exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 32 RSS Feed

Files Date: 2011-06-10 to 2011-06-11

Another File Integrity Checker 2.17
Posted Jun 10, 2011
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Arguments for the --list option should now be separated by a comma instead a space character. Search for the default config file is now the same for Unix and Linux: /etc/afick.conf and then afick.conf. The version is now shared between afick and afick-tk. Arguments for --list can also be given in several calls.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | 16c0827f38b019c292df6dac99eddc1b658553dfb181f86e551638115f8bc238
Debian Security Advisory 2257-1
Posted Jun 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2257-1 - Rocco Calvi discovered that the XSPF playlist parser of vlc, a multimedia player and streamer, is prone to an integer overflow resulting in a heap-based buffer overflow. This might allow an attacker to execute arbitrary code by tricking a victim into opening a specially crafted file.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-2194
SHA-256 | a64bbf0519ed68e16024a87f3bd0db4a3a66ade3a1196b2a76b6270b0ed4b867
Oracle Java ICC Profile "scrn" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "scrn" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
SHA-256 | bd2b206e8cc01411d077ffd71f0fafae0c987444464bb20fda99e30bd818b823
Oracle Java ICC Profile "pseq" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "pseq" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
SHA-256 | 678973558fee6d7c54c5b90eec131c79bd3a0357dbfa4eb1520a4ec67f37cad6
Oracle Java ICC Profile "ncl2" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "ncl2" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
SHA-256 | e8f488754f08480d5e40ca95b2864ba0737678e88ade054dfd206889f6e07072
Oracle Java ICC Profile "mluc" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "mluc" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
SHA-256 | 672490db1b7e734d96fdac53de3b57b95abfd9ee95d4201e9143bb6ef215fe8b
Oracle Java ICC Profile "bfd" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer truncation error in the Color Management Module (CMM) when processing a malformed "bfd" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, arbitrary
SHA-256 | cf0e788d1c843e3352da1703694e7f2744be0104b724b21b9d4cf89d96e5290a
Oracle Java ICC Profile "clrt" Tag Integer Overflow
Posted Jun 10, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by an integer overflow error in the Color Management Module (CMM) when processing a malformed "clrt" tag within an ICC profile, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, overflow, arbitrary
SHA-256 | b9624b37a2d319db443cfde21d7b096739c7f479b3a17eae304af656f677d623
Debian Security Advisory 2256-1
Posted Jun 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2256-1 - Tavis Ormandy discovered that the Tag Image File Format (TIFF) library is vulnerable to a buffer overflow triggered by a crafted OJPEG file which allows for a crash and potentially execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2009-5022
SHA-256 | e1600c5d082ac38cf6e93ff939d309cdc92b47dab49ce83a8355639ef56428cd
Ubuntu Security Notice USN-1145-1
Posted Jun 10, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1145-1 - It was discovered that QEMU did not properly perform validation of I/O operations from the guest which could lead to heap corruption. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Nelson Elhage discovered that QEMU did not properly handle memory when removing ISA devices. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2011-1750, CVE-2011-1751
SHA-256 | 29bcfefee7ae3f99088f1c110581a3f5650de101fcda3cf0f732eb5447e7392c
Pacer Edition CMS 2.1 Local File Inclusion
Posted Jun 10, 2011
Authored by LiquidWorm | Site zeroscience.mk

Pacer Edition CMS version 2.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 5bbc400a3b056ed47a8368ad140f7af63b51536812fa050098dffb2917feeca0
IT Reflect SQL Injection
Posted Jun 10, 2011
Authored by eXeSoul

IT Reflect suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4e8885625e971d732aff1e60addae595b41c698151a88ade4d66e63f3457cb35
FreeBSD/x86 /bin/sh Shellcode
Posted Jun 10, 2011
Authored by KedAns-Dz

36 bytes small execve('/bin/sh') FreeBSD/x86 shellcode.

tags | x86, shellcode
systems | freebsd
SHA-256 | 73dca6b5caa2057d55235dfc1cae4c8461fabcc26ec7cbdf69a1b086cd805bfe
Secunia Security Advisory 44906
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged multiple vulnerabilities in Reflection for Secure IT, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's system.

tags | advisory, denial of service, vulnerability
SHA-256 | e550e69a030463d9ac1ede3fe6cfa1bb91792086cae94ef2be197ae205a44586
Secunia Security Advisory 44896
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in D-Bus, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 7ade01831fbd09c6feb5136d2fd5f6ee46c288a242dad36b508af79de861404d
Secunia Security Advisory 44905
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged two vulnerabilities in Reflection X 2011 and Reflection Suite for X 2011, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
SHA-256 | bc66b48aa0721e3aa6ee3fad4f74a305b79ddd8cf5f2e56f54aaca156837e86b
Secunia Security Advisory 44896
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in D-Bus, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 7ade01831fbd09c6feb5136d2fd5f6ee46c288a242dad36b508af79de861404d
Secunia Security Advisory 44905
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged two vulnerabilities in Reflection X 2011 and Reflection Suite for X 2011, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
SHA-256 | bc66b48aa0721e3aa6ee3fad4f74a305b79ddd8cf5f2e56f54aaca156837e86b
Secunia Security Advisory 44853
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Cosign module for Drupal, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | c285bf2bc24dc42679e72e0a4724856ac8e6595785b2c3b84446fe026fe64f2d
Secunia Security Advisory 44882
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for phpMyAdmin. This fixes a weakness and a vulnerability, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, fedora
SHA-256 | 973c63d4f7ae474f4a26726e1a1a22cda66e2decf7b6d4934521003fa51b793d
Secunia Security Advisory 44884
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 5ada0e0491aea96c13f2585c45298b944493c48af168d396b77bc240375d5b56
Secunia Security Advisory 44748
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3Com Intelligent Management Center, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 3044d064f46817fdc90489d768c30579fdb8803ff0a0eb2aa34b96977f0bb23d
Secunia Security Advisory 44843
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Spam module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 4096e44db33b994f80318637051281d1ae0bc223885bdbb15e8f51d3a39b317b
Secunia Security Advisory 44881
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for rdesktop. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | fc043d1a182ac248913089ead7ca4c820af91c4e693ef3b8e05137173b9f4427
Secunia Security Advisory 44876
Posted Jun 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cyrus-imapd. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | linux, redhat
SHA-256 | bcab2d3e992351083bcb22210e0ef3989684e27588c968facd14c73a6b45db1d
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close