Debian Linux Security Advisory 2270-1 - It was discovered that incorrect sanitising of virtio queue commands in KVM, a solution for full virtualization on x86 hardware, could lead to denial of service of the execution of arbitrary code.
802e2cb84ab1889489e86adbd8819bfe197e3899c94bfbb8dc0db40b933c5069
Debian Linux Security Advisory 2269-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey.
0e5343abc1896f7a308f56fd04001172045bc0e7f0ffe2d0e664fd3a2504db18
Debian Linux Security Advisory 2266-2 - The update for CVE-2010-2531 for the old stabledistribution (lenny) introduced a regression, which lead to additional output being written to stdout.
f8f9215e818490fc2f7ebd9064ee594fd02d03d6a1ed09e7ff12fa39b629cd00
Debian Linux Security Advisory 2268-1 - Several vulnerabilities have been found in Iceweasel, a web browser based on Firefox.
fdb142688bfe19e8679d683ddce476c6dcb23df5edca080537dca630652d30e5
WiRouter KeyRec is a powerful and platform independent piece of software that recovers the default WPA passphrases of the supported router's models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley).
09ef1cf9ac1825043c169a5375e7f31dd1281c73a484011f2dc149e4cecf2b63
Debian Linux Security Advisory 2267-1 - It was discovered that Perl's Safe module - a module to compile and execute code in restricted compartments - could by bypassed.
30313cbed8cc072a130fd81441ea473bc7bad5c55b0c1f6271ced419a05f78c3
Zero Day Initiative Advisory 11-232 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the iNOdeMngChecker.exe component which listens by default on TCP port 9090. When handling the 0x0A0BF007 packet type the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
184ebe743fd4791fc52acadd3af12220395cac9680704076be939466bc65cdae
OpenSSH version 3.4p1 remote root exploit for FreeBSD.
784ac2c808aee05f8e7a89a108734acf1284cde95b4a09f41ebde5b82c0728af
Whitepaper called Pentesting in Local Networks Part 1. It discusses performing recon, ARP poisoning, traffic analysis techniques, and more.
61bd8550d6d7da3a35747d2f5abbe23c40f3b034a054bb63345a6aab75a7e160
Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.
92e2a17dd09e58939f6c299a0c0d7af3c7d2b257ecb922c85bd13e875faf5835
This archive contains all of the 206 exploits added to Packet Storm in June, 2011.
00240cc4f79ebd969896553f5151da9048faa9fa5fcc0c80c12b31a30b63a202
NetBSD version 5.1 libc/net suffers from multiple buffer overflow vulnerabilities.
41dc13e14f5bb04dc98558705af4a4ffaa1774d45a59d6fb6682a19250cf3d47
Winamp versions 5.61 and below suffer from multiple heap overflows and corruption and an integer overflow. Proof of concept code included.
23df304bc95256e399de1584a4c2057c6c417d43ffde347c35effa2a74e84e08
Shanghai Freemen suffers from a remote SQL injection vulnerability.
74ab932735f95b279a6152d1f592ec74c731cf4e56a914e12b8c2369d48b9341
The Joomla Mdigg component suffers from a remote SQL injection vulnerability.
11c2fca33c5ba1d0acdf243cbad202cfaac19f62a980db2ba24d643c156aa88d
DomainShopScript suffers from a persistent cross site scripting vulnerability.
78fdf5dd6314e782d9bc20e026c2a3fdb8743e92972e740f1b846d80f1543c6b
The Ollance login script suffers from cross site scripting and remote SQL injection vulnerabilities. The SQL injection vulnerability allows for authentication bypass.
189f6acb4ed8469141230d67ce3202accf44636ad83a5a5c17c6e1a843dfc9f5
Ashampoo 3D CAD Professional version 3.0.1 suffers from an insecure method vulnerability.
8a1349f1a272f4679fe1272c1710a1de10a3496369c90b59b41bfd07080086c3
WordPress versions 3.1.3 and 3.2-RC1 suffers from multiple remote SQL injection vulnerabilities.
0a7900515451e312b78d781e902fcb08e0d2c379668d6c7b467866395e99972e
The Apple Developer site suffered from open redirect, cross site scripting, and http response splitting vulnerabilities.
b29d8484d309dd75a2e3e792db03ef437624b98406e3757be16dee53f7a81233
Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Rational DOORS Web Access, where two have an unknown impact and one can be exploited by malicious people to conduct cross-site scripting attacks.
a0dcc55f60b764c0d5c5a557a2320077b834466c7d8952d669108e24bac9e984
Secunia Security Advisory - A vulnerability has been reported in HP Intelligent Management Center products, which can be exploited by malicious people to compromise a vulnerable system.
b0fc3489c292d94583a04845839bbeab070c30017be5874b51887b7aefa8c534
Secunia Security Advisory - Justin Klein Keane has discovered two vulnerabilities in AeroMail, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.
d563fb2f8a31b8a45bd08f8377e93a8fad1028d28e219ad698233075ccbee59b
Secunia Security Advisory - A vulnerability has been reported in libvirt, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
ab860fa2c23d45b88a34710a6da76335ed849c1db0bf7c37a003094622c6d4af
Secunia Security Advisory - Fedora has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
35ebc350ffafee7efccbb4813f57b6880f6561cd71975c3f7df0a6c103dd9435