exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2011-07-07 to 2011-07-08

Debian Security Advisory 2273-1
Posted Jul 7, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2273-1 - Several vulnerabilities have been discovered in Icedove, an unbranded version of the Thunderbird mail/news client.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-0083, CVE-2011-0085, CVE-2011-2362, CVE-2011-2363, CVE-2011-2365, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2376
SHA-256 | 2ef146aca09d233410ab44c6e1c9973fa960736b2e7f412227bd5dcfb267e6ff
Cisco Security Advisory 20110706-csg
Posted Jul 7, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device.

tags | advisory, remote, denial of service
systems | cisco
advisories | CVE-2011-2064
SHA-256 | 47affad59b00044d9ad060263d5a9a48eed230f89c78af4c892b70ed3be57832
LuxCal Web Calendar 2.4.2 / 2.5.0 SQL Injection
Posted Jul 7, 2011
Authored by kaMtiEz | Site indonesiancoder.com

LuxCal Web Calendar versions 2.4.2 and 2.5.0 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | c531b5544e399b0b05f621a353b38e58960f2676c6b38c34ef113df210155c31
aTube Catcher 2.3.570 Insecure Method
Posted Jul 7, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

aTube Catcher version 2.3.570 suffers from an insecure method vulnerability.

tags | exploit
SHA-256 | 44a65c7fda84418a50d45584ee5618db08b4401eb2fe2ad6667112c3fff99959
Ubuntu Security Notice USN-1165-1
Posted Jul 7, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1165-1 - Nelson Elhage discovered that QEMU did not properly validate certain virtqueue requests from the guest. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Stefan Hajnoczi discovered that QEMU did not properly perform integer comparisons when performing virtqueue input validation. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2011-2212, CVE-2011-2512
SHA-256 | e3ccd0d1153d4140f17f1e1ce0c2c4ba9f29570da645f067a3ba6f3b39a4acaa
Effective File Search 6.7 DLL Hijack
Posted Jul 7, 2011
Authored by Kalashinkov3

Effective File Search version 6.7 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | a87c5df1bec63ec7c29aed5cdd7c0b95e79f47d058ceb03d7144adabcf14174b
Activart SQL Injection
Posted Jul 7, 2011
Authored by Kalashinkov3

Activart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3cecc1164ebd86619d73b193d9b613e76c91a42007f6c84a798207d7339230cf
Alphabit Online SQL Injection
Posted Jul 7, 2011
Authored by Kalashinkov3

Alphabit Online suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2735b6518e0af39be6d92e6e972a95e286d73d0db78d4058a9e677c6b44ea056
iDrive Online Backup 3.4.0 Insecure Method
Posted Jul 7, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

iDrive Online Backup version 3.4.0 suffers from an insecure method vulnerability.

tags | exploit
SHA-256 | 0f2708d94c32bd9303abeeb64b2876314479075db4dd0484443c170f5e29afad
HP Security Bulletin HPSBUX02688 SSRT100513
Posted Jul 7, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02688 SSRT100513 - A potential security vulnerability has been identified in HP-UX dynamic loader. The vulnerability could be exploited locally to create a privilege escalation, or a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
systems | hpux
advisories | CVE-2011-2398
SHA-256 | eeef1db78f13a5fa4ec2c24f3421914be2c402cb016c9299a35af1a06f3c560a
MIT krb5 Security Advisory 2011-005
Posted Jul 7, 2011
Site web.mit.edu

MIT krb5 Security Advisory 2011-005 - A remote client of the GSS-API FTP daemon in the krb5-appl distribution can access files using the effective group ID that the FTP daemon process had when it started.

tags | advisory, remote
advisories | CVE-2011-1526
SHA-256 | 1fe339215ceaa9f7616aea04e0760e9c50130ea0ca8add4046b96df17325d31e
Blue Coat BCAAA Remote Code Execution
Posted Jul 7, 2011
Authored by Paul Harrington | Site ngssecure.com

The software referred to as BCAAA (Blue Coat Authentication and Authorization Agent) is installed on a domain server (not necessarily a domain controller, a member server is enough) and acts as an intermediary between a Blue Coat ProxySG and the domain. The BCAAA Windows Service is vulnerable to a stack-based buffer overflow, this can lead to remote code execution running with SYSTEM privileges. Affected are all versions of BCAAA associated with ProxySG releases 4.2.3, 4.3, 5.2, 5.3, 5.4, 5.5, and 6.1 available prior to April 21, 2011 or with a build number less than 60258. All versions of BCAAA associated with ProxyOne are also vulnerable.

tags | exploit, remote, overflow, code execution
systems | windows
SHA-256 | 54bac8253d4a2373e84fd3215e027da96d0d0887a6fbb0fdaedba7dac543322f
Various Indian Sites Cross Site Scripting
Posted Jul 7, 2011
Authored by r007k17-w

Business.in.com, Cricketnext.in.com, Hooked-in.com, and Connect.in.com all suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | a8cace2dd43b47c72530f423365cd7f077325f6b6ec46d04533864ff1108d503
Stunnel SSL Wrapper 4.39
Posted Jul 7, 2011
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: A new Windows installer module was added to build a self-signed stunnel.pem. Configuration file editing and log file reopening were added to the Windows GUI. Configuration file reloading with the Windows GUI was improved.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 972e4c150e3012ba8777f149c858e1e290aeb7ad7976e1551ac1752bc04fb0ed
ESTsoft ALPlayer 2.0 ASX Playlist File Handling Buffer Overflow
Posted Jul 7, 2011
Authored by LiquidWorm | Site zeroscience.mk

ESTsoft ALPlayer version 2.0 suffers from a buffer overflow vulnerability. It is caused due to a boundary error in the processing of a playlist file, which can be exploited to cause a stack-based buffer overflow when a user opens e.g. a specially crafted .asx file. Successful exploitation may allow execution of arbitrary code.

tags | exploit, overflow, arbitrary
systems | linux
SHA-256 | 5a582f57cd6e6df287f9f89eb693be5d651a9317c7ec5a7a9f97332fdc138cd4
foobar2000 1.1.7 Integer Overflow
Posted Jul 7, 2011
Authored by Luigi Auriemma | Site aluigi.org

foobar2000 versions 1.1.7 and below suffer from an integer overflow vulnerability.

tags | exploit, overflow
systems | linux
SHA-256 | e1be7ed3ad055d54958fd516bb25e5f37b083fd880252d91e6465dc4109cc84c
HP OpenView Communication Broker Arbitrary File Deletion
Posted Jul 7, 2011
Authored by Luigi Auriemma | Site aluigi.org

HP OpenView Communication Broker (ovbbccb.exe versions 11.0.43.0 and below) suffer from an arbitrary file deletion vulnerability.

tags | exploit, arbitrary
systems | linux
SHA-256 | 986bc67bf92ec6f9f779b02911e1349819b414d7082a4622ce743f01160246c4
Page 2 of 2
Back12Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close