exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2008-04-02

Ubuntu Security Notice 597-1
Posted Apr 2, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 597-1 - Timo Juhani Lindfors discovered that the OpenSSH client, when port forwarding was requested, would listen on any available address family. A local attacker could exploit this flaw on systems with IPv6 enabled to hijack connections, including X11 forwards.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2008-1483
SHA-256 | a538419d13e0a2c12e6e316531afe52f9d30f7e21c02b96fe33093daae43e69b
Gentoo Linux Security Advisory 200804-1
Posted Apr 2, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200804-01 - Multiple vulnerabilities have been discovered in CUPS, allowing for the remote execution of arbitrary code and a Denial of Service. Versions less than 1.2.12-r7 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2008-0047, CVE-2008-0053, CVE-2008-0882, CVE-2008-1373
SHA-256 | b3a1d6290a902ca1f3a0f7c2852b2f0b06dc67e5eff8404f7fe618e8e9d1e99a
realplayer_console.rb.txt
Posted Apr 2, 2008
Authored by Elazar Broad

This Metasploit module exploits a heap corruption vulnerability in the RealPlayer ActiveX control. By sending a specially crafted string to the 'Console' property in the rmoc3260.dll control, an attacker may be able to execute arbitrary code.

tags | exploit, arbitrary, activex
advisories | CVE-2008-1309
SHA-256 | fe18e54c7136e0f4ddd02005a5baa3b152573f829ae72ec39f0b69c9755ba6b6
realplayer-activexexec.txt
Posted Apr 2, 2008
Authored by Elazar Broad

Exploit for the heap corruption vulnerability in the RealPlayer ActiveX control. By sending a specially crafted string to the 'Console' property in the rmoc3260.dll control, an attacker may be able to execute arbitrary code.

tags | exploit, arbitrary, activex
advisories | CVE-2008-1309
SHA-256 | 9c9470fc73ec08b731d851e037405e4cdd3056a7576b171fc5620b4f9224c9bb
AKLINK-SA-2008-004.txt
Posted Apr 2, 2008
Authored by Alexander Klink | Site cynops.de

Microsoft Office 2007 has a design flaw that allows outbound HTTP requests to be made when a document is opened that has a digital signature.

tags | advisory, web
SHA-256 | b4cb7f3e817924351a210a026c7bec9e430863cef89fb05b4f7fa6540b4f7384
AKLINK-SA-2008-003.txt
Posted Apr 2, 2008
Authored by Alexander Klink | Site cynops.de

Windows Live Mail has a design flaw that allows outbound HTTP requests to be made via a simple preview of a mail that is S/MIME-signed.

tags | advisory, web
systems | windows
SHA-256 | 4d5511e520d30bf9ecbbdb40513e02a8b285c8a0a0062c017da8916a99f7afc5
AKLINK-SA-2008-002.txt
Posted Apr 2, 2008
Authored by Alexander Klink | Site cynops.de

Microsoft Outlook has a design flaw that allows outbound HTTP requests to be made via a simple preview of a mail that is S/MIME-signed.

tags | advisory, web
SHA-256 | 1ff267973798cd8447b986b796dd166b737f9cbfe9fb69d0bef95485ff36340a
Debian Linux Security Advisory 1533-2
Posted Apr 2, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1533-2 - Christian Schmid and Meder Kydyraliev (Google Security) discovered a number of vulnerabilities in exiftags, a utility for extracting EXIF metadata from JPEG images. This update merely adds the packages for Debian 3.1 sarge (oldstable) which were missing in the previous DSA.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2007-6354, CVE-2007-6355, CVE-2007-6356
SHA-256 | f216ca24b3ab1a9a05efec5902aaf2dec3394ff764813985896d78e9f8d0d7ae
eggblog40-sql.txt
Posted Apr 2, 2008
Authored by __GiReX__ | Site girex.altervista.org

eggBlog version 4.0 password retrieval remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 8485c6faa016e0c0d44936fffc083acb9979267a7b07956ed2d8136d077897de
cevado-sql.txt
Posted Apr 2, 2008
Authored by Joseph Giron

Cevado Technologies Real Estate CMS suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 2785ebab9a04e12edf4d635d02193d884fb0ced1eb614d0903f4e90c5d57c671
mamboahsshop-sql.txt
Posted Apr 2, 2008
Authored by S@BUN | Site hackturkiye.com

The Mambo ahsShop component versions 1.51 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d07c93df29f5beed7bcabe9d3a2fb574fee3f37f6e42a1a401d69194ba2a06eb
terracotta-lfidownload.txt
Posted Apr 2, 2008
Authored by Joseph Giron

Terracotta CMS is vulnerable to local file inclusion and arbitrary download vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, file inclusion
SHA-256 | 914b9f65afebce60b79e96c44ac74a28824c6daf97392b4445e3621ed26701e7
faphoto-sql.txt
Posted Apr 2, 2008
Authored by IRCRASH | Site ircrash.com

FaScript FaPhoto version 1 suffers from a SQL injection vulnerability in show.php.

tags | exploit, php, sql injection
SHA-256 | 591695377e3e1223ed7caae7f162935176fea762153980bbf93bf5c1baf6c339
Debian Linux Security Advisory 1536-1
Posted Apr 2, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1536-1 - Several local vulnerabilities have been discovered in Xine, a media player library, allowed for a denial of service or arbitrary code execution, which could be exploited through viewing malicious content.

tags | advisory, denial of service, arbitrary, local, vulnerability, code execution
systems | linux, debian
advisories | CVE-2007-1246, CVE-2007-1387, CVE-2008-0073, CVE-2008-0486, CVE-2008-1161
SHA-256 | fab16d0e5e9613a38e131a5540e6b1deca18ee6d6d803c2faf22cc0f1e8ea324
easynews-sqlxsslfi.txt
Posted Apr 2, 2008
Authored by IRCRASH | Site ircrash.com

EasyNews version 40tr remote SQL injection exploit that also documents cross site scripting and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | 3366fd10169e6cb1b38097b04ea61a44f0debc2df161d732e1607e08125a5979
Secunia Security Advisory 29324
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in LANDesk Management Suite, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | e6b8af9bcbc98061dae1389319558df2551cd96349f528944f70713f65ff93bc
Secunia Security Advisory 29519
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Phorum, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 9753f55f87b60f76d7197bd2e73a401e61823d312ae9ca029c7fb34784075094
Secunia Security Advisory 29549
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Macrovision InstallShield, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | b04ed31dff49ae2a42268735d2369a925d77c501dd74aca3311092bc16f7d076
Secunia Security Advisory 29568
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in GnuPG, which can potentially be exploited to compromise a vulnerable system.

tags | advisory
SHA-256 | 28c3f4ada7ae732b319dd39c13c17550dd255508e9362311c94e39a893f01aef
Secunia Security Advisory 29575
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sympa, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 0ab40ceeaa25f570b77348e4bda1520d7fd9eed1f251108593ba2dbbaebaa850
Secunia Security Advisory 29581
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in Chilkat HTTP ActiveX Component, which can be exploited by malicious people to overwrite arbitrary files.

tags | advisory, web, arbitrary, activex
SHA-256 | 901f6a2f67ea08beab1ac705424d6539dc3dd76800e38f73753c191f9ef7ae50
Secunia Security Advisory 29589
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dr. Crash has discovered two vulnerabilities in Sava's Link Manager, which can be exploited by malicious people to disclose sensitive information and to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 4e53a59c21ebc1441ebd0cfabbb2c50922bdc76590bc64e89abd3d780ad9f1cc
Secunia Security Advisory 29592
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dr. Crash has discovered a vulnerability in Sava's GuestBook, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | e2fc8ff155a2feec659a3b846abeda04963639735bde88a51482cc73dbf31ddc
Secunia Security Advisory 29601
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xine-lib. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | fc81be9c8d76230a961583d027978a1d88edc0c0f73fea3dfa32e5b359ab6a69
Secunia Security Advisory 29608
Posted Apr 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BL4CK has reported a vulnerability in the WP-Download plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2aa7f74e11ce329d87161d641cf32437e79966429478a2a2e4d61536963ef724
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close