exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 342 RSS Feed

Files Date: 2013-05-01 to 2013-05-31

Debian Security Advisory 2677-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2677-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1987
SHA-256 | 3e4e60f82f5c54ccc3974aebea45459d716192d6537ea2eed11c8571e1a33e41
Red Hat Security Advisory 2013-0849-01
Posted May 23, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0849-01 - Red Hat provides a Red Hat Enterprise Linux 6.4 KVM Guest Image for cloud instances. This image is provided as a minimally configured system image which is available for use as-is or for configuration and customization as required by end users. The Red Hat Enterprise Linux 6.4 KVM Guest Image for cloud instances had an empty root password by default. To address this, Red Hat has created an updated image that locks the root password by default. This updated image is now available on RHN. To correct existing Red Hat Enterprise Linux 6.4 KVM Guest Images, any images or systems built using this Red Hat Enterprise Linux 6.4 KVM Guest Image, or any currently running Red Hat Enterprise Linux instances instantiated from this image, users can lock the root password by issuing, as root, the command:

tags | advisory, root
systems | linux, redhat
advisories | CVE-2013-2069
SHA-256 | ed81676847ea07381394f4b095304e4b8701c53c9df8ba9180e3231725962273
Debian Security Advisory 2692-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2692-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2001
SHA-256 | 526f15356521032803f94e40efdea3b2461981087fa14e87a10f626602a29d80
Debian Security Advisory 2691-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2691-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1985
SHA-256 | 2c5cad57c6bb9cde6c9f8fc2a3819f22c331ef8388c7641ef69aa5a7c92a1c3d
Debian Security Advisory 2690-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2690-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1991, CVE-2013-2000
SHA-256 | c047858dde6acb83b7d74912771272a3d3a29c8897e3605b0c566d5e573641fb
Debian Security Advisory 2673-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2673-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1992
SHA-256 | d3cf30dc091a2c682af08c1d7d689fa49e5cb88b760b654d7c92d96297dab9b7
Debian Security Advisory 2674-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2674-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1989, CVE-2013-2066
SHA-256 | 8afc4286d2bbe5ea5912d78b68cf404d320aa23d4a3f0c060cd79a79b2759037
Debian Security Advisory 2675-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2675-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1990, CVE-2013-1999
SHA-256 | b8ac1fc21efed3d049577f301a8b248402ecfd6a8f0b5ec564169a0c53d6b5f0
Debian Security Advisory 2676-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2676-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1983
SHA-256 | 21600a8fff01cf4794c8df916e26d9cb6720c4580b26409c850fcd015eb0067d
Debian Security Advisory 2689-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2689-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2063
SHA-256 | 5cc52699b441bc1fde71e455aa292c458d738dc72983d9f99b443c8d35a2626b
Debian Security Advisory 2688-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2688-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1988
SHA-256 | f0f238273af66cc3adfe3cf4c1d1f708cbf8597f7e07dd972df9e40ede5f30bd
Debian Security Advisory 2687-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2687-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1996
SHA-256 | 868a4ce0c0e8d42507868963a9b2862ee64cf34c927c53bb4150f72f1dfd173a
Debian Security Advisory 2686-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2686-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2064
SHA-256 | 0d8970061669321737667fe62dd9f6a041bb951b9c6d14c70999c68bbd574bee
Debian Security Advisory 2685-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2685-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2062
SHA-256 | 01ad1f85ac6a0247839237052f398416bafa9611850bdd4def488fa7b5cadffa
Debian Security Advisory 2684-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2684-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1986
SHA-256 | b76fd94fe0c9ef57d4632b1650b0b35f3451fbb1053a74ec242b0d816e58e939
Debian Security Advisory 2683-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2683-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1984, CVE-2013-1995, CVE-2013-1998
SHA-256 | a5914817d55af5bf1a0d2bf0c45ddc3086895b9b384a641d0c52134a0b60c8d5
Debian Security Advisory 2682-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
SHA-256 | 96d283f8f40acf4da7b73b48e8c1023cbc9edb3e82a68669c43b68bc9fb705b9
Debian Security Advisory 2681-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2681-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2003
SHA-256 | d42547a5d3b60bb7ed89f36193f6d7679130e77dbc9c52bd2dc4f45136dd326a
Debian Security Advisory 2680-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
advisories | CVE-2013-2002, CVE-2013-2005
SHA-256 | 34a20cd92d2e61a5bdbf55c9c9f8fd426cfeb97d4fe419b8efd37ad50cea7a4d
Debian Security Advisory 2679-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2679-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1994
SHA-256 | b8f2eef330925d42b333e25e059c8502f48b03bc2786b5fd113eff186fbc70f0
Debian Security Advisory 2678-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2678-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1993
SHA-256 | ee6b72ce73c17aa5c574e23bdab10ab1fa4db45dd98ca15f709b2332ffbefea6
CAREL pCOWeb 1.5.0 Default Credential Shell Access
Posted May 23, 2013
Authored by xistence | Site carel.com

The CAREL pCOWeb firmware version 1.5.0 and lower has two passwordless default accounts that allow direct shell access via telnet. These accounts are not exposed in the associated Web UI. CAREL pCOWeb is an embedded device used primarily for HVAC systems.

tags | advisory, web, shell
SHA-256 | 82b0a4cd0a0bf41d1802335815e91ba3801340fe8352516154ac02cad97445f8
Microsoft Internet Explorer 10-9 Object Confusion Sandbox Bypass
Posted May 23, 2013
Authored by Nicolas Joly, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Internet Explorer. The vulnerability is caused by an object confusion error in the IE broker process when processing unexpected variant objects, which could allow an attacker to execute arbitrary code within the context of the broker process to bypass Internet Explorer Protected Mode sandbox.

tags | advisory, arbitrary, code execution
systems | windows
SHA-256 | 29cb1429a2a37f3d946b4ea603d9780f63a083ee715c7fb7c04574f48f13cb5f
Microsoft Internet Explorer 10-9-8-7-6 VML Remote Integer Overflow
Posted May 23, 2013
Authored by Nicolas Joly, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Internet Explorer. The vulnerability is caused by an integer overflow error in the "vml.dll" component when processing certain undocumented vector graphic properties, which could be exploited by remote attackers to leak arbitrary memory and compromise a vulnerable system via a malicious web page.

tags | advisory, remote, web, overflow, arbitrary
systems | windows
advisories | CVE-2013-2551
SHA-256 | 1cc53c7aa3e2dd5a6aeb2b6dce696e0d93ccd616548beed17512a42068a61e21
Nginx HTTP Server 1.3.9-1.4.0 Chunked Encoding Stack Buffer Overflow
Posted May 23, 2013
Authored by Greg MacManus, hal, saelo | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions 1.3.9 to 1.4.0 of nginx. The exploit first triggers an integer overflow in the ngx_http_parse_chunked() by supplying an overly long hex value as chunked block size. This value is later used when determining the number of bytes to read into a stack buffer, thus the overflow becomes possible.

tags | exploit, overflow
advisories | CVE-2013-2028, OSVDB-93037
SHA-256 | 5caa8725f0b0e52002e2804749d851584f474a1d0b411c2a827865afd2da031c
Page 4 of 14
Back23456Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close