exploit the possibilities
Showing 1 - 25 of 46 RSS Feed

Files Date: 2008-04-03

Ubuntu Security Notice 598-1
Posted Apr 3, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 598-1 - It was discovered that the CUPS administration interface contained a heap- based overflow flaw. A local attacker, and a remote attacker if printer sharing is enabled, could send a malicious request and possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. It was discovered that the hpgl filter in CUPS did not properly validate its input when parsing parameters. If a crafted HP-GL/2 file were printed, an attacker could possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. It was discovered that CUPS had a flaw in its managing of remote shared printers via IPP. A remote attacker could send a crafted UDP packet and cause a denial of service or possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. It was discovered that CUPS did not properly perform bounds checking in its GIF decoding routines. If a crafted GIF file were printed, an attacker could possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile.

tags | advisory, remote, denial of service, overflow, arbitrary, local, root, udp
systems | linux, ubuntu
advisories | CVE-2008-1373, CVE-2008-0047, CVE-2008-0053, CVE-2008-0882
MD5 | 3d4ed2daa34bf5032ac967c51449a280
Ubuntu Security Notice 588-2
Posted Apr 3, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 588-2 - USN-588-1 fixed vulnerabilities in MySQL. In fixing CVE-2007-2692 for Ubuntu 6.06, additional improvements were made to make privilege checks more restrictive. As a result, an upstream bug was exposed which could cause operations on tables or views in a different database to fail. This update fixes the problem.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2007-2692, CVE-2006-7232, CVE-2007-6303, CVE-2008-0226, CVE-2008-0227
MD5 | 0e465a8d84fe8c332aef57d16bde0de9
Gentoo Linux Security Advisory 200804-2
Posted Apr 3, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200804-02 - The Oulu University discovered that bzip2 does not properly check offsets provided by the bzip2 file, leading to a buffer overread. Versions less than 1.0.5 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2008-1372
MD5 | 58f950dfe94adb27c139a0a3b6c6b84b
Mandriva Linux Security Advisory 2008-081
Posted Apr 3, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A heap-based buffer overflow in CUPS 1.2.x and later was discovered by regenrecht of VeriSign iDenfense that could allow a remote attacker to execute arbitrary code via a crafted CGI search expression. A validation error in the Hp-GL/2 filter was also discovered. Finally, a vulnerability in how CUPS handled GIF files was found by Tomas Hoger of Red Hat, similar to previous issues corrected in PHP, gd, tk, netpbm, and SDL_image.

tags | advisory, remote, overflow, arbitrary, cgi, php
systems | linux, redhat, mandriva
advisories | CVE-2008-0053, CVE-2008-0047, CVE-2008-1373
MD5 | 528584dba9753b6b54087d3eff95e9bd
silk-1.0.0.tar.gz
Posted Apr 3, 2008
Authored by CERT | Site tools.netsa.cert.org

SiLK (System for Internet-Level Knowledge) consists of two sets of tools: a packing system and an analysis suite. The packing system receives Netflow V5 PDUs and converts them into a more space efficient format, recording the packed records into service-specific binary flat files. The analysis suite consists of tools that can read these flat files and then perform various query operations, ranging from per-record filtering to statistical analysis of groups of records. The analysis tools interoperate using pipes, allowing a user to develop a relatively sophisticated query from a simple beginning.

tags | tool
systems | unix
MD5 | 77498d53d396c4040ac23cfdb71dc6cf
phpblock-rfi.txt
Posted Apr 3, 2008
Authored by w0cker

PHP Block version a8.4 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, php, code execution, file inclusion
MD5 | 8e82891cc1477319c2350f3cd4cf8fbe
dazphp-lfi.txt
Posted Apr 3, 2008
Authored by w0cker

DaZPHP version 0.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | e1803f3838026c722d9fcdbceea7210e
joomlaonline-rfi.txt
Posted Apr 3, 2008
Authored by NoGe

The Joomla OnlineFlashQuiz component versions 1.0.2 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 8129004104734211efe0c0b63061e18f
landesk-traverse.txt
Posted Apr 3, 2008
Authored by Luigi Auriemma | Site aluigi.org

LANDesk Management Suite versions 8.80.1.1 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 49ae26af7308c703bb6ce82ee7fbf4a1
httpry-0.1.3.tar.gz
Posted Apr 3, 2008
Authored by Dumpster Keeper | Site dumpsterventures.com

httpry is a specialized packet sniffer designed for displaying and logging HTTP traffic. It is not intended to perform analysis itself, but instead to capture, parse, and log the traffic for later analysis. It can be run in real-time displaying the live traffic on the wire, or as a daemon process that logs to an output file. It is written to be as lightweight and flexible as possible, so that it can be easily adaptable to different applications. It does not display the raw HTTP data transferred, but instead focuses on parsing and displaying the request/response line along with associated header fields.

tags | tool, web, sniffer
MD5 | 3d91e672272054e0bebd9ef9bab38a50
joomlaactualite-sql.txt
Posted Apr 3, 2008
Authored by Stack-Terrorist | Site v4-team.com

The Joomla actualite component version 1.0 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | bb8ae49b79129bd82fc354e46e71b468
AKLINK-SA-2008-005.txt
Posted Apr 3, 2008
Authored by Alexander Klink | Site cynops.de

Apache-SSL versions prior to apache_1.3.41+ssl_1.59 suffer from a memory disclosure vulnerability that may allow for privilege escalation.

tags | advisory
advisories | CVE-2008-0555
MD5 | 2878008d9e266abac14534bd7ec467fe
noticeware-dos.txt
Posted Apr 3, 2008
Authored by Ray

Noticeware Email Server version 4.6.1.0 remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 1b8630df0556f6009f901d2e97e7926c
writersblock-sql.txt
Posted Apr 3, 2008
Authored by katharsis | Site katharsis.x2.to

Writer's Block suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
MD5 | c0b2f03a27991dfcdc31fb0128e1c4f7
chilkathttp-overwrite.txt
Posted Apr 3, 2008
Authored by shinnai | Site shinnai.altervista.org

ChilkatHttp ActiveX version 2.3 arbitrary file overwrite exploit.

tags | exploit, arbitrary, activex
MD5 | b56e9fe28ef25abeec14fb7d0a2f5299
HP Security Bulletin 2008-00.6
Posted Apr 3, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified in PostgreSQL versions 8.2.4 and earlier running on HP Internet Express for Tru64 UNIX. The vulnerabilities could be exploited to execute arbitrary code, elevation of privilege, or cause a Denial of Service (DoS).

tags | advisory, denial of service, arbitrary, vulnerability
systems | unix
advisories | CVE-2007-3278, CVE-2007-4769, CVE-2007-4772, CVE-2007-6067, CVE-2007-6600, CVE-2007-6601
MD5 | 6dd7bac8e9064b173aa9ca45a9fdc5fa
HP Security Bulletin 2008-00.26
Posted Apr 3, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP Select Identity software. The vulnerabilities could be exploited by an authenticated user to gain unauthorized access to other user accounts.

tags | advisory, vulnerability
advisories | CVE-2008-0709
MD5 | e80411e7253ce945ff5e2ca6230942bd
runcms11a-sql.txt
Posted Apr 3, 2008
Authored by DreamTurk

The RunCMS module bamagalerie3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6e5c018427deb7e6627dd7c4fedca562
nk_exploit.txt
Posted Apr 3, 2008
Authored by real

Nuked-Klan versions 1.7.6 and below exploit that allows for remote upload, remote code execution, and administrative hash retrieval.

tags | exploit, remote, code execution
MD5 | 83651cfd29b02f8bece5d3518ff2aa37
hpopenviewnnm-overflow.txt
Posted Apr 3, 2008
Authored by Mati Aharoni | Site offensive-security.com

HP OpenView NNM version 7.5.1 pre-authentication SEH overflow exploit that takes advantage of OVAS.EXE and spawns a shell on port 4444.

tags | exploit, overflow, shell
MD5 | 3eae11d7acd7cdca356f704875bd6c2e
nipper-0.11.5.zip
Posted Apr 3, 2008
Authored by Ian Ventura-Whiting | Site nipper.titania.co.uk

nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing. This is the Windows version.

Changes: This release includes updates to the report output from Nipper, some minor PQR issues and resolves issues reported by the community.
systems | cisco, windows, juniper
MD5 | d01cd5cccaf3095dc5c098ea17ee1cab
nipper-0.11.5.tgz
Posted Apr 3, 2008
Authored by Ian Ventura-Whiting | Site nipper.titania.co.uk

nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing. This is the source version.

Changes: This release includes updates to the report output from Nipper, some minor PQR issues and resolves issues reported by the community.
systems | cisco, juniper
MD5 | e9d2cb237ef775e63b955fe7a17693f7
xnview1921-overflow.txt
Posted Apr 3, 2008
Authored by haluznik

XnView version 1.92.1 Slideshow "FontName" buffer overflow exploit.

tags | exploit, overflow
MD5 | 3cb227e79fab39b3043c5a7cbf2cdd58
novell-dos.txt
Posted Apr 3, 2008
Authored by Mati Aharoni | Site offensive-security.com

Novell eDirectory HTTP denial of service exploit.

tags | exploit, web, denial of service
MD5 | 9c37ace4e6b14e8dfa4b4ffc66ef225c
mcafeeepo-dos.txt
Posted Apr 3, 2008
Authored by Mati Aharoni | Site offensive-security.com

McAfee EPO version 4.0 remote denial of service exploit that takes advantage of FrameworkService.exe.

tags | exploit, remote, denial of service
MD5 | 5c1d7d39d857615c33087959f87bfaac
Page 1 of 2
Back12Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close