what you don't know can hurt you
Showing 1 - 25 of 48 RSS Feed

Files Date: 2007-10-03

Secunia Security Advisory 26951
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in CenterTools DriveLock, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | c231c13e7094685a5115f845ef0c86b7
cb075-rfi.txt
Posted Oct 3, 2007
Authored by Mehrad Ansari Targhi

Content Builder version 0.7.5 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 6fd751122fa2148c8a5ca5528923a221
drbguestbook-xss.txt
Posted Oct 3, 2007
Authored by Gokhan

DRBGuestbook suffers from a remote cross site scripting vulnerability.

tags | exploit, remote, xss
MD5 | a25cfbcf1d62f219c2293e06017d106a
Secunia Security Advisory 27047
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for xen. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions or gain escalated privileges.

tags | advisory, local, vulnerability
systems | linux, redhat
MD5 | ca4cd3bf7d499634067b0374f2f864dd
iDEFENSE Security Advisory 2007-10-02.2
Posted Oct 3, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.02.07 - Local exploitation of an integer signedness error in Sun Microsystem's Solaris could allow attackers to disclose sensitive information from memory. iDefense has confirmed the existence of this vulnerability in Solaris 10 on x86 and SPARC. It is suspected that earlier versions are also affected.

tags | advisory, x86, local
systems | solaris
MD5 | 9404e9c2ad59fb451666c20c0f9a20c7
prelude-manager-0.9.10.tar.gz
Posted Oct 3, 2007
Site prelude.sourceforge.net

Prelude Manager is the main program of the Prelude Hybrid IDS suite. It is able to register local or remote sensors, let the operator configure them remotely, receive alerts, and store alerts in a database or any format supported by reporting plugins, thus providing centralized logging and analysis.

Changes: Multiple enhancements. Various bug fixes concerning plugin instance un-subscribtion.
tags | tool, remote, local, intrusion detection
systems | unix
MD5 | 7f164d7ec6ffbfc6ab065165ea39b6fd
Secunia Security Advisory 26994
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to gain escalated privileges.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, debian
MD5 | e7364b8395d8001064797e1ed50c1910
Secunia Security Advisory 27019
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | 843b46191394ea8ab9a05ffaa92ebcef
Secunia Security Advisory 27031
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | 9e5337c2739fc3a55fd7b939345bc46f
Secunia Security Advisory 27040
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the X.Org X11 X Font Server (XFS), which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
MD5 | 925842320878aa5e8d3b1679c626ea3c
Secunia Security Advisory 27050
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 0in has discovered a vulnerability in Poppawid, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.

tags | advisory
MD5 | 4c66edcf64efd168bef5c6809cfe4083
Secunia Security Advisory 27056
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Irrlicht, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 60a8b5de2fd5796884f5d5f3d1924d2c
Secunia Security Advisory 27059
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS and IR, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | a6ec955d3577da55ef2f2a0708cc967c
Debian Linux Security Advisory 1381-1
Posted Oct 3, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1381-1 - Several local vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, kernel, local, vulnerability
systems | linux, debian
advisories | CVE-2006-5755, CVE-2007-4133, CVE-2007-4573, CVE-2007-5093
MD5 | 7ca8366703ba07776dc56024c6076f42
Secunia Security Advisory 27003
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Arbor Networks Peakflow SP, which can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | c0e467538073b161647e77b67dff0865
Secunia Security Advisory 27029
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francesco Ongaro and Antonio Parata have discovered a vulnerability in Original Photo Gallery, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 529d68f05e050b521e7880292d182faf
Secunia Security Advisory 27043
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for nfs-utils-lib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 8f4a98327ab05c333eb3b0e4135f1152
Secunia Security Advisory 27049
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for quagga. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 7d766d8ba24dec69ded3d7c1e5926669
Secunia Security Advisory 27060
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in XFree86, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
MD5 | d6f9a9e515d5474bbb8c34eb078c23f2
Original Photo Gallery Remote Command Execution
Posted Oct 3, 2007
Authored by Francesco Ongaro, Antonio Parata | Site ush.it

Original Photo Gallery versions 0.11.2 and below suffer from a remote command execution vulnerability.

tags | exploit, remote
MD5 | d8de2d84d9e87e2e7b7cad36e23374c2
Debian Linux Security Advisory 1380-1
Posted Oct 3, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1380-1 - Kalle Olavi Niemitalo discovered that elinks, an advanced text-mode WWW browser, sent HTTP POST data in cleartext when using an HTTPS proxy server potentially allowing private information to be disclosed.

tags | advisory, web
systems | linux, debian
advisories | CVE-2007-5034
MD5 | 69cd282fc888fb0462f9333dbb97be6c
iDEFENSE Security Advisory 2007-10-02.1
Posted Oct 3, 2007
Authored by iDefense Labs, Sean Larsson | Site idefense.com

iDefense Security Advisory 10.02.07 - Remote exploitation of a multiple vulnerabilities in X.Org Foundation's X Font Server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code. iDefense has confirmed the existence of these vulnerabilities in XFS version X11R7.2-1.0.4. Previous versions may also be affected.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2007-4568
MD5 | 0532b9913a377b17570bf93248afe912
TPTI-07-17.txt
Posted Oct 3, 2007
Authored by Aaron Portnoy | Site tippingpoint.com

Vulnerabilities allow a remote attacker to inject arbitrary SQL into the backend database on vulnerable installations of CA BrightStor Hierarchical Storage Manager. Authentication is not required to exploit these vulnerabilities. The specific flaws exist in the CsAgent service that listens by default on TCP port 2000. An opcode parsing switch statement multiplexes data funneling across various vulnerable routines. At least 7 out of the available 68 opcodes are vulnerable to SQL injections.

tags | advisory, remote, arbitrary, tcp, vulnerability, sql injection
advisories | CVE-2007-5084
MD5 | 9840fb7ea9adf38d8b25253227e70943
TPTI-07-016.txt
Posted Oct 3, 2007
Authored by Aaron Portnoy | Site tippingpoint.com

Vulnerabilities allow a remote attacker to execute arbitrary code on vulnerable installations of Computer Associates' BrightStor Hierarchical Storage Manager. Authentication is not required to exploit these vulnerabilities. The specific flaws exist in the CsAgent service that listens by default on TCP port 2000. An opcode parsing switch statement multiplexes data funneling across various vulnerable routines. A user-supplied DWORD size value is assumed by the vulnerable agent to contain the correct length of the subsequent data and is passed directly to memory allocation routines. At least 26 out of the available 68 opcodes are vulnerable to various overflows that allow for remote code execution due to insecure data copy operations.

tags | advisory, remote, overflow, arbitrary, tcp, vulnerability, code execution
advisories | CVE-2007-5082
MD5 | b45214555ac98338dbf353986bcee9d2
Secunia Security Advisory 27017
Posted Oct 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in EDraw Office Viewer Component, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 5c5762ea1fbba242d900042d537e106a
Page 1 of 2
Back12Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close