exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 47 RSS Feed

Files Date: 2011-07-27

Ubuntu Security Notice USN-1177-1
Posted Jul 27, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1177-1 - Andrew Griffiths discovered that QEMU did not correctly drop privileges when using the 'runas' argument. Under certain circumstances a local attacker could exploit this to escalate privileges.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2011-2527
SHA-256 | 2db2352dca97c03e93a4de8cf6727155b5bccf0dc86d6436fc53e270444efcdd
Zero Day Initiative Advisory 11-241
Posted Jul 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-241 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Webkit Library. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the NamedNodeMap::setAttributes method defined within the NamedNodeMap.cpp file distributed with WebKit. The code responsible for copying attributes between DOM nodes does not verify that a mutation may have occurred when an attribute's attributeChanged method is called. By crafting a page that deletes instances of that attribute when the above mentioned method is called the code within setAttributes can be made to operate on freed objects. An attacker can take advantage of this by spraying the heap in a way that will not result in null pointers being referenced. This can lead to arbitrary code execution under the context of the user running the browser.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-0254
SHA-256 | 0748db6d4ee6bfe2651ddbd36ffb116881c9658edb8f896d05ac0dd5e8b67fdb
Zero Day Initiative Advisory 11-240
Posted Jul 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-240 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library's support of SVG markers. When updating a marker, the application will duplicate the reference of an object without updating its reference count. When freeing this object, a use-after-free vulnerability can be made to occur. This can be leveraged by a remote attacker to execute code under the context of the user running the application.

tags | advisory, remote, arbitrary
systems | apple
advisories | CVE-2011-1453
SHA-256 | 9955e1a0118de7587b35cc2341eb06299e4d3ea9f28954c95c79d4b5a540588d
Stunnel SSL Wrapper 4.42b2
Posted Jul 27, 2011
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: This release fixes a Windows service crash of stunnel 4.40.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 21a2bf0337773fa1b7824e556bc80a5730e673c537c9392fd477199d866c6b99
SSLSniff 0.8
Posted Jul 27, 2011
Authored by moxie | Site thoughtcrime.org

This tool was originally written to demonstrate and exploit IE's vulnerability to a specific "basicConstraints" man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes. It is designed to MITM all SSL connections on a LAN and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that you provide.

Changes: Added an iOS fingerprinting mode. Added support for intermediary certificates in authority mode.
tags | encryption
systems | unix
SHA-256 | 50b4283a3e80fa4b4f3f684c4e76348aba8e257cbaa85e4f4cb7a4062cf091d5
Zero Day Initiative Advisory 11-239
Posted Jul 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-239 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library's implementation of a FrameOwner element. When building this tree, the application will create a duplicate reference of an element. By freeing the referenced element, a use-after-free condition can be made to occur which can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-0233
SHA-256 | 9a566a7f048a2f671ae362db0c36d2bb1dc429098ed33eb23dac590c45aba40a
Red Hat Security Advisory 2011-1100-01
Posted Jul 27, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1100-01 - The IcedTea-Web project provides a Java web browser plug-in and an implementation of Java Web Start, which is based on the Netx project. It also contains a configuration tool for managing deployment settings for the plug-in and Web Start implementations. A flaw was discovered in the JNLP implementation in IcedTea-Web. An unsigned Java Web Start application could use this flaw to manipulate the content of a Security Warning dialog box, to trick a user into granting the application unintended access permissions to local files.

tags | advisory, java, web, local
systems | linux, redhat
advisories | CVE-2011-2513, CVE-2011-2514
SHA-256 | 1aa0fc44e9203cd83f9e35c5f4c37ec5b68f33d5745644ea51197952cea44e7d
Mandriva Linux Security Advisory 2011-121
Posted Jul 27, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-121 - All current released versions of Samba are vulnerable to a cross-site request forgery in the Samba Web Administration Tool (SWAT). By tricking a user who is authenticated with SWAT into clicking a manipulated URL on a different web page, it is possible to manipulate SWAT. All current released versions of Samba are vulnerable to a cross-site scripting issue in the Samba Web Administration Tool (SWAT). On the Change Password field, it is possible to insert arbitrary content into the user field.

tags | advisory, web, arbitrary, xss, csrf
systems | linux, mandriva
advisories | CVE-2011-2522, CVE-2011-2694
SHA-256 | b75ce3ace75fea8d22a279188ef3184449337cf90f4fe3d331c11300c3a6a118
Samba Web Administration Tool Cross Site Request Forgery
Posted Jul 27, 2011
Authored by Narendra Shinde

SWAT (Samba Web Administration Tool) in Samba versions 3.0.x through 3.5.9 suffers from a cross site request forgery vulnerability.

tags | exploit, web, csrf
advisories | CVE-2011-2522
SHA-256 | d475476bb91d90ae8126882c28a969539769386b49ecf8a69ad974db8e791de9
Mandriva Linux Security Advisory 2011-120
Posted Jul 27, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-120 - Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, allows remote attackers to execute arbitrary code or cause a denial of service via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2011-0226
SHA-256 | c6327c04cc1f8a878340ba858f3e80a09236c75996f3bfb90d9d1f2b2d6c3bef
Red Hat Security Advisory 2011-1090-01
Posted Jul 27, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1090-01 - The rhev-hypervisor package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. A flaw was found that allowed napi_reuse_skb() to be called on VLAN packets. An attacker on the local network could trigger this flaw by sending specially-crafted packets to a target system, possibly causing a denial of service.

tags | advisory, denial of service, local
systems | linux, redhat
advisories | CVE-2011-1576
SHA-256 | 423b948c96708d1e061b86fbda73740a65a22df850c2554883aadb161b574ff5
MinaliC Webserver 2.0 Source Disclosure
Posted Jul 27, 2011
Authored by X-h4ck

MinaliC Webserver version 2.0 suffers from a remote source disclosure vulnerability. This is the same issue that was previously discovered in version 1.0.

tags | exploit, remote, info disclosure
SHA-256 | 4cd2e2d5f428953b64047a57af7e3483a0f17db0463847ae0b5095258ad1f9ae
Sagem 3304 Router PPPOE Password Retrieval
Posted Jul 27, 2011
Authored by Security Tracker

Sagem 3304 router PPPOE password retrieval shell script exploit that leverages quickconfname_ADSL.html being unprotected.

tags | exploit, shell
SHA-256 | 5f5818a853ad8493bddc99600f04261d0ba53e9df28b02a4a9f29df6634cbd9d
Chome Web Solutions SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

Chrome Web Solutions suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, web, vulnerability, sql injection
SHA-256 | ab546c65b6b94292215917956d607c8bc1fd250ded586cf97824fc168dd9f86d
Solutiontech SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

Solutiontech suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6f5ed1c861a9f59c2bfc6fe03beba6ac4e189893a32dc36ba51255b36309dd4a
Coherendz SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

Coherendz suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d58e53d49c747ba1cc78c2c148275dff2aefbb315980e5bd8b857eb3f5dc8199
iCube Lab SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

iCube Lab suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 03493aeb1f2f74d778e29a2b67832ff6b050ad49f395db691e9e033a9e3ff669
G2webCMS SQL Injection
Posted Jul 27, 2011
Authored by Ehsan_Hp200

G2webCMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 59746a12a14bae7f46fb81b37011ce2b45ecb7070d8287cbd937031e9d1440e4
Football CMS SQL Injection
Posted Jul 27, 2011
Authored by Amir-Magic

Football CMS suffers from a remote SQL injection vulnerability in view_table_lig.php.

tags | exploit, remote, php, sql injection
SHA-256 | c991bad7bd0fd1a8a3f00bf43db29ba0fd32f898d6baf82eeb6e91c9bb48c982
Imperva's Web Application Attack Report July 2011
Posted Jul 27, 2011
Authored by Imperva | Site imperva.com

As a part of its ongoing Hacker Intelligence Initiative, Imperva's Application Defense Center (ADC) observed and categorized attacks across 30 applications as well as onion router (TOR) traffic, monitoring more than 10 million individual attacks targeted at web applications over a period of six months. This report discusses and analyzes their findings.

tags | paper, web
SHA-256 | d8446dc2813a8f3f673ae8f51f4af9ade74f8848efa267da16853c3e1e98f85f
Secunia Security Advisory 45423
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for oprofile. This fixes a weakness, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | 1d7579d43a3490a65046f7913ec3b31995a7f50f355cdbebb461d3952f8f170f
Secunia Security Advisory 45366
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in GLPI, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | e49f48a6868ff46c9366d4d8ac553e8ce01f6bf543d47c9085f4c38c302525ac
Secunia Security Advisory 45391
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - OpenVZ has issued an update for the kernel. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and to potentially gain escalated privileges and by malicious, local users in a guest virtual machine and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
SHA-256 | 3ed48a9e8b08d7472bb628078372c541b60ca2a9bae503aefff36a6665fbf283
Secunia Security Advisory 45384
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libsndfile. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
systems | linux, ubuntu
SHA-256 | 8cbb81bf45d122007e2cf6f5a6b7f68e32e4cf5780b76463aa7b3e054aac6f14
Secunia Security Advisory 45421
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, ubuntu
SHA-256 | 68b7c98c9ad580fd045add831c990484d4a69246a21e77c2f7dae1cad5978743
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close