exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2008-04-05

Secunia Security Advisory 29607
Posted Apr 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, redhat
SHA-256 | ba9978c6dd36270b7bb749cf4cfc39b45e461e3b59b5e5c4167fb73e7b549cfa
Debian Linux Security Advisory 1539-1
Posted Apr 5, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1539-1 - Chris Schmidt and Daniel Morissette discovered two vulnerabilities in mapserver, a development environment for spatial and mapping applications. Lack of input sanitizing and output escaping in the CGI mapserver's template handling and error reporting routines leads to cross-site scripting vulnerabilities. Missing bounds checking in mapserver's template handling leads to a stack-based buffer overrun vulnerability, allowing a remote attacker to execute arbitrary code with the privileges of the CGI or httpd user.

tags | advisory, remote, overflow, arbitrary, cgi, vulnerability, xss
systems | linux, debian
advisories | CVE-2007-4542, CVE-2007-4629
SHA-256 | 4e03e1d418c78d4f766449d62f4f3edfe4ee522c8a3346892eadea4de97ee86d
Debian Linux Security Advisory 1538-1
Posted Apr 5, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1538-1 - Erik Sjolund discovered a buffer overflow vulnerability in the Ogg Vorbis input plugin of the alsaplayer audio playback application. Successful exploitation of this vulnerability through the opening of a maliciously-crafted Vorbis file could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-5301
SHA-256 | 6f3b7b5c07f055fae27675663af4a6564e2b826e468e5fba31f6304d7692567a
CAarc-multi.txt
Posted Apr 5, 2008
Authored by Ken Williams | Site www3.ca.com

CA Security Advisory - CA ARCserve Backup for Laptops and Desktops Server contains multiple vulnerabilities that can allow a remote attacker to execute arbitrary code or cause a denial of service condition. CA has issued updates to address the vulnerabilities. The first issue occurs due to insufficient bounds checking on command arguments by the LGServer service. The second issue occurs due to insufficient verification of file uploads by the NetBackup service. In most cases, an attacker can potentially gain complete control of an affected installation. Additionally, only a server installation of BrightStor ARCserve Backup for Laptops and Desktops is affected. The client installation is not affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability, file upload
advisories | CVE-2008-1328, CVE-2008-1329
SHA-256 | 465613d80f35d24daf2fd29de5df3e3834e3533ddc03f34fa29343c01188d0fe
CAalert-multi.txt
Posted Apr 5, 2008
Authored by Ken Williams | Site www3.ca.com

CA Security Advisory - CA Alert Notification Server service contains multiple vulnerabilities that can allow a remote authenticated attacker to execute arbitrary code or cause a denial of service condition. CA has issued updates to address the vulnerabilities. The vulnerabilities are due to insufficient bounds checking in multiple procedures. A remote authenticated attacker or local user can exploit a buffer overflow to execute arbitrary code or cause a denial of service.

tags | advisory, remote, denial of service, overflow, arbitrary, local, vulnerability
advisories | CVE-2007-4620
SHA-256 | 87c606935857a14dd69d4559e0de12e92406b71e84be5dad04da16eda476df5d
HP Security Bulletin 2008-00.32
Posted Apr 5, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with two types of optional HP USB Floppy Drive Keys intended for use with certain ProLiant servers. This vulnerability could cause a local 'W32.Fakerecy' or 'W32.SillyFDC' virus infection.

tags | advisory, local, virus
advisories | CVE-2008-0708
SHA-256 | d91bf5de69ed7863bd3a53d32f7430f4ded5bd0537a568bea144b3bc0dd5cbe1
NDSA20080215.txt
Posted Apr 5, 2008
Authored by Tim Brown | Site nth-dimension.org.uk

Nth Dimension Security Advisory (NDSA20080215) - The Festival server is vulnerable to unauthenticated remote code execution. Further research indicates that this vulnerability has already been reported as a local privilege escalation against both the Gentoo and SuSE GNU/Linux distributions. The remote form of this vulnerability was identified in 1.96~beta-5 as distributed in Debian unstable but it is also believed that Ubuntu Hardy Heron was affected.

tags | advisory, remote, local, code execution
systems | linux, suse, debian, gentoo, ubuntu
SHA-256 | 679be8c3c5c41b4fce67f2ff8f104fcb7afbc9d058857614bb4a84ab75341837
Page 1 of 1
Back1Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close