Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
bba66902d2e9f662171a90b5829e88b292e3183f98eb58f518527fb4565eb0ce
Secunia Security Advisory - Ubuntu has issued an update for krb5. This fixes a weakness and two vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to potentially compromise a vulnerable system.
f31e38d51667aa5ccc18ac13786769ae78fe18b85148191de3bd272503add7a2
Secunia Security Advisory - Red Hat has issued an update for krb5. This fixes a weakness and a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to potentially compromise a vulnerable system.
759bc102276cdc0b268c88ac621533192aefcd2f988944e3d8216d56fac2e4e3
Secunia Security Advisory - A vulnerability has been discovered in Limny, which can be exploited by malicious people to conduct SQL injection attacks.
bd36404b71d5cede1710d7ead7ebe50c1eb76c0895e745333c128b62f6edd5b5
Secunia Security Advisory - SUSE has issued an update for vte/gnome-terminal. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service).
9e59bbd3a722a7405ffc391d546a52deabfdf79ca6e87c652fd07850c03b8fe9
Secunia Security Advisory - Red Hat has issued an update for icedtea-web. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the plugin.
4f6b55a417d5a49358b50c60d81fdff58dda155a69260ce63b323a982ae9bfd5
Secunia Security Advisory - A vulnerability has been reported in the Movm component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.
59942a037456ced97fd18ae42d16cce6f3e542cdebbdb6767edc9bedbe268816
Secunia Security Advisory - Ubuntu has issued an update for icedtea-web. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the plugin.
8dee92a9db2efd34dc96d4cc062a43090f8ea0460543cd84330f8235b6031a6d
Secunia Security Advisory - A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
b2a86bbb053392b99255f9835055128c24875e9d1cde9a8cce6cd86e73356852
Joomla Movm component version 1.0 suffers from a remote SQL injection vulnerability.
e3427894cce8d8fa4ad201fc6f9ca8c75931c67318be35e15f273c5f4d5c3dc3
This archive contains all of the 195 exploits added to Packet Storm in July, 2012.
d1c4f8bf6e1686f31a09703b8311dcdafdb0325712ffebc264d5aba10c4a798e
This Metasploit module exploits a heap overflow vulnerability in Internet Explorer caused by an incorrect handling of the span attribute for col elements from a fixed table, when they are modified dynamically by javascript code.
aaf1f1bff58af8d0e890f965766d5618a2de8a76a4a4edc1da853071f2054364
This Metasploit module exploits a vulnerability found in WebPageTest's Upload Feature. By default, the resultimage.php file does not verify the user-supplied item before saving it to disk, and then places this item in the web directory accessable by remote users. This flaw can be abused to gain remote code execution.
12ff7aba4342dfbb7f5a516aa01579569cbaf4c1cb86bb84f42047ca2ada8e0b
iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.
867c144e60075e7bebe6fcecf0b65169d5e2d1fa5ceec2ebd9780cd5026123ea
conntrack-tools is a set of userspace tools for Linux that allow system administrators to interact with the Connection Tracking System, the module which provides stateful packet inspection for iptables. It includes the userspace daemon conntrackd and the commandline interface conntrack.
e1da5f4c46094c252df5a167b28ecf2085dd73d1258316021d80612e5c9e332b
MIT krb5 Security Advisory 2012-001 - The MIT krb5 KDC (Key Distribution Center) daemon can free an uninitialized pointer while processing an unusual AS-REQ, corrupting the process heap and possibly causing the daemon to abnormally terminate. An attacker could use this vulnerability to execute malicious code, but exploiting frees of uninitialized pointers to execute code is believed to be difficult. It is possible that a legitimate client that is misconfigured in an unusual way could trigger this vulnerability. The MIT krb5 KDC daemon can dereference an uninitialized pointer while processing a malformed AS-REQ, causing the daemon to abnormally terminate. This vulnerability could theoretically lead to the execution of malicious code, but that is believed to be very difficult.
c6e678cd6912090035d37e0e943e9a727bca5c72a814f85c04f9e97cff64c21e