Twenty Year Anniversary
Showing 1 - 25 of 58 RSS Feed

Files Date: 2008-07-23

SDTCleaner-v1.0.zip
Posted Jul 23, 2008
Authored by Nahuel Riva | Site coresecurity.com

SDT Cleaner is a small laboratory tool that attempts to restore the pointers installed by Anti-Virus and Firewalls in the SSDT (System Service Descriptor Table).

tags | virus
MD5 | 9123411f2b13fc9ec9a831f7e8a6514d
Secunia Security Advisory 31178
Posted Jul 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service) or to conduct DoS attacks.

tags | advisory, denial of service, vulnerability
MD5 | 18141ca18feadc2b788db08d66f6de07
Secunia Security Advisory 31203
Posted Jul 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tim Loshak has reported some vulnerabilities in SocialEngine, which can be exploited by malicious users to compromise a vulnerable system, and by malicious people to conduct SQL injection attacks and bypass certain security restrictions.

tags | advisory, vulnerability, sql injection
MD5 | 33de9db9ca1aeaa7cf492b3f4b25c856
Debian Linux Security Advisory 1615-1
Posted Jul 23, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1615-1 - Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2800, CVE-2008-2801, CVE-2008-2802, CVE-2008-2803, CVE-2008-2805, CVE-2008-2807, CVE-2008-2808, CVE-2008-2809, CVE-2008-2811, CVE-2008-2933
MD5 | 814da2c25fb7c7e932ae2c2849d21d29
Debian Linux Security Advisory 1614-1
Posted Jul 23, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1614-1 - Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser. It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. Billy Rios discovered that passing an URL containing a pipe symbol to Iceweasel can lead to Chrome privilege escalation.

tags | advisory, remote, web, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2008-2785, CVE-2008-2933
MD5 | 357a585f8c33728c1e761bc85d365a57
Debian Linux Security Advisory 1540-3
Posted Jul 23, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1540-3 - This update fixes a regression in lighttpd introduced in DSA-1540, causing SSL failures.

tags | advisory
systems | linux, debian
advisories | CVE-2008-1531
MD5 | cccf48a06495b899a26c83ab12130eb3
Ubuntu Security Notice 628-1
Posted Jul 23, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 628-1 - Over a dozen vulnerabilities in php5 have been addressed in Ubuntu.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2007-4782, CVE-2007-4850, CVE-2007-5898, CVE-2007-5899, CVE-2008-0599, CVE-2008-1384, CVE-2008-2050, CVE-2008-2051, CVE-2008-2107, CVE-2008-2108, CVE-2008-2371, CVE-2008-2829
MD5 | 6cd6d0407e8f8ffd96589e18817d582e
vimfiletype-exec.txt
Posted Jul 23, 2008
Authored by Jan Minar

This advisory discusses the filetype.vim vulnerability in Vim version 7.2b.10 that allows for arbitrary code execution and also notes that the Vim patch 7.1.300 did not fix the vulnerability.

tags | advisory, arbitrary, code execution
MD5 | 525775816c2441f36c404a28644bb87a
emc-sql.txt
Posted Jul 23, 2008
Authored by Aaron Brown, Lars Heidelberg

EMC's Centera Universal Access product version CUA4.0_4735.p4 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | 535213a9fae7b8708f9e219a84119c62
AST-2008-011.txt
Posted Jul 23, 2008
Authored by Tilghman Lesher | Site asterisk.org

Asterisk Project Security Advisory - An attacker may request an Asterisk server to send part of a firmware image. However, as this firmware download protocol does not initiate a handshake, the source address may be spoofed. Therefore, an IAX2 FWDOWNL request for a firmware file may consume as little as 40 bytes, yet produces a 1040 byte response. Coupled with multiple geographically diverse Asterisk servers, an attacker may flood an victim site with unwanted firmware packets.

tags | advisory, spoof, protocol
advisories | CVE-2008-3264
MD5 | 2185fd4b6b919de751e6fe7c8aab32a1
AST-2008-010.txt
Posted Jul 23, 2008
Authored by Jeremy McNamara | Site asterisk.org

Asterisk Project Security Advisory - By flooding an Asterisk server with IAX2 'POKE' requests, an attacker may eat up all call numbers associated with the IAX2 protocol on an Asterisk server and prevent other IAX2 calls from getting through. Due to the nature of the protocol, IAX2 POKE calls will expect an ACK packet in response to the PONG packet sent in response to the POKE. While waiting for this ACK packet, this dialog consumes an IAX2 call number, as the ACK packet must contain the same call number as was allocated and sent in the PONG.

tags | advisory, protocol
advisories | CVE-2008-3263
MD5 | c3e6feb71c399d84d8dc74877ffc992c
Mandriva Linux Security Advisory 2008-154
Posted Jul 23, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in xemacs was found where an attacker could provide a group of files containing local variable definitions and arbitrary Lisp code to be executed when one of the provided files is opened by xemacs. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2008-2142
MD5 | 02de82850dc988def1ef4ff9e0c8f68e
Mandriva Linux Security Advisory 2008-153
Posted Jul 23, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in emacs was found where an attacker could provide a group of files containing local variable definitions and arbitrary Lisp code to be executed when one of the provided files is opened by emacs. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2008-2142
MD5 | 317520423f82ed3a15b919a528d64ba9
Mandriva Linux Security Advisory 2008-152
Posted Jul 23, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in Wireshark, that could cause it to crash while processing malicious packets. This update provides Wireshark 1.0.2, which is not vulnerable to that.

tags | advisory
systems | linux, mandriva
advisories | CVE-2008-3145
MD5 | 9deb077f278a874b21006d319120b3bb
joomlamamml-upload.txt
Posted Jul 23, 2008
Authored by e.wiZz!

The Joomla Mamml component suffers from a remote file disclosure vulnerability.

tags | exploit, remote, file upload
MD5 | 0a4d3aebca4602e890770992430bc74c
mysql_injection.pdf
Posted Jul 23, 2008
Authored by ka0x

Whitepaper discussing techniques for MySQL related SQL injection. Written in Spanish.

tags | paper, sql injection
MD5 | bd8ca795f2acde98ec699e5686fdc77f
oss-bypass.txt
Posted Jul 23, 2008
Authored by Juan Pablo Lopez Yacubian

Outpost Security Suite Pro version 2009 suffers from multiple bypass vulnerabilities when using special characters.

tags | exploit, vulnerability, bypass
MD5 | 7570d3a72f5096b9588136427c83cebc
ProCheckUp Security Advisory 2008.16
Posted Jul 23, 2008
Authored by ProCheckUp | Site procheckup.com

Moodle versions 1.7.4 and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 3a664b6adfa3d72f4d9f2a8baec3e8ec
ProCheckUp Security Advisory 2008.15
Posted Jul 23, 2008
Authored by ProCheckUp | Site procheckup.com

Moodle version 1.6.5 is vulnerable to web root disclosure issues.

tags | advisory, web, root
MD5 | 476269f39413dda45632d4b71746ac13
ProCheckUp Security Advisory 2008.13
Posted Jul 23, 2008
Authored by ProCheckUp | Site procheckup.com

A cross site scripting vulnerability exists in Moodle versions 1.7.4 and below.

tags | exploit, xss
MD5 | 2c780311bb56dbfd1b088e81afe2297d
CS-2008-2.txt
Posted Jul 23, 2008
Authored by Tim Loshak

SocialEngine versions below 2.83 suffer from an input validation vulnerability that allows for client take over.

tags | advisory
MD5 | cd06e8756e37818b845ccfa76907f968
FGA-2008-16-3.txt
Posted Jul 23, 2008
Authored by Zhenhua Liu | Site fortinet.com

EMC Dantz Retrospect 7 Backup Server version 7.5.508 suffers from a weak password hash arithmetic vulnerability in the authentication module.

tags | advisory
MD5 | 0e4381d6c4e9206769d3e16fded8c491
presurveypoll-sql.txt
Posted Jul 23, 2008
Authored by DreamTurk

Pre Survey Poll suffers from a SQL injection vulnerability in default.asp.

tags | exploit, sql injection, asp
MD5 | 4c8cc48caee75fdfa46bf471483ffa69
ezwebalbum-cookie.txt
Posted Jul 23, 2008
Authored by hadihadi | Site virangar.org

EZWebAlbum suffers from an insecure cookie handling vulnerability that allows anyone to be an administrator.

tags | exploit, insecure cookie handling
MD5 | dd69a0f4eeaba3414e0cf5efa2ed5988
minix-dos.txt
Posted Jul 23, 2008
Authored by Knud Erik Hojgaard

Minix version 3.1.2a suffers from a tty panic local denial of service vulnerability.

tags | exploit, denial of service, local
systems | minix
MD5 | a22651fcf1856f9932203452a358dc4e
Page 1 of 3
Back123Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    5 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close