what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 2007-12-04

snort-2.8.0.1.tar.gz
Posted Dec 4, 2007
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Various new additions and modifications.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 4fa74fdbfe677362b0fef226026e7f110d7de856baaad21b5fe3ebd0f627b112
Ubuntu Security Notice 551-1
Posted Dec 4, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 551-1 - Thomas Sesselmann discovered that the OpenLDAP slapd server did not properly handle certain modify requests. A remote attacker could send malicious modify requests to the server and cause a denial of service. Toby Blake discovered that slapd did not properly terminate an array while running as a proxy-caching server. A remote attacker may be able to send crafted search requests to the server and cause a denial of service. This issue only affects Ubuntu 7.04 and 7.10.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2007-5707, CVE-2007-5708
SHA-256 | d77193488d3e81250b1087fc995f46a172b56f6fe7501029020c1bff97cc061c
Ubuntu Security Notice 550-1
Posted Dec 4, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 550-1 - Peter Valchev discovered that Cairo did not correctly decode PNG image data. By tricking a user or automated system into processing a specially crafted PNG with Cairo, a remote attacker could execute arbitrary code with user privileges.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-5503
SHA-256 | 8d3dcdef1feac2d1123b15e889bc4deba2b7a8eba999fb59ae42b1f89b89d79c
Ubuntu Security Notice 549-2
Posted Dec 4, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 549-2 - USN-549-1 fixed vulnerabilities in PHP. However, some upstream changes were incomplete, which caused crashes in certain situations with Ubuntu 7.10.

tags | advisory, php, vulnerability
systems | linux, ubuntu
advisories | CVE-2007-1285, CVE-2007-2872, CVE-2007-3799, CVE-2007-3998, CVE-2007-4657, CVE-2007-4658, CVE-2007-4660, CVE-2007-4661, CVE-2007-4662, CVE-2007-4670, CVE-2007-5898, CVE-2007-5899
SHA-256 | 9a0a4a1d82e27e9d74bb5eb17c3168dc8ab295a00a313b9b1b95a786a5cb345f
Mandriva Linux Security Advisory 2007.235
Posted Dec 4, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw in the Apache mod_proxy module was found that could potentially lead to a denial of service is using a threaded Multi-Processing Module. On sites where a reverse proxy is configured, a remote attacker could send a special reequest that would cause the Apache child process handling the request to crash. Likewise, a similar crash could occur on sites with a forward proxy configured if a user could be persuaded to visit a malicious site using the proxy. A flaw in the Apache mod_autoindex module was found. On sites where directory listings are used and the AddDefaultCharset directive was removed from the configuration, a cross-site-scripting attack could be possible against browsers that to not correctly derive the response character set according to the rules in RGC 2616.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2007-3847, CVE-2007-4465
SHA-256 | a286f0e12d6b1be5948457a239b88839ccd7dd6c3da4cc348c762f897cc7efab
Mandriva Linux Security Advisory 2007.234
Posted Dec 4, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Raphael Marichez discovered a denial of service bug in how vixie-cron verifies crontab file integrity. A local user with the ability to create a hardlink to /etc/crontab could prevent vixie-cron from executing certain system cron jobs.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2007-1856
SHA-256 | 40f307c8b1af6bb704be677d974674f23ae54f9b68d252214f9ac3eb3cb91df0
SYMSA-2007-014.txt
Posted Dec 4, 2007
Authored by Robert Brown, Nick Bennett | Site symantec.com

Symantec Vulnerability Research SYMSA-2007-014 - Beehive Forums versions 0.7.1 and below suffer from a SQL injection vulnerability.

tags | advisory, sql injection
advisories | CVE-2007-6014
SHA-256 | a9ce0d069bb6ef66e465717b48e1301ca974b1da01c77cc0ea32b75d359c00dc
mcafeeps-exec.txt
Posted Dec 4, 2007
Authored by DoZ | Site hackerscenter.com

McAfee SecurityCenter Privacy Service version 8.1.0.136 suffers from a script insertion vulnerability.

tags | advisory
SHA-256 | 2dad2c696d8f55b16c4255a857167be364bc90d1e0c94221ccb48dbfc0471731
ProCheckUp Security Advisory 2006.9
Posted Dec 4, 2007
Authored by Adrian Pastor, ProCheckUp, Richard Brain, Jan Fry | Site procheckup.com

By performing an advanced search, unauthenticated users can enumerate valid usernames with a single HTTP request on the BEA Plumtree Portal.

tags | advisory, web
SHA-256 | 776de6dc499e6ebfc575f8b19a3ac66c6953bcc956cb6a8b5c59f0a43584290a
ProCheckUp Security Advisory 2006.8
Posted Dec 4, 2007
Authored by Adrian Pastor, ProCheckUp, Jan Fry | Site procheckup.com

BEA Plumtree Portal is vulnerable to a internal hostname disclosure vulnerability.

tags | advisory
SHA-256 | 866b56dd83ba8330356f8847ee9d66d1be2f67a4336cc14f44ee0a485a6a593a
firefox-inherit.txt
Posted Dec 4, 2007
Authored by Paul Szabo | Site maths.usyd.edu.au

Firefox version 2.0.0.10 appears to inherit the charset of a parent page.

tags | advisory
SHA-256 | 724418cd6fb332b578ca7acd25889fd7dc4e96ce25b54811cc3f66a60a0db7d2
lotfian-sqlxss.txt
Posted Dec 4, 2007
Authored by The-0utl4w | Site aria-security.net

Lotfian Brochure is susceptible to cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 50a0c6fe118fea3458140762e9beb445dbb2fa75bc14286ff11982fb00d312b8
snitz-sql.txt
Posted Dec 4, 2007
Site bugreport.ir

Snitz Forums 2000 suffers from a remote SQL injection vulnerability in Active.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 7268062b76339d9053e70065f6628eb3367e276150211eb3819bfdb6cddc7b22
phpbbgarage-sql.txt
Posted Dec 4, 2007
Authored by maku234

phpBB Garage version 1.2.0 Beta 3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9454b4c38d6b411c55effe36dd0e7072c2327ca560853e6b22691d5e727c2096
Secunia Security Advisory 26801
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ryan NA has reported some security issues in Ascential DataStage, which can be exploited by malicious, local users to disclose sensitive information and to manipulate certain data, and by malicious users to disclose sensitive information.

tags | advisory, local
SHA-256 | 7baae7db817c9523429294b41000f0d1d4af8603778049d82b13d5a015709357
Secunia Security Advisory 27839
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for nss_ldap. This fixes a security issue, which can be exploited by malicious people to manipulate certain data.

tags | advisory
SHA-256 | 1e4216b12c95060a72ce250578111747fb203a2d321ae3e3bce8fdf563ca83a5
Secunia Security Advisory 27874
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in CRM-CTT, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | c60de70fd91b8e4e9853fd304f373f4b41afbef4b53c0e01a1967163d8245032
Secunia Security Advisory 27876
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ShAy6oOoN has reported a vulnerability in p.mapper, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.

tags | advisory
SHA-256 | 24b35ff8c571744f76da924448305962f0f665fce7517dfd4f318ffb45078c9b
Secunia Security Advisory 27877
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Solaris 10, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
SHA-256 | f4ae2868f3777ef509215a0266668e952c1f4c1f21880dba9e20b3f927b66e91
Secunia Security Advisory 27878
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in VLC Media Player, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 4fae08d4f8f84f9fd106126574a5902473459a5765845fbf413ba20493cf783c
Secunia Security Advisory 27891
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cacti. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
systems | linux, debian
SHA-256 | fac299f4d6e4882bc1e7d95ea6c8bbb4580e00d0a60b1732f9f7bd85eade0a75
Secunia Security Advisory 27892
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
systems | linux, debian
SHA-256 | 0bcb52c617fc7627256da51708d19325ec11e111e311df6dd9028041117bb928
Secunia Security Advisory 27896
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for rsync. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, slackware
SHA-256 | 67684eb896df9d458c3201212ae8b3a27643391d3cd5e088811c90ac786a5996
Secunia Security Advisory 27897
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Claws Mail, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 105d99f94fa220ffe4d8fe8fb73dade6490c6c73f5f95989cb5e00e895fb6e6f
Secunia Security Advisory 27899
Posted Dec 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Zsh, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | bce97f885ff3c6401ecbcb92d9374a14ecb32df9c6dc2a096e4f4e8cc4f2969d
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close