exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files Date: 2008-07-16

n.runs-SA-2008.003.txt
Posted Jul 16, 2008
Authored by Sergio Alvarez | Site nruns.com

Apple QuickTime versions prior to 7.5 suffer from a heap overflow vulnerability when handling PICT images.

tags | advisory, overflow
systems | apple
SHA-256 | d724e9e6944eff30016b9426e445cdaca7b49bfdefc5bb06d255042b549b2043
n.runs-SA-2008.002.txt
Posted Jul 16, 2008
Authored by Sergio Alvarez | Site nruns.com

The F-Prot Anti-Virus engine versions below 4.4.4 suffer form an out-of-bounds memory access denial of service vulnerability.

tags | advisory, denial of service, virus
SHA-256 | d918f9e89f9fe8868e89c10640916fe2470d61015aeccf9885cca0618046a693
Debian Linux Security Advisory 1544-2
Posted Jul 16, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1544-2 - Thomas Biege discovered that the upstream fix for the weak random number randomization did still not use difficult-to-predict random numbers. This is corrected in this security update.

tags | advisory
systems | linux, debian
advisories | CVE-2008-1637
SHA-256 | 786389ef31e587d5656cdffdd2ffe831943fdd6fa20bae122c93ef1d71d1e342
Secunia Security Advisory 31098
Posted Jul 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - StAkeR has discovered two vulnerabilities in Galatolo WebManager (GWM), which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | c8e335b8c08b0fcb64c8903e3d86ec80ef867fddf8a8638330ccb4f973e37cfa
Secunia Security Advisory 31107
Posted Jul 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, disclose potentially sensitive information, and gain escalated privileges, and malicious people to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, ubuntu
SHA-256 | a75aa30d7e2a3e4a53c3f2f9c9361dcb5c99d6cb86a6cd02d10686269ced1d0c
Secunia Security Advisory 31120
Posted Jul 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Firefox 2, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information.

tags | advisory
SHA-256 | c63dc88c1c729d34c909f1429d679a2012b978c77eeeffb5c5279d3d690a6351
Secunia Security Advisory 31122
Posted Jul 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
SHA-256 | 1d52fa53b3bb0013d76a75ebe639a82b22ea845b8256be963e28eed9d4fa3c52
HP Security Bulletin 2008-00.97
Posted Jul 16, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP Select Identity Active Directory Bidirectional LDAP Connector . The vulnerabilities could be exploited to allow remote unauthorized access.

tags | advisory, remote, vulnerability
advisories | CVE-2008-1665
SHA-256 | 1a31812ca82aa80ac997bdcb278bc58f2b4ee6f0cefa785892168585c190ba11
netrw-exec.txt
Posted Jul 16, 2008
Authored by Jan Minar

Lack of sanitization throughout Netrw can lead to arbitrary code execution upon opening a directory with a crafted name.

tags | advisory, arbitrary, code execution
SHA-256 | f50311e256266d8d203d3885b3448de80d94b947a9e036abe3e56dcfaf147b16
vim72b-exec.txt
Posted Jul 16, 2008
Authored by Jan Minar

Vim versions greater than and equal to 7.2.a.013 suffer from an arbitrary code execution vulnerability using the shellescape() function.

tags | advisory, arbitrary, code execution
SHA-256 | 6adfab1ef22a58322cefeb82ac51d3173e70797770814479bc878db14994e3b5
alstrasoftaffiliate-sql.txt
Posted Jul 16, 2008
Authored by Hussin X | Site tryag.cc

AlstraSoft Affiliate Network Pro suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7ebeb85c55258e5b339e3fe0d8173c01192419bee896b863298913f490188b72
tplsoccersite-sql.txt
Posted Jul 16, 2008
Authored by Mr.SQL | Site pal-hacker.com

tplSoccerSite version 1.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 879ccd9b8188b95b6e8297f53e16d2b019e01083144c833a0d684dab0b6bb28a
joomladtr-sql.txt
Posted Jul 16, 2008
Authored by His0k4

The Joomla DT Register component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 44653f02bd4d682c029f3264b8be8750a465e9bd9bce67f1b6674fa31acd2e2c
phpizabi-exec.txt
Posted Jul 16, 2008
Authored by Inphex

PHPizabi version 0.858b C1 HFP1 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 46856d0a6b7114a73e0557806e30169dd94dce5d1e1d8ae22b27380b87535e8e
Mandriva Linux Security Advisory 2008-147
Posted Jul 16, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Tavis Ormandy of the Google Security Team discovered a heap-based buffer overflow when compiling certain regular expression patterns. This could be used by a malicious attacker by sending a specially crafted regular expression to an application using the PCRE library, resulting in the possible execution of arbitrary code or a denial of service. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2008-2371
SHA-256 | 90af6b4f2837c16c44dd246b1175a40dd0effece45f132077dde70f78db33eca
Ubuntu Security Notice 625-1
Posted Jul 16, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 625-1 - A massive slew of Linux kernel related vulnerabilities have been addressed for the linux-source-2.6.15/20/22 packages.

tags | advisory, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2007-6282, CVE-2007-6712, CVE-2008-0598, CVE-2008-1615, CVE-2008-1673, CVE-2008-2136, CVE-2008-2137, CVE-2008-2148, CVE-2008-2358, CVE-2008-2365, CVE-2008-2729, CVE-2008-2750, CVE-2008-2826
SHA-256 | e309dbb8ed4824d0ba3a0db45465a00498514fe1765827e95617f7fc118a59dc
photopostvbgal-upload.txt
Posted Jul 16, 2008
Authored by Cold z3ro | Site hack-teach.com

vBulletin PhotoPost vBGallery version 2.4.2 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 190dfae7539e75d585afb4983945f39a9b8f4cb6a44c171f1119522afe5a2852
hockeystats-sql.txt
Posted Jul 16, 2008
Authored by Mr.SQL | Site pal-hacker.com

HockeySTATS Online version 2.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | c0169e1beeadf1b7a3350bfdbdd5b64f73edc302abab1a535dc766fbf204a63c
galatolo-cookie.txt
Posted Jul 16, 2008
Authored by hadihadi | Site virangar.org

Galatolo Web manager version 1.3a suffers from an insecure cookie handling vulnerability.

tags | exploit, web, insecure cookie handling
SHA-256 | a072871f2f91710d78dcffa99a995e3d282aa9d3483830e8d064ed3c8d52d4e8
documentimaging-overflow.txt
Posted Jul 16, 2008
Authored by r0ut3r

Document Imaging SDK version 10.95 ActiveX related buffer overflow proof of concept denial of service exploit.

tags | exploit, denial of service, overflow, activex, proof of concept
SHA-256 | 98b2060ffe1998eee18523cdf6d9f3487930c87967a0cd3264e19147115da5fc
Mandriva Linux Security Advisory 2008-146
Posted Jul 16, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A memory management issue was found in libpoppler by Felipe Andres Manzano that could allow for the execution of arbitrary code with the privileges of the user running a poppler-based application, if they opened a specially crafted PDF file. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2008-2950
SHA-256 | 411aacd9fb69d58366d38e486720a5ae91a43dfafe9d392cce5d436502257020
srm-1.2.9.tar.gz
Posted Jul 16, 2008
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: Bug fixes.
systems | unix
SHA-256 | ecb942cc52f0895783d3c8290aeac694e086ba298fb346261fc1339fe991dd7d
Secunia Security Advisory 31057
Posted Jul 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for bluez-libs and bluez-utils. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system.

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | dab1a46f2376a56f58bb47f6beca7e7a6cf0fd5ff9f0b70984351eb4a0f8af79
Secunia Security Advisory 31067
Posted Jul 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.4.2-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, or compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 6fceb01610d0d11c472f7d6c32830e3ef8a10eb6f49920785bd27775eaf95700
iDEFENSE Security Advisory 2008-07-15.3
Posted Jul 16, 2008
Authored by iDefense Labs, Joxean Koret | Site idefense.com

iDefense Security Advisory 07.15.08 - Local exploitation of an untrusted library path vulnerability in Oracle Corp.'s Oracle Database product allows attackers to gain elevated privileges. This vulnerability specifically exists in a set-uid root program distributed with Oracle Database for Linux and Unix platforms. By replacing a module owned by the oracle user, which is loaded by this program, an attacker can execute arbitrary code as root. iDefense confirmed the existence of this vulnerability in Oracle 11g R1 version 11.1.0.6.0 on 32-bit Linux platform. Previous versions may also be affected.

tags | advisory, arbitrary, local, root
systems | linux, unix
advisories | CVE-2008-2613
SHA-256 | 01a615097a77c6303f3b770b31f3e4481133f468b5bad9ffbcfaea23ea933114
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close