exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 31 RSS Feed

Files Date: 2011-07-01 to 2011-07-02

Debian Security Advisory 2270-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2270-1 - It was discovered that incorrect sanitising of virtio queue commands in KVM, a solution for full virtualization on x86 hardware, could lead to denial of service of the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, x86
systems | linux, debian
advisories | CVE-2011-2512
SHA-256 | 802e2cb84ab1889489e86adbd8819bfe197e3899c94bfbb8dc0db40b933c5069
Debian Security Advisory 2269-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2269-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-0083, CVE-2011-0085, CVE-2011-2362, CVE-2011-2363, CVE-2011-2365, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2376
SHA-256 | 0e5343abc1896f7a308f56fd04001172045bc0e7f0ffe2d0e664fd3a2504db18
Debian Security Advisory 2266-2
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2266-2 - The update for CVE-2010-2531 for the old stabledistribution (lenny) introduced a regression, which lead to additional output being written to stdout.

tags | advisory
systems | linux, debian
advisories | CVE-2010-2531, CVE-2011-0420, CVE-2011-0421, CVE-2011-0708, CVE-2011-1153, CVE-2011-1466, CVE-2011-1471, CVE-2011-2202
SHA-256 | f8f9215e818490fc2f7ebd9064ee594fd02d03d6a1ed09e7ff12fa39b629cd00
Debian Security Advisory 2268-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2268-1 - Several vulnerabilities have been found in Iceweasel, a web browser based on Firefox.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2011-0083, CVE-2011-0085, CVE-2011-2362, CVE-2011-2363, CVE-2011-2365, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2376
SHA-256 | fdb142688bfe19e8679d683ddce476c6dcb23df5edca080537dca630652d30e5
WiRouter KeyRec 1.0.8
Posted Jul 1, 2011
Authored by Salvatore Fresta | Site salvatorefresta.net

WiRouter KeyRec is a powerful and platform independent piece of software that recovers the default WPA passphrases of the supported router's models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley).

Changes: This release adds a function for calculating the Magic Numbers and the function for printing of the WEP key of AGPF router models.
tags | tool, wireless
SHA-256 | 09ef1cf9ac1825043c169a5375e7f31dd1281c73a484011f2dc149e4cecf2b63
Debian Security Advisory 2267-1
Posted Jul 1, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2267-1 - It was discovered that Perl's Safe module - a module to compile and execute code in restricted compartments - could by bypassed.

tags | advisory, perl
systems | linux, debian
advisories | CVE-2010-1447
SHA-256 | 30313cbed8cc072a130fd81441ea473bc7bad5c55b0c1f6271ced419a05f78c3
Zero Day Initiative Advisory 11-232
Posted Jul 1, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-232 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the iNOdeMngChecker.exe component which listens by default on TCP port 9090. When handling the 0x0A0BF007 packet type the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2011-1867
SHA-256 | 184ebe743fd4791fc52acadd3af12220395cac9680704076be939466bc65cdae
OpenSSH 3.4p1 FreeBSD Remote Root Exploit
Posted Jul 1, 2011
Authored by Kingcope

OpenSSH version 3.4p1 remote root exploit for FreeBSD.

tags | exploit, remote, root
systems | freebsd
SHA-256 | 784ac2c808aee05f8e7a89a108734acf1284cde95b4a09f41ebde5b82c0728af
Pentesting In Local Networks Part 1
Posted Jul 1, 2011
Authored by ph0x90bic

Whitepaper called Pentesting in Local Networks Part 1. It discusses performing recon, ARP poisoning, traffic analysis techniques, and more.

tags | paper, local
SHA-256 | 61bd8550d6d7da3a35747d2f5abbe23c40f3b034a054bb63345a6aab75a7e160
Nmap Port Scanner 5.59BETA1
Posted Jul 1, 2011
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Added 40 scripts, brute forcing of BackOrifice remote administration, host discovery via the DNS Service Discovery protocol, and various other updates and additions.
tags | tool, remote, udp, tcp, protocol, nmap
systems | linux, unix
SHA-256 | 92e2a17dd09e58939f6c299a0c0d7af3c7d2b257ecb922c85bd13e875faf5835
Packet Storm New Exploits For June, 2011
Posted Jul 1, 2011
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 206 exploits added to Packet Storm in June, 2011.

tags | exploit
systems | linux
SHA-256 | 00240cc4f79ebd969896553f5151da9048faa9fa5fcc0c80c12b31a30b63a202
NetBSD 5.1 libc/net Stack Buffer Overflow
Posted Jul 1, 2011
Authored by Maksymilian Arciemowicz

NetBSD version 5.1 libc/net suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
systems | netbsd
advisories | CVE-2011-1656
SHA-256 | 41dc13e14f5bb04dc98558705af4a4ffaa1774d45a59d6fb6682a19250cf3d47
Winamp 5.61 Heap / Integer Overflows
Posted Jul 1, 2011
Authored by Luigi Auriemma | Site aluigi.org

Winamp versions 5.61 and below suffer from multiple heap overflows and corruption and an integer overflow. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 23df304bc95256e399de1584a4c2057c6c417d43ffde347c35effa2a74e84e08
Shanghai Freemen SQL Injection
Posted Jul 1, 2011
Authored by Bl4ck.Viper

Shanghai Freemen suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 74ab932735f95b279a6152d1f592ec74c731cf4e56a914e12b8c2369d48b9341
Joomla mdigg SQL Injection
Posted Jul 1, 2011
Authored by Caddy-Dz

The Joomla Mdigg component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 11c2fca33c5ba1d0acdf243cbad202cfaac19f62a980db2ba24d643c156aa88d
DomainShopScript Cross Site Scripting
Posted Jul 1, 2011
Authored by r007k17-w

DomainShopScript suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 78fdf5dd6314e782d9bc20e026c2a3fdb8743e92972e740f1b846d80f1543c6b
Ollance Cross Site Scripting / SQL Injection
Posted Jul 1, 2011
Authored by r007k17-w

The Ollance login script suffers from cross site scripting and remote SQL injection vulnerabilities. The SQL injection vulnerability allows for authentication bypass.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 189f6acb4ed8469141230d67ce3202accf44636ad83a5a5c17c6e1a843dfc9f5
Ashampoo 3D CAD Professional 3.0.1 Insecure Method
Posted Jul 1, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Ashampoo 3D CAD Professional version 3.0.1 suffers from an insecure method vulnerability.

tags | exploit
SHA-256 | 8a1349f1a272f4679fe1272c1710a1de10a3496369c90b59b41bfd07080086c3
WordPress 3.1.3 / 3.2-RC1 SQL Injection
Posted Jul 1, 2011
Authored by K. Gudinavicius | Site sec-consult.com

WordPress versions 3.1.3 and 3.2-RC1 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 0a7900515451e312b78d781e902fcb08e0d2c379668d6c7b467866395e99972e
Apple Developer Cross Site Scripting / Redirect
Posted Jul 1, 2011
Authored by Aung Khant | Site yehg.net

The Apple Developer site suffered from open redirect, cross site scripting, and http response splitting vulnerabilities.

tags | exploit, web, vulnerability, xss
systems | apple
SHA-256 | b29d8484d309dd75a2e3e792db03ef437624b98406e3757be16dee53f7a81233
Secunia Security Advisory 45119
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Rational DOORS Web Access, where two have an unknown impact and one can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | a0dcc55f60b764c0d5c5a557a2320077b834466c7d8952d669108e24bac9e984
Secunia Security Advisory 45129
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Intelligent Management Center products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b0fc3489c292d94583a04845839bbeab070c30017be5874b51887b7aefa8c534
Secunia Security Advisory 45053
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Justin Klein Keane has discovered two vulnerabilities in AeroMail, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | d563fb2f8a31b8a45bd08f8377e93a8fad1028d28e219ad698233075ccbee59b
Secunia Security Advisory 44988
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in libvirt, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | ab860fa2c23d45b88a34710a6da76335ed849c1db0bf7c37a003094622c6d4af
Secunia Security Advisory 45120
Posted Jul 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 35ebc350ffafee7efccbb4813f57b6880f6561cd71975c3f7df0a6c103dd9435
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close