exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 76 RSS Feed

Files Date: 2008-06-11

Secunia Security Advisory 30594
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NASM, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | b310d3d19728f2dbdd9029d56a0892dc80cd5992c51301a8c6ce8a391566f359
Secunia Security Advisory 30616
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for Apache and Tomcat with PHP. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory, php
SHA-256 | 314abde0fa0673049eb82fed146ccd89bb0af4e0586fc71e5c02580406e5890c
Secunia Security Advisory 30619
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks, and by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 974f174d5905da48b34d650d2e8604c5d2ff22bb6970817e6adb817aebb0733f
iDEFENSE Security Advisory 2008-06-11.5
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an information disclosure vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to gain access to sensitive information stored in server memory. The vulnerability exists when creating a Pixmap in the fbShmPutImage() function. The width and height of the Pixmap, which are controlled by the user, are not properly validated to ensure that the Pixmap they define are within the bounds of the shared memory segment. This allows an attacker to read arbitrary areas of memory in the X server process. iDefense has confirmed the existence of this vulnerability in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, arbitrary, local, info disclosure
advisories | CVE-2008-1379
SHA-256 | f996dc34179e536c8cec80e7e1ab0c8b3841cce7dc4a40b66986828681ff031d
iDEFENSE Security Advisory 2008-06-11.4
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of multiple memory corruption vulnerabilities in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. iDefense has confirmed the existence of these vulnerabilities in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, arbitrary, local, root, vulnerability
advisories | CVE-2008-1377
SHA-256 | 23de174b019234410fd1fed2d2601eac065e96395b47d5efd0aa7b395e84b241
iDEFENSE Security Advisory 2008-06-11.3
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. iDefense has confirmed the existence of this vulnerability in X.org X11 version R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, overflow, arbitrary, local, root
advisories | CVE-2008-2362
SHA-256 | 01fb73cd7aa428fb3937fe703ea544212b782097950d51a7c35ef592e91f7208
iDEFENSE Security Advisory 2008-06-11.2
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to create a denial of service (DoS) condition on the affected X server. The vulnerability exists within the ProcRenderCreateCursor() function. When parsing a client request, values are taken from the request and used in an arithmetic operation that calculates the size of a dynamic buffer. This calculation can overflow, which results in an undersized buffer being allocated. This leads to an invalid memory access, which crashes the X server. iDefense has confirmed the existence of these this vulnerability in X.org X11 version R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, denial of service, overflow, local
advisories | CVE-2008-2361
SHA-256 | 8ee084f756e81279ec599dbaa545459efdc06ef3a6da7b39b149058126cb1b07
iDEFENSE Security Advisory 2008-06-11.1
Posted Jun 11, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. The vulnerability exists within the AllocateGlyph() function, which is called from several request handlers in the render extension. This function takes several values from the request, and multiplies them together to calculate how much memory to allocate for a heap buffer. This calculation can overflow, which leads to a heap overflow. iDefense has confirmed the existence of this vulnerability in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.

tags | advisory, overflow, arbitrary, local, root
advisories | CVE-2008-2360
SHA-256 | 8af2a005f2bcb28930e75e027ff46599b31bf9c3361ab9c6cb6a2f8bbff1df5d
syzygy-lfi.txt
Posted Jun 11, 2008
Authored by StAkeR

Syzygy CMS version 0.2.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | c2723df804ffefd144244ed162daa665f7bc98f77ebbfec54041ebb427a93ed5
Debian Linux Security Advisory 1594-1
Posted Jun 11, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1594-1 - Stefan Cornelius discovered two buffer overflows in Imlib's - a powerful image loading and rendering library - image loaders for PNM and XPM images, which may result in the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2008-2426
SHA-256 | fbf8fd0c02278843b6f777e8167523433a53cd0698790bc57f9e0c8b89197723
absolute-screwups.txt
Posted Jun 11, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Products from Xigla, such as Absolute Live Support XE, Absolute News Manager XE, Absolute Banner Manager XE, Absolute Form Processor XE, Absolute Image Gallery XE, Absolute Poll Manager XE, and Absolute Control Panel XE all suffer from cross site scripting and/or SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | b097b8dc49b923f478afb2ab38d9012e47c350bf2a68d830775e86f79407e4cd
Secunia Security Advisory 30514
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetScout Visualizer and InfiniStream, which can be exploited by malicious users to perform certain actions with escalated privileges.

tags | advisory
SHA-256 | a2dd5ca89700b456f3dcab9244fbbd027e7b5acc9139be2460879c18c0ae97b9
Secunia Security Advisory 30554
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM OS/400.

tags | advisory
SHA-256 | 19f02d8f6841b510cad7fc6ce61c86841abba36a153edb6ceaa1003575683cf5
Secunia Security Advisory 30593
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Todd Woolums ASP News Management, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection, asp
SHA-256 | 2e0b065111b80cba51ee36c064faac19624148217826c615796d9306d4383d81
Secunia Security Advisory 30611
Posted Jun 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in net2ftp, which potentially can be exploited by malicious people to disclose sensitive information, delete certain files, and compromise a vulnerable system.

tags | advisory
SHA-256 | aad9ea26dd89c66f9046ffefbcac5111443be6fcfc3b38c0fa704172c46690c2
DEFE-24-1925.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 15b8515de677f63423d3d174fb60d055cc8de74c354127b75834a87bb27d455f
DEFE-24-1924.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 6b5da090df24ba0f79cb3eeed5c758f29812549afc802e9259cabefba68d8a71
DEFE-24-1923.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 7e46d47db702acacd501a6abe5b7eafb0ea0642bc0bdea15b8f0bf28a04ce865
DEFE-24-1922.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 89a88638ec65d54f58fd3a0a40046b10440b44df56340aa134d164065449b661
DEFE-31-175.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | e7b9886ff3a26ac9d151ccebacb427ad90f13c41ee7167e7fda012c307c2db08
DEFE-31-174.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | ad85996c9f1da29ecf1af16ed8a0f2e0956d841cc11f9ee5a5480c2446ceb0bb
DEFE-31-173.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 395daee97eeb077d8551ab16db1d21a459650c084f6a45e1d8d715404e61c14d
DEFE-31-172.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 096dcf6a87e56adf0aac64e919d78890397942753cf169654275e6db1f5eb6a8
xplico_phpgui-0.1_deft3x.tgz
Posted Jun 11, 2008
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

PHP GUI for the Xplico open source network forensic analysis tool.

tags | tool, php, forensics
SHA-256 | 5024a4a5896276b861c8306e55bd136b54baca47cab0878ca55ff8dc58c98957
xplico-0.1_deft3x.tgz
Posted Jun 11, 2008
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc.

tags | tool, imap, forensics
SHA-256 | 1a4ab3b53f981aa4022c3313865763c8b67fd5e63f859c3c62366a437817e5bc
Page 1 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close