what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2014-03-13

Synology DSM 4.3-3827 Blind SQL Injection
Posted Mar 13, 2014
Authored by wiz561

Synology DSM versions 4.3-3827 and below suffer from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bac3d28f8c2130affcf2e2e800679a6e686cb21f15e1617359000c1ec96d3327
Capstone 2.1.1
Posted Mar 13, 2014
Authored by Nguyen Anh Quynh | Site capstone-engine.org

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

Changes: This stable release fixes some bugs deep in the core. There is no update to any architectures or bindings, so bindings version 2.1 can still be used with this version 2.1.1 just fine. Fixed a crash and a buffer overflow.
tags | tool
systems | linux, unix
SHA-256 | 8af3c0a0f439d516277f308938935003d072f34a34fcf2e8dcf07dd415b1ca65
PowerArchiver Insecure PKZIP Encryption
Posted Mar 13, 2014
Authored by Hanno Boeck | Site hboeck.de

PowerArchiver version 14.02.03 creates files with an insecure encryption method even if the user selects a (secure) AES encryption in the GUI. If a user clicks on the "Encrypt Files" and selects "AES 256-bit" for encryption, the outcoming file will not be AES-encrypted. It will instead use the legacy PKZIP encryption, which uses a broken encryption algorithm.

tags | advisory
advisories | CVE-2014-2319
SHA-256 | a48e078a1bd32e704a5fbf11c4d4b61c8d037f81b323e1195c53539b587ab28b
Mandriva Linux Security Advisory 2014-055
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-055 - Owncloud versions 5.0.15 and 6.0.2 fix several unspecified security vulnerabilities, as well as many other bugs. See the upstream Changelog for more information.

tags | advisory, vulnerability
systems | linux, mandriva
SHA-256 | a9374eda146b1f80a69f3b2e5eb37ffa6b8eccdab53a92eeeb22ce221025494b
Mandriva Linux Security Advisory 2014-054
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-054 - An attacker could send a specially prepared HTML email to OTRS. If he can then trick an agent into following a special link to display this email, JavaScript code would be executed.

tags | advisory, javascript
systems | linux, mandriva
advisories | CVE-2014-1695
SHA-256 | f38f3c4f647137a682ee49e87b9dc2300c3024b6fee14b54fa964b479ebcf01d
Mandriva Linux Security Advisory 2014-053
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-053 - When using libssh before 0.6.3, a libssh-based server, when accepting a new connection, forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id to the PRNG state, which is not guaranteed to be unique. The most important consequence is that servers using EC or DSA certificates may under certain conditions leak their private key.

tags | advisory
systems | linux, mandriva
advisories | CVE-2014-0017
SHA-256 | e6dd6236b789502029d7c8ea18bc510ccd49917a0dfe6d3408d4f49046a1ed7f
Mandriva Linux Security Advisory 2014-052
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-052 - Remotely exploitable denial of service vulnerability in Net-SNMP, in the Linux implementation of the ICMP-MIB, making the SNMP agent vulnerable if it is making use of the ICMP-MIB table objects. Remotely exploitable denial of service vulnerability in Net-SNMP, in snmptrapd, due to how it handles trap requests with an empty community string when the perl handler is enabled.

tags | advisory, denial of service, perl
systems | linux, mandriva
advisories | CVE-2014-2284, CVE-2014-2285
SHA-256 | 5321b6a85466163f258effee601462d0d873c80a7e36fa1ba6faaf05959c81dc
Mandriva Linux Security Advisory 2014-051
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-051 - It was discovered that file before 5.17 contains a flaw in the handling of indirect magic rules in the libmagic library, which leads to an infinite recursion when trying to determine the file type of certain files. Additionally, other well-crafted files might result in long computation times and overlong results. A flaw was found in the way the file utility determined the type of Portable Executable format files, the executable format used on Windows. A malicious PE file could cause the file utility to crash or, potentially, execute arbitrary code. A memory leak in file has also been fixed. The affected packages have been upgraded to the 5.12 version and patched to correct these flaws.

tags | advisory, arbitrary, memory leak
systems | linux, windows, mandriva
advisories | CVE-2014-1943, CVE-2014-2270
SHA-256 | 279824ee2cc767c988c6f20272e49c97a4ed11a71b33721f4a621432894306b0
Debian Security Advisory 2878-1
Posted Mar 13, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2878-1 - Matthew Daley discovered multiple vulnerabilities in VirtualBox, a x86 virtualisation solution, resulting in denial of service, privilege escalation and an information leak.

tags | advisory, denial of service, x86, vulnerability
systems | linux, debian
advisories | CVE-2013-5892, CVE-2014-0404, CVE-2014-0406, CVE-2014-0407
SHA-256 | 3430eb38fed7806d02ed096d88cf8bfeb3d56c7df7fe56b8e7b402feeda30c40
Debian Security Advisory 2877-1
Posted Mar 13, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2877-1 - Several vulnerabilities were discovered in the lighttpd web server.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2014-2323, CVE-2014-2324
SHA-256 | 1b636c5aece6a80bb396c37c59b82d4c2b12f55fc71f7bada298470800c1290f
Ubuntu Security Notice USN-2146-1
Posted Mar 13, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2146-1 - Sebastien Macke discovered that Sudo incorrectly handled blacklisted environment variables when the env_reset option was disabled. A local attacker could use this issue to possibly run unintended commands by using blacklisted environment variables. In a default Ubuntu installation, the env_reset option is enabled by default. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. It was discovered that the Sudo init script set a date in the past on existing timestamp files instead of using epoch to invalidate them completely. A local attacker could possibly modify the system time to attempt to reuse timestamp files. This issue only applied to Ubuntu 12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2014-0106, CVE-2014-0106
SHA-256 | f4ae09f019fdd72e0cba6b61ad62ccd01c25da14dd2aa1176eb434bda38c0d1f
Mandriva Linux Security Advisory 2014-057
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-057 - MediaWiki user Michael M reported that the fix for CVE-2013-4568 allowed insertion of escaped CSS values which could pass the CSS validation checks, resulting in XSS. Chris from RationalWiki reported that SVG files could be uploaded that include external stylesheets, which could lead to XSS when an XSL was used to include JavaScript. During internal review, it was discovered that MediaWiki's SVG sanitization could be bypassed when the XML was considered invalid. During internal review, it was discovered that MediaWiki displayed some information about deleted pages in the log API, enhanced RecentChanges, and user watchlists. Netanel Rubin from Check Point discovered a remote code execution vulnerability in MediaWiki's thumbnail generation for DjVu files. Internal review also discovered similar logic in the PdfHandler extension, which could be exploited in a similar way. MediaWiki before 1.22.3 does not block unsafe namespaces, such as a W3C XHTML namespace, in uploaded SVG files. Some client software may use these namespaces in a way that results in XSS. This was fixed by disallowing uploading SVG files using non-whitelisted namespaces. MediaWiki before 1.22.3 performs token comparison that may be vulnerable to timing attacks. This was fixed by making token comparison use constant time. MediaWiki before 1.22.3 could allow an attacker to perform XSS attacks, due to flaw with link handling in api.php. This was fixed such that it won't find links in the middle of api.php links. MediaWiki has been updated to version 1.22.3, which fixes these issues, as well as several others. Also, the mediawiki-ldapauthentication and mediawiki-math extensions have been updated to newer versions that are compatible with MediaWiki 1.22. Additionally, the mediawiki-graphviz extension has been obsoleted, due to the fact that it is unmaintained upstream and is vulnerable to cross-site scripting attacks. Note: if you were using the instances feature in these packages to support multiple wiki instances, this feature has now been removed. You will need to maintain separate wiki instances manually.

tags | advisory, remote, php, javascript, code execution, xss
systems | linux, mandriva
advisories | CVE-2013-6451, CVE-2013-6452, CVE-2013-6453, CVE-2013-6472, CVE-2014-1610, CVE-2014-2242, CVE-2014-2243, CVE-2014-2244
SHA-256 | 69370204ce4cd8a16085a03afcffcb4b941504c2ffd0f56cd8dde6210167c57b
Mandriva Linux Security Advisory 2014-056
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-056 - It was discovered that the Apache Commons FileUpload package for Java could enter an infinite loop while processing a multipart request with a crafted Content-Type, resulting in a denial-of-service condition. Tomcat 7 includes an embedded copy of the Apache Commons FileUpload package, and was affected as well. Additionally a build problem with maven was discovered, fixed maven packages is also being provided with this advisory.

tags | advisory, java
systems | linux, mandriva
advisories | CVE-2014-0050
SHA-256 | 355d214aa8aa7d687ed7dadbfe5d8fe698ac7a539ac8ac55011a4244d38c3ae9
Ubee EVW3200 Cross Site Request Forgery
Posted Mar 13, 2014
Authored by Jeroen

Ubee EVW3200 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | e3991b705f4ec260d7e553d14ab17f4630fb8f2cd4dff010ca8fbebd4adcb8e9
Ubee EVW3200 Cross Site Scripting
Posted Mar 13, 2014
Authored by Jeroen

Ubee EVW3200 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9cd81f9687fbcf20d9e66b8a26971e454bf020fbfa8a43c4dc7eb473cd8e9b57
BSides Connecticut Call For Papers
Posted Mar 13, 2014
Site securitybsides.com

BSides Connecticut is soliciting talks for their event June 14th, 2014 in Hamden, CT, USA.

tags | paper, conference
SHA-256 | 8f06b1894f657311431a3d81466830f638e93704f48df4c6a3330c3ea945d337
QNX Neutrino RTOS 6.5.0 Privilege Escalation
Posted Mar 13, 2014
Authored by Tim Brown | Site nth-dimension.org.uk

QNX Neutrino RTOS version 6.5.0 suffers from multiple privilege escalation vulnerabilities.

tags | exploit, vulnerability
SHA-256 | e5e6ce35d1fa0f2a45836c06a404535d1ffccdb3b08407a60b96bf363dc0bd0a
Firefox Exec Shellcode From Privileged Javascript Shell
Posted Mar 13, 2014
Authored by joev | Site metasploit.com

This Metasploit module allows execution of native payloads from a privileged Firefox Javascript shell. It puts the specified payload into memory, adds the necessary protection flags, and calls it. Useful for upgrading a Firefox javascript shell to a Meterpreter session without touching the disk.

tags | exploit, shell, javascript
SHA-256 | 40ee936bfb600213287236e414efdc58ac1d496e3897d1cdc7107c2457f599b3
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close