exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 342 RSS Feed

Files Date: 2013-11-01 to 2013-11-30

Red Hat Security Advisory 2013-1701-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1701-02 - The sudo utility allows system administrators to give certain users the ability to run commands as root. A flaw was found in the way sudo handled time stamp files. An attacker able to run code as a local user and with the ability to control the system clock could possibly gain additional privileges by running commands that the victim user was allowed to run via sudo, without knowing the victim's password. It was found that sudo did not properly validate the controlling terminal device when the tty_tickets option was enabled in the /etc/sudoers file. An attacker able to run code as a local user could possibly gain additional privileges by running commands that the victim user was allowed to run via sudo, without knowing the victim's password.

tags | advisory, local, root
systems | linux, redhat
advisories | CVE-2013-1775, CVE-2013-2776, CVE-2013-2777
SHA-256 | a123845b4cafb94e8438b79697c175656bdf7428c4a06099ba6aeacc46222972
Red Hat Security Advisory 2013-1674-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1674-02 - The dracut packages include an event-driven initramfs generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. It was discovered that dracut created initramfs images as world readable. A local user could possibly use this flaw to obtain sensitive information from these files, such as iSCSI authentication passwords, encrypted root file system crypttab passwords, or other information. This issue was discovered by Peter Jones of the Red Hat Installer Team.

tags | advisory, kernel, local, root
systems | linux, redhat
advisories | CVE-2012-4453
SHA-256 | 2050dc942de5eb4ba44015cdee252caaddb26b1adb34a3e870c29d892372f276
Red Hat Security Advisory 2013-1635-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1635-02 - Pacemaker is a high-availability cluster resource manager with a powerful policy engine. A denial of service flaw was found in the way Pacemaker performed authentication and processing of remote connections in certain circumstances. When Pacemaker was configured to allow remote Cluster Information Base configuration or resource management, a remote attacker could use this flaw to cause Pacemaker to block indefinitely. Note: The default Pacemaker configuration in Red Hat Enterprise Linux 6 has the remote CIB management functionality disabled.

tags | advisory, remote, denial of service
systems | linux, redhat
advisories | CVE-2013-0281
SHA-256 | 9d102a1147e401127cf203cf2ab61a235c649652bde033359f95bd195461afde
Red Hat Security Advisory 2013-1620-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1620-02 - X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. A flaw was found in the way the X.org X11 server registered new hot plugged devices. If a local user switched to a different session and plugged in a new device, input from that device could become available in the previous session, possibly leading to information disclosure. This issue was found by David Airlie and Peter Hutterer of Red Hat.

tags | advisory, local, info disclosure
systems | linux, redhat
advisories | CVE-2013-1940
SHA-256 | d9b2327c50545970d9b73191ac1a524f85d7fbf297a2c977571a9de16d9ce5a3
Red Hat Security Advisory 2013-1605-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1605-02 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions. If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat, osx
advisories | CVE-2013-0242, CVE-2013-1914, CVE-2013-4332
SHA-256 | daf7b810ca339f4203738b3d995a41e50c8f3237d997d559ea32ef846fec988d
Red Hat Security Advisory 2013-1645-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1645-02 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's IPv6 implementation handled certain UDP packets when the UDP Fragmentation Offload feature was enabled. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, remote, kernel, udp
systems | linux, redhat
advisories | CVE-2012-6542, CVE-2012-6545, CVE-2013-0343, CVE-2013-1928, CVE-2013-1929, CVE-2013-2164, CVE-2013-2234, CVE-2013-2851, CVE-2013-2888, CVE-2013-2889, CVE-2013-2892, CVE-2013-3231, CVE-2013-4345, CVE-2013-4387, CVE-2013-4591, CVE-2013-4592
SHA-256 | 97d65ec407c60f5d7fb845675304c446d1888daf065dc7d8976e4e16c33033ab
Red Hat Security Advisory 2013-1652-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1652-02 - The coreutils package contains the core GNU utilities. It is a combination of the old GNU fileutils, sh-utils, and textutils packages. It was discovered that the sort, uniq, and join utilities did not properly restrict the use of the alloca() function. An attacker could use this flaw to crash those utilities by providing long input strings. These updated coreutils packages include numerous bug fixes and two enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical Notes, linked to in the References, for information on the most significant of these changes.

tags | advisory
systems | linux, redhat
advisories | CVE-2013-0221, CVE-2013-0222, CVE-2013-0223
SHA-256 | be0c34029a6c6c2bf5e62648c3f53350127f338719d8f83f05b8ad7a6aa7916d
Red Hat Security Advisory 2013-1603-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1603-02 - Luci is a web-based high availability administration application. A flaw was found in the way the luci service was initialized. If a system administrator started the luci service from a directory that was writable to by a local user, that user could use this flaw to execute arbitrary code as the root or luci user. A flaw was found in the way luci generated its configuration file. The file was created as world readable for a short period of time, allowing a local user to gain access to the authentication secrets stored in the configuration file.

tags | advisory, web, arbitrary, local, root
systems | linux, redhat
advisories | CVE-2013-4481, CVE-2013-4482
SHA-256 | 390b92c4abaa15b7e89a39f5215aff24625e8e3e48eef514bab0df512a2a6246
Red Hat Security Advisory 2013-1591-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1591-02 - OpenSSH is OpenBSD's Secure Shell protocol implementation. These packages include the core files necessary for the OpenSSH client and server. The default OpenSSH configuration made it easy for remote attackers to exhaust unauthorized connection slots and prevent other users from being able to log in to a system. This flaw has been addressed by enabling random early connection drops by setting MaxStartups to 10:30:100 by default. For more information, refer to the sshd_config man page. These updated openssh packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical Notes, linked to in the References, for information on the most significant of these changes.

tags | advisory, remote, shell, protocol
systems | linux, redhat, openbsd
advisories | CVE-2010-5107
SHA-256 | a4f28ff7392407cc2b25c64fb8ce70d6d9dd9cbe74095327d51804e531223977
Red Hat Security Advisory 2013-1536-02
Posted Nov 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1536-02 - Libguestfs is a library and set of tools for accessing and modifying guest disk images. It was found that guestfish, which enables shell scripting and command line access to libguestfs, insecurely created the temporary directory used to store the network socket when started in server mode. A local attacker could use this flaw to intercept and modify other user's guestfish command, allowing them to perform arbitrary guestfish actions with the privileges of a different user, or use this flaw to obtain authentication credentials.

tags | advisory, arbitrary, shell, local
systems | linux, redhat
advisories | CVE-2013-4419
SHA-256 | 2ea5dead0a2607a799545568508db440ef0819dada2e1fe26cb1ae151696e649
To Kill A Centrifuge
Posted Nov 21, 2013
Authored by Ralph Langner | Site langner.com

Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve.

tags | paper, worm
SHA-256 | 75e6d217f9ac0859aa9d4ad1ececb2d395e122d6a0d1fa7cb30fc9e81bc01da9
vBulletin vBSEO 3.2.0 / 3.6.0 Cross Site Scripting
Posted Nov 21, 2013
Authored by Yogesh Jaygadkar

vBulletin vBSEO plugin versions 3.2.0 and 3.6.0 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 27f00a8a77a7b71b23dd09a034cd72b1107c5ccb58c14b597b811c78a98ad496
Debian Security Advisory 2798-2
Posted Nov 21, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2798-2 - The update for curl in DSA-2798-1 uncovered a regression affecting the curl command line tool behaviour (#729965). This update disables host verification too when using the --insecure option.

tags | advisory
systems | linux, debian
advisories | CVE-2013-4545
SHA-256 | ce1a6610897ebeb0ecc8600b5d5a1134408350f1241fe3beff51b07c1ce9e564
Drupal 6.x / 7.x PRNG / XSS / Open Redirect
Posted Nov 21, 2013
Site drupal.org

Drupal Core versions 6.x and 7.x suffer from PRNG weaknesses, cross site scripting and open redirection vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 8b71c2acab67fed36a5047f2121643a2cc7ad3f1855e24a59cd60198f53221de
Gentoo Linux Security Advisory 201311-13
Posted Nov 20, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-13 - Multiple vulnerabilities have been found in OpenVPN, allowing remote attackers to read encrypted traffic. Versions less than 2.3.1 are affected.

tags | advisory, remote, vulnerability
systems | linux, gentoo
advisories | CVE-2009-3555, CVE-2013-2061
SHA-256 | d2f81af3f93b9da61e7132428ea1952938c2cc2f98696e6c78aa0f34389ff15f
Gentoo Linux Security Advisory 201311-12
Posted Nov 20, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-12 - A vulnerability in Open DC Hub could result in execution of arbitrary code. Versions less than 0.8.2 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2010-1147
SHA-256 | 0639f78feef4b7766dd42b74cd9299e430c37af7bff8fced8f131c7c33e533f8
Gentoo Linux Security Advisory 201311-11
Posted Nov 20, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-11 - A stack-based buffer overflow in CTorrent might allow a remote attacker to execute arbitrary code or cause a Denial of Service condition. Versions less than 3.3.2-r1 are affected.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2009-1759
SHA-256 | 737368af1259f8ff95a25fe794f06dd4030a9bc406f8acbd7d38c92617b20d93
Mandriva Linux Security Advisory 2013-270
Posted Nov 20, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-270 - Multiple security issues was identified and fixed in mozilla NSPR and NSS. Mozilla Network Security Services before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure. Integer overflow in Mozilla Network Security Services 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large size value. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2013-1739, CVE-2013-1741, CVE-2013-2566, CVE-2013-5605, CVE-2013-5606, CVE-2013-5607
SHA-256 | 89688cb44f72d5c0610b28222e48ec4e53e14de8388bf3ba17ef5960b2f31817
Mandriva Linux Security Advisory 2013-269
Posted Nov 20, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-269 - Multiple security issues was identified and fixed in mozilla NSPR, NSS, and firefox. Mozilla Network Security Services before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure. Integer overflow in Mozilla Network Security Services 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large size value. Various other issues have also been addressed.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2013-1739, CVE-2013-1741, CVE-2013-2566, CVE-2013-5605, CVE-2013-5606, CVE-2013-5607
SHA-256 | 5ff6af659aa173d788e6b24e0437553faf1a51ae5b75cb0fcc5088c05d600b14
Ubuntu Security Notice USN-2031-1
Posted Nov 20, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2031-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, potentially execute arbitrary code, or lead to information disclosure.

tags | advisory, denial of service, arbitrary, info disclosure
systems | linux, ubuntu
advisories | CVE-2013-2566, CVE-2013-5605, CVE-2013-5607, CVE-2013-1741, CVE-2013-2566, CVE-2013-5605, CVE-2013-5607
SHA-256 | 3684065bb99c7b7f886ea12ba63ebd3fae46ae85cf46667f49f7d182e3e6f644
Drupal Entity Reference 7.x Access Bypass
Posted Nov 20, 2013
Authored by Jakob Perry | Site drupal.org

Drupal Entity Reference third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 79ec26c04814cae95cfa614ef3c9cf049782c96bcc442b5a595e09eb5d56a74d
Drupal EU Cookie Compliance 7.x CSRF
Posted Nov 20, 2013
Authored by Lode Vanstechelman | Site drupal.org

Drupal EU Cookie Compliance third party module version 7.x suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
SHA-256 | c30c092d31ec22a4a89a6e7afd57a697d9bf85b456388e714e46ab976d71fbde
Drupal Organic Groups 7.x Access Bypass
Posted Nov 20, 2013
Authored by Jakob Perry, Richard Goodrow, Bruce Hoppe | Site drupal.org

Drupal Organic Groups third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 92946572ee7bab6bb347a2ad606428b2f2932f8a7baea52cf920cc0f1f180618
Drupal Invitation 7.x Access Bypass
Posted Nov 20, 2013
Authored by j1ndustry | Site drupal.org

Drupal Invitation third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 176d222c03bc1e9a7a15daf5f2ef794edc06ffc1f8f08ea0cb40c33dbcae33e5
Ruckus Wireless Zoneflex 2942 Authentication Bypass
Posted Nov 20, 2013
Authored by myexploit

Ruckus Wireless Zoneflex 2942 wireless access point suffers from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2013-5030
SHA-256 | a11949340cd5c013d3ac7d14a6262d36bf5f0d3c62b518117024442c4f69a79e
Page 5 of 14
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close