exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2006-08-29

Mandriva Linux Security Advisory 2006.155
Posted Aug 29, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-155 - Multiple buffer overflows in ImageMagick before 6.2.9 allow user-assisted attackers to execute arbitrary code via crafted XCF images. Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun bitmap images that trigger heap-based buffer overflows. An integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large bytes_per_pixel, columns, and rows values, which trigger a heap-based buffer overflow.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2006-3743, CVE-2006-3744, CVE-2006-4144
SHA-256 | 17ea48c30ae262993a867073c259c4ec7c7c700fdadae830130ae4309c554f4c
Gentoo Linux Security Advisory 200608-28
Posted Aug 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-28 - The sscanf() PHP function contains an array boundary error that can be exploited to dereference a null pointer. This can possibly allow the bypass of the safe mode protection by executing arbitrary code. Versions less than 5.1.4-r6 are affected.

tags | advisory, arbitrary, php
systems | linux, gentoo
SHA-256 | cccbe3afd18c7d863de2d5ac6ae3036834ad166c626106dba2a8fcf0470a4f0b
Gentoo Linux Security Advisory 200608-27
Posted Aug 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-27 - In November 2005, Zone-H Research reported a boundary error in the ktools library in the VGETSTRING() macro of kkstrtext.h, which may cause a buffer overflow via an overly long input string. Versions less than 3.4.0-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 0e764a0a471a253079be6c1c295bc8726abd6b28b81677211dba782958f13438
Gentoo Linux Security Advisory 200608-26
Posted Aug 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-26 - The following vulnerabilities have been discovered in Wireshark. Firstly, if the IPsec ESP parser is used it is susceptible to off-by-one errors, this parser is disabled by default; secondly, the SCSI dissector is vulnerable to an unspecified crash; and finally, the Q.2931 dissector of the SSCOP payload may use all the available memory if a port range is configured. By default, no port ranges are configured. Versions less than 0.99.3 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 0572c83b05e151adf70e50709ae881d02c15e77c2c8c3d9d1d7d1eee48bb4af5
ISR-ibm-eGatherer.tar.gz
Posted Aug 29, 2006
Authored by Francisco Amato | Site infobyte.com.ar

This Metasploit module exploits a code execution vulnerability in the IBM eGatherer ActiveX buffer overflow.

tags | exploit, overflow, code execution, activex
advisories | CVE-2006-4221
SHA-256 | 6280365f18cd390c0a7ec483822ae21f3d8ac6a2a269541e0bb334fa7e54938e
hlstatsXSS.txt
Posted Aug 29, 2006
Authored by kefka

HLStats version 1.34 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a63c979b78eb39b37d1ac30865f8a51828daf62b4e7c17f60122c5610af6fde8
Debian Linux Security Advisory 1160-1
Posted Aug 29, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1160-1 - Several security related problems have been discovered in Mozilla and derived products.

tags | advisory
systems | linux, debian
advisories | CVE-2006-2779, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810
SHA-256 | fc3a5dd2574ba1ca4a9b000ea22fd04724ecd0339c2252f98f22547fae94f2a1
Mandriva Linux Security Advisory 2006.154
Posted Aug 29, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-154 - The libXm library in LessTif versions 0.95.0 and earlier allows local users to gain privileges via the DEBUG_FILE environment variable, which is used to create world-writable files when libXm is run from a setuid program.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2006-4124
SHA-256 | fcd62e9b6c19b5611928bdffa7ac17685229cc986efaddb82685d7f16727d734
Mandriva Linux Security Advisory 2006.153
Posted Aug 29, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-153 - A stack-based buffer overflow in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code. A buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format record in which the length character is not a valid hexadecimal character.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2005-4807, CVE-2006-2362
SHA-256 | 20bae66b913b708c81f4d4d713ab9094b1a1cd129693db985f0f4ac8827cbe5c
SYMSA-2006-09.txt
Posted Aug 29, 2006
Authored by Oliver Karow | Site symantec.com

Symantec Security Advisory - A connection from a SAP-DB/MaxDB WebDBM Client to the DBM Server causes a buffer overflow when the given database name is too large. This can result in the execution of arbitrary code in the context of the database server. Affected version is SAP-DB/MaxDB 7.6.00.22.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-4305
SHA-256 | f252047e0f68c231dc50e1773e17de6610f34d7f5aae0c80053dedb4165a40e1
Secunia Security Advisory 21561
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in CJ Tag Board, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 6924ab6d73ba9dd6c89c24eb74e6243a40c3055aab513b8e2c640e3f87e5edd7
Secunia Security Advisory 21634
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 783321879be5b45c78347b04b695cc8497d1a26a4f636334b26f43b128aaa55b
Secunia Security Advisory 21635
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - kefka has discovered a vulnerability in HLstats, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 687b9d79c1c77f6f613aad496d23513b0ab51ee4bb0aa367322c5205398bc2de
Secunia Security Advisory 21640
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SHiKaA has discovered a vulnerability in Web3news, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 3a3c7eb00aa1a95b53d29d737a6a6480f62777d94cb39e59c700e1f296e99ad4
Secunia Security Advisory 21650
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in X.Org X11, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | bac94b94ec5ca17f8c9fd7a0c0f9fbee176a8aed50a76610d207f2fcd168a0ae
Secunia Security Advisory 21660
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for multiple packages. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | e62af66112419ca04e8e3dc917b7ed0b35f1b094b5fa1e16bd9cfbbe589e1a2a
Secunia Security Advisory 21666
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Joomla!, where some have unknown impacts, and others can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, vulnerability, xss
SHA-256 | c44b92173a5629dcecbf1b50d6368a156da88e04ee52312e6503a85bc497dae5
Secunia Security Advisory 21667
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PmWiki, which potentially can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 38e162f9657537d2eb5111909d68334a4a16acd55fa95dc9c72a54939e86586c
Gentoo Linux Security Advisory 200608-25
Posted Aug 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-25 - Several X.org libraries and X.org itself contain system calls to set*uid() functions, without checking their result. Versions less than 1.0.4-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 0fb6ec5822e6cf0f7283f1d55a1f1de970e1b02e44929d89b16878b20611977e
cce-interact220.txt
Posted Aug 29, 2006
Authored by CarcaBot | Site Hacking.CarcaBot.ro

Cce-interact versions 2.2.0 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 64c54a4ce4221171197c67e3fb2b5d266900f9b98b1211c866227e2f8326bee5
jetboxInclude.txt
Posted Aug 29, 2006
Authored by CarcaBot

The Jetbox CMS suffers from a remote file inclusion vulnerability in search_function.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 6194fc4de9afd269b8dad32041663e0e8feb4b284e7ccb759881b9706499b9dd
web3news095rfi.txt
Posted Aug 29, 2006
Authored by SHiKaA

Web3news versions 0.9.5 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 30694ec9bcd7ee250bee5a370fe22ffa79e67100d2a6309ef1a45cfae9f3470c
e107-GLOBALS-php.txt
Posted Aug 29, 2006
Authored by rgod | Site retrogod.altervista.org

e107 versions 0.75 and below GLOBALS[] overwrite/Zend_Hash_Del_Key_Or_Index remote command execution exploit.

tags | exploit, remote
SHA-256 | 2a2104f4d8276945c201078b7353259c08bc03ee77385661a195fda93688fe0c
NetplsRemote.c
Posted Aug 29, 2006
Authored by ub3r st4r

Microsoft Windows NetplsRemote() remote overflow exploit for the vulnerability noted in MS06-040.

tags | exploit, remote, overflow
systems | windows
SHA-256 | b68609221de0bde6b63d34073184270db1e426cba975e5a5f082db3b091f7128
VT-belva-dekay-final.pdf
Posted Aug 29, 2006
Authored by Kenneth F. Belva, Sam H. Dekay | Site ftusecurity.com

Whitepaper titled "Creating Business Through Virtual Trust: How to Gain and Sustain a Competitive Advantage Using Information Security".

tags | paper
SHA-256 | 61c4df4f6cd97bb1f07965a78034ff548b67189ecc2115b7f28bbf34efe4e5d2
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close