what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 33 of 33 RSS Feed

Files Date: 2013-06-05 to 2013-06-06

Ubuntu Security Notice USN-1863-1
Posted Jun 5, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1863-1 - Ilja van Sprundel discovered multiple security issues in various X.org libraries and components. An attacker could use these issues to cause applications to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-1987
SHA-256 | a440338676cde8059496b3dd2a0f1f13cc46b5de34cd0a9a326eadbfa1a7bad8
Ubuntu Security Notice USN-1855-1
Posted Jun 5, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1855-1 - Ilja van Sprundel discovered multiple security issues in various X.org libraries and components. An attacker could use these issues to cause applications to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-2064
SHA-256 | de687e43e1663c1566a8278afc115ba49310e8aee5747485b526b9605d05162c
Exim sender_address Remote Command Execution
Posted Jun 5, 2013
Authored by eKKiM

Exim sender_address parameter remote command execution exploit that spawns a connect-back shell.

tags | exploit, remote, shell
SHA-256 | 9b7e5b2ab5d077019a9d4cd152be0e3cd435bd5a759bcb011ea9bf0a0ca131fb
Croogo 1.3.5 Cross Site Scripting
Posted Jun 5, 2013
Authored by Nikhalesh Singh Bhadoria

Croogo version 1.3.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a4ea23e428068a16e2f8234f2da527f2b6e053b6588e26ac8ebe46d383ed5419
360-FAAR Firewall Analysis Audit And Repair 0.4.6
Posted Jun 5, 2013
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release fixes netscreen group name translation bugs. Empty groups are not matched in build_rules subs. Comments are output in set name statements in policy id mode for netscreen rulebases. Netscreen rule name strings are added with rule descriptions and net ranges are translated as ranges. Some default services have been updated with a few new services definitions. rr mode nat defaults added - the same as yes defaults with CIDR filter NAT translations switched on.
tags | tool, perl
systems | unix
SHA-256 | 3b2947bf4d64b74f768c68b078f4aaf945a5e27bd994d54ce9fbcdf4a1c6deaa
Mac OSX Server DirectoryService Buffer Overflow
Posted Jun 5, 2013
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - A memory corruption vulnerability was found in Mac OSX Directory Service. By sending a maliciously crafted message, a remote attacker could cause the directory server to terminate or execute arbitrary code with system privileges. The issue existed in the directory server's handling of messages from the network.

tags | exploit, remote, arbitrary
systems | apple
advisories | CVE-2013-0984
SHA-256 | 0af07c9bc743ae24f0e1c9852c676d23a4a2bef08aa16b852625d54038fce987
MiniUPnPd 1.0 Stack Buffer Overflow Remote Code Execution
Posted Jun 5, 2013
Authored by H D Moore, Dejan Lukan | Site metasploit.com

This Metasploit module exploits the MiniUPnP 1.0 SOAP stack buffer overflow vulnerability present in the SOAPAction HTTP header handling.

tags | exploit, web, overflow
advisories | CVE-2013-0230, OSVDB-89624
SHA-256 | 399dfaf3edd72eb325ee021863dfd3a6e0d3ef47515d4072e0bc7526808df658
Ubuntu Security Notice USN-1851-1
Posted Jun 5, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1851-1 - Eoghan Glynn and Alex Meade discovered that python-keystoneclient did not properly perform expiry checks for the PKI tokens used in Keystone. If Keystone were setup to use PKI tokens (the default in Ubuntu 13.04), a previously authenticated user could continue to use a PKI token for longer than intended.

tags | advisory, python
systems | linux, ubuntu
advisories | CVE-2013-2104
SHA-256 | 0f9a2d7368666d25c099d33542339b7ff0b9e7c2fab2ff32bb4badd3cce05a09
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close