exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2014-02-10 to 2014-02-11

Gentoo Linux Security Advisory 201402-09
Posted Feb 10, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-9 - A buffer overflow in Apache mod_fcgid might allow remote attackers to execute arbitrary code or cause a Denial of Service condition. Versions less than 2.3.9 are affected.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2013-4365
SHA-256 | 35695061e8356a815e05b17659d3f0ef2c15bde8d31916f0edb15fc200e0f871
Ubuntu Security Notice USN-2102-1
Posted Feb 10, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2102-1 - Christian Holler, Terrence Cole, Jesse Ruderman, Gary Kwong, Eric Rescorla, Jonathan Kew, Dan Gohman, Ryan VanderMeulen, Carsten Book, Andrew Sutherland, Byron Campen, Nicholas Nethercote, Paul Adenot, David Baron, Julian Seward and Sotaro Ikeda discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-1478, CVE-2014-1479, CVE-2014-1480, CVE-2014-1482, CVE-2014-1483, CVE-2014-1485, CVE-2014-1486, CVE-2014-1487, CVE-2014-1489, CVE-2014-1488, CVE-2014-1481, CVE-2014-1477, CVE-2014-1478, CVE-2014-1479, CVE-2014-1480, CVE-2014-1481, CVE-2014-1482, CVE-2014-1483, CVE-2014-1485, CVE-2014-1486, CVE-2014-1487, CVE-2014-1488, CVE-2014-1489, CVE-2014-1490, CVE-2014-1491
SHA-256 | 0112eed2fceaf13b2542d6600afaeb7f15912d2d310028a88473ed6d7bf8838e
Ubuntu Security Notice USN-2101-1
Posted Feb 10, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2101-1 - Yves Younan and Ryan Pentney discovered that libgadu incorrectly handled certain Gadu-Gadu HTTP messages. A malicious remote server or a man in the middle could use this issue to cause applications using libgadu to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, web, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-6487
SHA-256 | cbae030e0cbd358622c8b4a851571baadde15615378dddd36d471e7a3b2da79c
Red Hat Security Advisory 2014-0151-01
Posted Feb 10, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0151-01 - The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. Wget provides various useful features, such as the ability to work in the background while the user is logged out, recursive retrieval of directories, file name wildcard matching or updating files in dependency on file timestamp comparison. It was discovered that wget used a file name provided by the server when saving a downloaded file. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client.

tags | advisory, web, arbitrary, protocol
systems | linux, redhat
advisories | CVE-2010-2252
SHA-256 | 717dbc82ea79c91d9538b6f147db7b2dd6acd325272744b0caa4401f82b731ca
Red Hat Security Advisory 2014-0149-01
Posted Feb 10, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0149-01 - Red Hat Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, remote management and monitoring of multiple Linux deployments with a single, centralized tool. gc is a Boehm-Demers-Weiser conservative garbage collector for C and C++. It was discovered that gc's implementation of the malloc() and calloc() routines did not properly perform parameter sanitization when allocating memory. If an application using gc did not implement application-level validity checks for the malloc() and calloc() routines, a remote attacker could provide specially crafted application-specific input, which, when processed by the application, could lead to an application crash or, potentially, arbitrary code execution with the privileges of the user running the application.

tags | advisory, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2012-2673
SHA-256 | ab1869eb40905173521dfa2bc8d078041565cdaee5692e209da56b9fa3326e69
Red Hat Security Advisory 2014-0148-01
Posted Feb 10, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0148-01 - Red Hat Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, remote management and monitoring of multiple Linux deployments with a single, centralized tool. A cross-site scripting flaw was found in the way the Red Hat Satellite web interface performed sanitization of notes for registered systems. A remote authenticated Red Hat Satellite user could create a malicious note that, when viewed by a victim, could execute arbitrary web script with the privileges of the user viewing that note. Multiple cross-site scripting flaws were found in the Red Hat Satellite web interface. A remote attacker could provide a specially crafted link that, when visited by an authenticated Red Hat Satellite user, would lead to arbitrary web script execution in the context of the user's web interface session.

tags | advisory, remote, web, arbitrary, xss
systems | linux, redhat
advisories | CVE-2012-6149, CVE-2013-1869, CVE-2013-1871, CVE-2013-4415
SHA-256 | abe07ba4ba9dde3cf539102b9d388b950c61ff87c6feb5a80ba002ac5fdb7438
Red Hat Security Advisory 2014-0150-01
Posted Feb 10, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0150-01 - Red Hat Satellite Proxy provides a package-caching mechanism that reduces the bandwidth requirements for Red Hat Satellite and enables custom package deployment. Red Hat Satellite Proxy customers are able to cache RPM packages, such as are provided by Errata Updates from Red Hat, or custom RPM packages generated by their organization, on an internal, centrally-located server. gc is a Boehm-Demers-Weiser conservative garbage collector for C and C++. It was discovered that gc's implementation of the malloc() and calloc() routines did not properly perform parameter sanitization when allocating memory. If an application using gc did not implement application-level validity checks for the malloc() and calloc() routines, a remote attacker could provide specially crafted application-specific input, which, when processed by the application, could lead to an application crash or, potentially, arbitrary code execution with the privileges of the user running the application.

tags | advisory, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2012-2673
SHA-256 | 669c9c9c11aecff1cc8081c8a4033c22fd3a1f755e68e73dbf6986a6047a5bbb
Debian Security Advisory 2859-1
Posted Feb 10, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2859-1 - Multiple vulnerabilities have been discovered in Pidgin, a multi-protocol instant messaging client.

tags | advisory, vulnerability, protocol
systems | linux, debian
advisories | CVE-2013-6477, CVE-2013-6478, CVE-2013-6479, CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484, CVE-2013-6485, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490, CVE-2014-0020
SHA-256 | 9971f9da94a4936515401222fcd0875e78d7f966b207bff95b9b9cc49e110436
Debian Security Advisory 2858-1
Posted Feb 10, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2858-1 - Multiple security issues have been found in Iceweasel, Debian's version use-after-frees, too-verbose error messages and missing permission checks may lead to the execution of arbitrary code, the bypass of security checks or information disclosure. This update also addresses security issues in the bundled version of the NSS crypto library.

tags | advisory, arbitrary, cryptography, info disclosure
systems | linux, debian
advisories | CVE-2014-1477, CVE-2014-1479, CVE-2014-1481, CVE-2014-1482, CVE-2014-1486, CVE-2014-1487, CVE-2014-1490, CVE-2014-1491
SHA-256 | 3a4bb06a518cf1e26337e7a1c86410d103df0d9d3d8f00585f44f06686d82ab2
Gentoo Linux Security Advisory 201402-14
Posted Feb 10, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-14 - Two vulnerabilities in International Components for Unicode might allow remote attackers to cause a Denial of Service condition. Versions less than 51.2-r1 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2013-0900, CVE-2013-2924
SHA-256 | 744ac5103f42dbff6136ccb34fcb61afdf4ff62a63a6ae0a3489d8696932193e
Slackware Security Advisory - mozilla-thunderbird Updates
Posted Feb 10, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 70f0b6dd7ac5cf7f435787ca2e82de4d26cfaaca6e485a12641a0aa2d1871656
Slackware Security Advisory - seamonkey Updates
Posted Feb 10, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 98e14b573c879bdaf39b4d5b93a02c259a3d0ee1ae46baa642f0b4143efeb269
Slackware Security Advisory - mozilla-firefox Updates
Posted Feb 10, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 4c8b3ced9ee75df995e66bf273dc2b0f93c62d6474d16e8123bd6f45f2456a3e
Debian Security Advisory 2857-1
Posted Feb 10, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2857-1 - It was discovered by the Spring development team that the fix for the XML External Entity (XXE) Injection (CVE-2013-4152) in the Spring Framework was incomplete.

tags | advisory, xxe
systems | linux, debian
advisories | CVE-2013-6429, CVE-2013-6430
SHA-256 | 9c12097cfb875c61fce6e20b552e7f5f7b025cc8d7ef5982a220e834a33b1796
Debian Security Advisory 2856-1
Posted Feb 10, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2856-1 - It was discovered that the Apache Commons FileUpload package for Java could enter an infinite loop while processing a multipart request with a crafted Content-Type, resulting in a denial-of-service condition.

tags | advisory, java
systems | linux, debian
advisories | CVE-2014-0050
SHA-256 | 508b610d2ad42fb81e138ded4b4c75e63ceab3efaa85a14f2cfa933a2d6d1e37
Gentoo Linux Security Advisory 201402-13
Posted Feb 10, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-13 - A vulnerability in DjVu could result in execution of arbitrary code or Denial of Service. Versions less than 3.5.25.3 are affected.

tags | advisory, denial of service, arbitrary
systems | linux, gentoo
advisories | CVE-2012-6535
SHA-256 | 2c35d3bf0c65f314abdf03236087f2b339f6695448e8f2099e1dea49db3eb703
Gentoo Linux Security Advisory 201402-12
Posted Feb 10, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-12 - PAM S/Key does not clear provided credentials from memory, allowing local attackers to gain access to cleartext credentials. Versions less than 1.1.5-r5 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2013-4285
SHA-256 | 7c0afc3a057f6e07098668827c45a403660f800b01683098d071b6e2121d91ad
Gentoo Linux Security Advisory 201402-11
Posted Feb 10, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-11 - An integer overflow in Links might allow remote attackers to cause a Denial of Service condition. Versions less than 2.8-r1 are affected.

tags | advisory, remote, denial of service, overflow
systems | linux, gentoo
advisories | CVE-2013-6050
SHA-256 | e0f16f1d992ca273db9270b00d7cdff513aa3ff9bd251376d452fd5d87096bad
Gentoo Linux Security Advisory 201402-10
Posted Feb 10, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-10 - An insecure temporary file usage has been reported in PulseAudio, possibly allowing symlink attacks. Versions less than 0.9.22 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2009-1299
SHA-256 | 72bb7817cd424b00898ccbf1acab0cbd8a27f3dcc7bdef81ade11ba12d1cb151
Radio-Frequency Identification Exploitation
Posted Feb 10, 2014
Authored by RIVAL

The aim of this paper is to discuss the principles behind Passive Radio-Frequency Identification and the principles behind the exploitation, as well as the practical methods that can be used to exploit RFID.

tags | paper
SHA-256 | 12cc83d3d665a140a5d70e47c3e2c7768fa96a49ecb277e63ccd09fc9a1adfe5
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close