exploit the possibilities
Showing 1 - 25 of 76 RSS Feed

Files Date: 2008-06-11

Secunia Security Advisory 30594
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NASM, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 7cdf2f95a4f88d25ae1ea9c4d08bd397
Secunia Security Advisory 30616
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for Apache and Tomcat with PHP. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory, php
MD5 | 91c17328975536beb502474c822ab399
Secunia Security Advisory 30619
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks, and by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability, xss
MD5 | 43d444f9802b3cc578d2eea421e3f9e0
iDEFENSE Security Advisory 2008-06-11.5
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an information disclosure vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to gain access to sensitive information stored in server memory. The vulnerability exists when creating a Pixmap in the fbShmPutImage() function. The width and height of the Pixmap, which are controlled by the user, are not properly validated to ensure that the Pixmap they define are within the bounds of the shared memory segment. This allows an attacker to read arbitrary areas of memory in the X server process. iDefense has confirmed the existence of this vulnerability in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, arbitrary, local, info disclosure
advisories | CVE-2008-1379
MD5 | b97be81b56db7c21a2c2ce11144f8ca3
iDEFENSE Security Advisory 2008-06-11.4
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of multiple memory corruption vulnerabilities in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. iDefense has confirmed the existence of these vulnerabilities in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, arbitrary, local, root, vulnerability
advisories | CVE-2008-1377
MD5 | 84d5bbe99f8952f376797d89c1dba252
iDEFENSE Security Advisory 2008-06-11.3
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. iDefense has confirmed the existence of this vulnerability in X.org X11 version R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, overflow, arbitrary, local, root
advisories | CVE-2008-2362
MD5 | 6fcefa2590859e0359151b323865f5f4
iDEFENSE Security Advisory 2008-06-11.2
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to create a denial of service (DoS) condition on the affected X server. The vulnerability exists within the ProcRenderCreateCursor() function. When parsing a client request, values are taken from the request and used in an arithmetic operation that calculates the size of a dynamic buffer. This calculation can overflow, which results in an undersized buffer being allocated. This leads to an invalid memory access, which crashes the X server. iDefense has confirmed the existence of these this vulnerability in X.org X11 version R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, denial of service, overflow, local
advisories | CVE-2008-2361
MD5 | 1aac731a1df26bc92016e8603a765815
iDEFENSE Security Advisory 2008-06-11.1
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. The vulnerability exists within the AllocateGlyph() function, which is called from several request handlers in the render extension. This function takes several values from the request, and multiplies them together to calculate how much memory to allocate for a heap buffer. This calculation can overflow, which leads to a heap overflow. iDefense has confirmed the existence of this vulnerability in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, overflow, arbitrary, local, root
advisories | CVE-2008-2360
MD5 | 0c8278845aad04aaa0cbb9f6e4722696
syzygy-lfi.txt
Posted Jun 11, 2008
Authored by StAkeR

Syzygy CMS version 0.2.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 637b04f5de93c4be5e5428fc936a425e
Debian Linux Security Advisory 1594-1
Posted Jun 11, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1594-1 - Stefan Cornelius discovered two buffer overflows in Imlib's - a powerful image loading and rendering library - image loaders for PNM and XPM images, which may result in the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2008-2426
MD5 | 7d15ab47d571786396571179470ab37c
absolute-screwups.txt
Posted Jun 11, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Products from Xigla, such as Absolute Live Support XE, Absolute News Manager XE, Absolute Banner Manager XE, Absolute Form Processor XE, Absolute Image Gallery XE, Absolute Poll Manager XE, and Absolute Control Panel XE all suffer from cross site scripting and/or SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | fb473d5041512ed0fa54ebc65a409e01
Secunia Security Advisory 30514
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetScout Visualizer and InfiniStream, which can be exploited by malicious users to perform certain actions with escalated privileges.

tags | advisory
MD5 | 9b1fc44ff6976cc8cabf82c5b4d0ffb3
Secunia Security Advisory 30554
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM OS/400.

tags | advisory
MD5 | 19442464188f91d1032df834ca834427
Secunia Security Advisory 30593
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Todd Woolums ASP News Management, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection, asp
MD5 | e4b909ab90f323bcd0cfcd6fe7b2b4c1
Secunia Security Advisory 30611
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in net2ftp, which potentially can be exploited by malicious people to disclose sensitive information, delete certain files, and compromise a vulnerable system.

tags | advisory
MD5 | e7b5273246ce0b3bbf306a881f499d7d
DEFE-24-1925.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | 28db1e0000d08505bbde0c583b6afde6
DEFE-24-1924.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | 58edd7332dbeb3791be1736a14c2f41f
DEFE-24-1923.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | c8f042ff7ae96a7ce476f5d238a87fe8
DEFE-24-1922.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | 31a36329caa9413c5de901549b84c2d0
DEFE-31-175.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | 515610b000f933d10964668dd57a7174
DEFE-31-174.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | 37b498ac0694022547587650e268e372
DEFE-31-173.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | 6d15b813211bd0cb86fa2085ffe6cbbe
DEFE-31-172.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
MD5 | 82fb9180d532a8fab37882e42338ab30
xplico_phpgui-0.1_deft3x.tgz
Posted Jun 11, 2008
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

PHP GUI for the Xplico open source network forensic analysis tool.

tags | tool, php, forensics
MD5 | bdf7aa8d13d7a81ebd683b91b31be310
xplico-0.1_deft3x.tgz
Posted Jun 11, 2008
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc.

tags | tool, imap, forensics
MD5 | 7dcbccad6b164ebfcf8327aff97fd2ca
Page 1 of 4
Back1234Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close