-3621, CVE-2009-3638
SHA-256 | d172692933ef66a5cf069a277b5df019de629aa1b3e10941735fd69d684b8aa6
Page 2 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close