exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2008-05-07

Dradis Information Sharing Tool 1.2
Posted May 7, 2008
Authored by etd | Site dradis.nomejortu.com

dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.

tags | web
SHA-256 | 2851229d6d96c3f46c369880a065f21a90bc2f811297c7114f9152e9648c7f1d
frs-lfi.txt
Posted May 7, 2008
Authored by Matrix86

The PHP-Fusion module Forum Rank System version 6 suffers from a local file inclusion vulnerability.

tags | exploit, local, php, file inclusion
SHA-256 | 04f76e5ed4a0b2c4528a2f8ed6e2df819f5da6eed04dde13409bfe77d7270540
Ubuntu Security Notice 610-1
Posted May 7, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 610-1 - Christian Herzog discovered that it was possible to connect to any LTSP client's X session over the network. A remote attacker could eavesdrop on X events, read window contents, and record keystrokes, possibly gaining access to private information.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2008-1293
SHA-256 | cb3abaade449396b06a92dfa2c942915a1d0de11c5182e0be4bee6bc0db93776
Ubuntu Security Notice 609-1
Posted May 7, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 609-1 - It was discovered that arbitrary Java methods were not filtered out when opening databases in OpenOffice.org. If a user were tricked into running a specially crafted query, a remote attacker could execute arbitrary Java with user privileges. Multiple memory overflow flaws were discovered in OpenOffice.org's handling of Quattro Pro, EMF, and OLE files. If a user were tricked into opening a specially crafted document, a remote attacker might be able to execute arbitrary code with user privileges.

tags | advisory, java, remote, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-4575, CVE-2007-5745, CVE-2007-5746, CVE-2007-5747, CVE-2008-0320
SHA-256 | c38f3f985ebc83c65928bb7d71bee2febda5aa6a848aa40aaf78da2c6ea8c16a
adobe-print-v2.txt
Posted May 7, 2008
Authored by cocoruder | Site ruder.cdut.net

A design error vulnerability exists in Adobe Reader and Adobe Acrobat Professional. A remote attacker who successfully exploit this vulnerability can control the printer without user's permission. Affected software versions include Adobe Reader 8.1.1 and below and Adobe Acrobat Professional 8.1.1 and below. This is an updated advisory.

tags | advisory, remote
advisories | CVE-2008-0655
SHA-256 | 2cbd1fa58213bb05a1302dcd79477d4bf94dbb3a84581019cd11a86426875dff
aap-bypass.txt
Posted May 7, 2008
Authored by cocoruder | Site ruder.cdut.net

Two critical vulnerabilities exist in the javascript API of Adobe Acrobat Professional 7. A remote attacker who successfully exploits these vulnerabilities can execute restricted functions and arbitrary codes on the affected system. Adobe Acrobat Professional version 7.0.9 is affected.

tags | advisory, remote, arbitrary, javascript, vulnerability, bypass
advisories | CVE-2008-2042
SHA-256 | 2439aa2322600b477cca7a6d1e36624932b620e1d197bf4f3031537110a4ef00
Mandriva Linux Security Advisory 2008-098
Posted May 7, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in OpenSSH 4.4 through 4.8 allowed local attackers to bypass intended security restrictions enabling them to execute commands other than those specified by the ForceCommand directive, provided they are able to modify to ~/.ssh/rc.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2008-1657
SHA-256 | 84e9dfc8aed7759a50f77add5c93f3cf1bd57556eacec2e7409d16bc4092ac4b
Mandriva Linux Security Advisory 2008-097
Posted May 7, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in start_kdeinit in KDE 3.5.5 through 3.5.9 where, if it was installed setuid root, it could allow local users to cause a denial of service or possibly execute arbitrary code. By default, start_kdeinit is not installed setuid root on Mandriva Linux, however updated packages have been patched to correct this issue.

tags | advisory, denial of service, arbitrary, local, root
systems | linux, mandriva
advisories | CVE-2008-1671
SHA-256 | 90328bccffe3f3110bfdc3dc25d2e176105bd89c61a4d863d2c8ea4513d4ec86
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close