exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 400 RSS Feed

Files Date: 2013-10-01 to 2013-10-31

Mandriva Linux Security Advisory 2013-262
Posted Oct 28, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-262 - In PyCrypto before v2.6.1, the Crypto.Random pseudo-random number generator exhibits a race condition that may cause it to generate the same 'random' output in multiple processes that are forked from each other. Depending on the application, this could reveal sensitive information or cryptographic keys to remote attackers.

tags | advisory, remote, cryptography
systems | linux, mandriva
advisories | CVE-2013-1445
SHA-256 | 5fc98e0d42f5fd76de60ac4145a29bc092240bcb14f6ed7ad75cba5b75bbecb6
Mandriva Linux Security Advisory 2013-261
Posted Oct 28, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-261 - Possible memory exhaustion denial of service due to the size of decompressed payloads in dropbear before 2013.59. Inconsistent delays in authorization failures could be used to disclose the existence of valid user accounts in dropbear before 2013.59.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2013-4421, CVE-2013-4434
SHA-256 | aba56fe4695484e1274e59199138625389fdcdffdb016feda736408ca221f0e3
Mandriva Linux Security Advisory 2013-260
Posted Oct 28, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-260 - Multiple vulnerabilities have been discovered and corrected in x11-server. The updated packages have been patched to correct these issues.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2010-1166, CVE-2011-4028, CVE-2013-1940, CVE-2013-4396
SHA-256 | 50969d2a09bdf2e48ce14b12843f678f7e90396dd3d3c735132e96cfb2be5013
Mandriva Linux Security Advisory 2013-259
Posted Oct 28, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-259 - Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2013-4396
SHA-256 | d73de32034766dc93737b3ea8cb07c6ae13f7aee39585ad2d16563b6745e2abb
Mandriva Linux Security Advisory 2013-258
Posted Oct 28, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-258 - It was discovered that ICU contained a race condition affecting multi-threaded applications. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. It was discovered that ICU incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2013-0900, CVE-2013-2924
SHA-256 | 548ed919c730db114b9bd87b6261a35bd35e86d1171dfc5eb7b59850b01cd652
Gentoo Linux Security Advisory 201310-21
Posted Oct 28, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-21 - Multiple vulnerabilities have been found in MediaWiki, the worst of which could lead to Denial of Service. Versions less than 1.21.2 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2013-1816, CVE-2013-1817, CVE-2013-1818, CVE-2013-1951, CVE-2013-2031, CVE-2013-2032, CVE-2013-2114, CVE-2013-4301, CVE-2013-4302, CVE-2013-4303, CVE-2013-4304, CVE-2013-4305, CVE-2013-4306, CVE-2013-4307, CVE-2013-4308
SHA-256 | ac99ffc7a59e19273c6f7c08c59b9e2e2bc135cfd07f27fd127001d0bd0ca8d6
Gentoo Linux Security Advisory 201310-20
Posted Oct 28, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-20 - A vulnerability in acpid2 may allow a local attacker to gain escalated privileges. Versions less than 2.0.17 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2011-2777
SHA-256 | aabf1d5fd5c7875c07a261f92c1372e4e767ccd10a4f2bdc817de1fb02971c38
Gentoo Linux Security Advisory 201310-19
Posted Oct 28, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-19 - A path vulnerability in X2Go Server may allow remote execution of arbitrary code. Versions less than 4.0.0.2 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2013-4376
SHA-256 | 1b4d8c2d5d5e5cc903e0656136ff595271108c26520fa60e84ddf1fb892a61a6
Debian Security Advisory 2786-1
Posted Oct 28, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2786-1 - The Google Chrome Security Team discovered two issues (a race condition and a use-after-free issue) in the International Components for Unicode (ICU) library.

tags | advisory
systems | linux, debian
advisories | CVE-2013-0900, CVE-2013-2924
SHA-256 | fff614ff927cf78e679c00b762b70597a0e8fafbaa8f65901ab464f3c04fa797
Gentoo Linux Security Advisory 201310-18
Posted Oct 28, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-18 - Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to Denial of Service. Versions less than 2.12.23-r1 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2013-1619, CVE-2013-2116
SHA-256 | dae2553c4427a86dc8b3c9a695288ffe228b8243b84bee882ce07c7536efbf41
Gentoo Linux Security Advisory 201310-17
Posted Oct 28, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-17 - pmake uses temporary files in an insecure manner, allowing for symlink attacks. Versions less than 1.111.3.1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2011-1920
SHA-256 | 720961ebfdd7c172ab996cfa7fe9379f3ed54bc16906d9e466e5d2cf72806d13
Debian Security Advisory 2787-1
Posted Oct 28, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2787-1 - It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize the _session parameter in steps/utils/save_pref.inc during saving preferences. The vulnerability can be exploited to overwrite configuration settings and subsequently allowing random file access, manipulated SQL queries and even code execution.

tags | advisory, imap, code execution
systems | linux, debian
advisories | CVE-2013-6172
SHA-256 | 16835cafc45de428b561f8da656aead6d60655755a053be0641fc356c2a3e1f6
Debian Security Advisory 2785-1
Posted Oct 28, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2785-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2013-2906, CVE-2013-2907, CVE-2013-2908, CVE-2013-2909, CVE-2013-2910, CVE-2013-2911, CVE-2013-2912, CVE-2013-2913, CVE-2013-2915, CVE-2013-2916, CVE-2013-2917, CVE-2013-2918, CVE-2013-2919, CVE-2013-2920, CVE-2013-2921, CVE-2013-2922, CVE-2013-2923, CVE-2013-2924, CVE-2013-2925, CVE-2013-2926, CVE-2013-2927, CVE-2013-2928
SHA-256 | 48628ebb43be4560f718b05e27f8d8a4debb8f5353ec1e118afdb50298d992fd
Gentoo Linux Security Advisory 201310-16
Posted Oct 28, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-16 - Two buffer overflow vulnerabilities in TPTEST may allow remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 3.1.7-r2 are affected.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-0650, CVE-2009-0659
SHA-256 | 8ea7d93b3f09f11db13f0a5774d837544a744a76e8540d8d14e2145af3fda22c
vBulletin 4.1.x / 5.x.x Administrative User Injection
Posted Oct 28, 2013
Authored by Simo Ben Youssef

vBulletin versions 4.1.x and 5.x.x suffer from a remote unauthenticated administrative user injection vulnerability via upgrade.php.

tags | exploit, remote, php
SHA-256 | 56d71874ee918e0adb9b0501022ef1127c5fdefdaf17dc30ef3b50197d6283f7
SPRS 2014 Call For Papers
Posted Oct 28, 2013
Site engii.org

The 2014 Symposium on Protocols and Rules for Security has announced its call for papers. This conference will be held from March 10 to 12, 2014 in Suzhou, China.

tags | paper, protocol, conference
SHA-256 | ae2674aa6a192148552feb9c35953da68b726d96381f026b36b2ef17fe634087
VideoCharge Studio 2.12.3.685 Buffer Overflow
Posted Oct 27, 2013
Authored by metacom

VideoCharge Studio version 2.12.3.685 SEH buffer overflow exploit that pops calc.exe.

tags | exploit, overflow
SHA-256 | d27b5ed8cc328e282657f03687971424f237cd948b2fae44a499656a8a01baad
Horde Groupware Web Mail 5.1.2 Cross Site Request Forgery
Posted Oct 27, 2013
Authored by Marcela Benetrix

Horde Groupware Web Mail Edition version 5.1.2 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, web, vulnerability, csrf
advisories | CVE-2013-6275
SHA-256 | 8673f2fbe62fe700aec9d6ff06fc03cec542e451e35d65fa4c149331868f9a02
OWASP Bricks Dakatua Release
Posted Oct 27, 2013
Site owasp.org

Bricks is a web application security learning platform built on PHP and MySQL. The project focuses on variations of commonly seen application security issues. Each 'Brick' has some sort of security issue which can be leveraged manually or using automated software tools. The mission is to 'Break the Bricks' and thus learn the various aspects of web application security. Bricks is a completely free and open source project brought to you by OWASP.

Changes: This is the tenth public release of OWASP Bricks. This new release brings along a new challenge.
tags | tool, web, php
systems | unix
SHA-256 | 8648e3ada70089bf4824eb36d5ce9c49c02e9aeef87efb5ec36e8151fb8972dd
Backup File Finder For Recon-NG
Posted Oct 27, 2013
Authored by Jay Turla, LaNMaSteR53

Backup File Finder is a discovery module for Recon-NG that checks hosts for exposed backup files. The default configuration searches for wp-config.php files which contain WordPress database configuration information.

tags | tool, scanner, php
systems | unix
SHA-256 | e2a1b50ffde6e78f47fb1689941867580a665c3ad6ca97dc73fe66d832856946
WordPress Curvo Cross Site Request Forgery
Posted Oct 27, 2013
Authored by Byakuya

WordPress Curvo theme suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 5ff60ac7b29216353fb30ef419bb9de1554c55378b3babe5a55ed21ebf8be6ae
Interesting File Finder For Recon-NG
Posted Oct 26, 2013
Authored by Jay Turla, LaNMaSteR53, thrapt

Interesting File Finder is a discovery module for Recon-NG framework which checks hosts for interesting files in predictable locations.

tags | tool, scanner
systems | unix
SHA-256 | ba1e26712709fcad3a38f2e0d4785244718cd606547b70a24fcd141746e55868
PayPal Shipping Cross Site Scripting
Posted Oct 26, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

PayPal's Shipping web application suffers from cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 9c4d2cb0b351592d3d9a5e20ce9df32095fe904a95ba829525059c28eafad531
BalkanSys Default Credentials / Redirection / File Upload
Posted Oct 26, 2013
Authored by DevilScreaM

BalkanSys suffers from default credentials, arbitrary file upload, and open redirection vulnerabilities. Note that this advisory has site-specific information.

tags | exploit, arbitrary, vulnerability, bypass, file upload
SHA-256 | 8f26c405b63c9567a1ce3478b4d6d560ea287f16b230a9696b659a3b5169206f
WordPress MobileChief Cross Site Scripting
Posted Oct 26, 2013
Authored by Ashiyane Digital Security Team

WordPress MobileChief Mobile Site Builder plugin suffers from a cross site scripting vulnerability. Note that this advisory has site-specific information.

tags | exploit, xss
SHA-256 | 82f649c8ad747842d6c10048a9dbcba503dcaf02a4f6bd9cfa8a8017df2d094c
Page 3 of 16
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close