what you don't know can hurt you
Showing 1 - 21 of 21 RSS Feed

Files Date: 2008-10-06

vmware-emulation.txt
Posted Oct 6, 2008
Authored by Derek Soeder

By exploiting the VMware flaw described in this document, user-mode code executing in a virtual machine may gain kernel privileges within the virtual machine, dependent upon the guest operating system. The flaw has been proven exploitable on x64 versions of Windows, and it has produced potentially exploitable crashes on x64 versions of *BSD. The Linux kernel does not allow exploitation of the flaws on x64 versions of Linux.

tags | advisory, kernel
systems | linux, windows, bsd
advisories | CVE-2008-4279, CVE-2008-3890
MD5 | 9d308b99f74f10aaccfde19943b9cbc4
VMware Security Advisory 2008-0016
Posted Oct 6, 2008
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware addresses an in-guest privilege escalation on 64-bit guest operating systems in ESX, ESXi, and previously released versions of our hosted product line. Updated VMware VirtualCenter Update 3 addresses potential information disclosure and updates Java JRE packages.

tags | advisory, java, info disclosure
advisories | CVE-2008-4279, CVE-2008-4278, CVE-2008-3103, CVE-2008-3104, CVE-2008-3105, CVE-2008-3106, CVE-2008-3107, CVE-2008-3108, CVE-2008-3109, CVE-2008-3110, CVE-2008-3111, CVE-2008-3112, CVE-2008-3113, CVE-2008-3114, CVE-2008-3115
MD5 | 6d2cadbdc3aa8d8b14781c8f7a10e20e
Mandriva Linux Security Advisory 2008-210
Posted Oct 6, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string. The updated packages have been patched to fix the issue.

tags | advisory, remote, web, arbitrary
systems | linux, mandriva
advisories | CVE-2008-3906
MD5 | 68b4e4fdd62c729cba03aa357003d366
Mandriva Linux Security Advisory 2008-209
Posted Oct 6, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - St├ęphane Bertin discovered a flaw in the pam_krb5 existing_ticket configuration option where, if enabled and using an existing credential cache, it was possible for a local user to gain elevated privileges by using a different, local user's credential cache. The updated packages have been patched to prevent this issue.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2008-3825
MD5 | 6c8c02e04058c8e9e9b7b397c121754e
Secunia Security Advisory 32004
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - boom3rang has discovered a vulnerability in the Recepies (Recept) module for PHP-Fusion, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, php, sql injection
MD5 | 98e142a554120d38a32ccd6df6a75be5
Secunia Security Advisory 32115
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Defsanguje has discovered a vulnerability in Microsoft Windows Vista, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows, vista
MD5 | 52c6602ffa771ac99367035758ce42ef
Secunia Security Advisory 32123
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Nucleus EUC-JP, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 70fddf9854d5cc4c3b31ebe0b1bf131a
Secunia Security Advisory 32141
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SirGod has discovered some vulnerabilities in JMweb MP3 Music Audio Search and Download Script, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
MD5 | 9dfa1248007481704b41356cf223c79a
Secunia Security Advisory 32150
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - dmnt has discovered two vulnerabilities in Serv-U, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 1b02774bea374341181708c9a00480d1
Secunia Security Advisory 32168
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - S_DLA_S has discovered a vulnerability in AmpJuke, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 9ed7b27155b67b347390369059dcee34
Secunia Security Advisory 32174
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for pam_krb5. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
MD5 | 825a9ff9e5f6ad7c02842a151a18c651
Secunia Security Advisory 32175
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | ef0b515b535d00fadac6d10d2ceda355
Secunia Security Advisory 32176
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ghost Hacker has reported a vulnerability in Website Directory, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 70fdbe87d18c852ce8e89b541e00b6eb
Secunia Security Advisory 32179
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged a weakness and some vulnerabilities in VMware VirtualCenter, which can be exploited by malicious, local users to disclose sensitive information, and by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
MD5 | f6f0ae6eaca46f20afc08eaa648abd71
Secunia Security Advisory 32180
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged some vulnerabilities in VMware ESX Server, which can be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | fc123d337af3de7f8bbee9842e3e6a5a
ayeview220-dos.txt
Posted Oct 6, 2008
Authored by suN8Hclf | Site dark-coders.pl

AyeView version 2.20 malformed GIF image denial of service exploit.

tags | exploit, denial of service
MD5 | 22ec90cad8f01e0710dcaae91b295b27
faststone-dos.txt
Posted Oct 6, 2008
Authored by suN8Hclf | Site dark-coders.pl

FastStone Image Viewer version 3.6 malformed BMP image denial of service exploit.

tags | exploit, denial of service
MD5 | adac5794f150c02f3b3dd8896007bd91
ayeview-dos.txt
Posted Oct 6, 2008
Authored by suN8Hclf | Site dark-coders.pl

AyeView version 2.20 invalid bitmap header parsing denial of service exploit.

tags | exploit, denial of service
MD5 | 8e14eff221ce5dc0da7b21679822fea7
vista-access.txt
Posted Oct 6, 2008
Authored by Defsanguje

Microsoft Windows Vista access violation from limited account denial of service blue screen of death exploit.

tags | exploit, denial of service
systems | windows, vista
MD5 | 68e64c685219c6145071f4a9faebb354
hammer-traversal.txt
Posted Oct 6, 2008
Authored by Brad Antoniewicz

Hammer Software MetaGauge version 1.0.0.17 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2008-4421
MD5 | e7eacd600ee59a1dce5ab3cccd014630
mirc634-overflow.txt
Posted Oct 6, 2008
Authored by SkD

MIRC version 6.34 remote buffer overflow exploit that spawns calc.exe.

tags | exploit, remote, overflow
MD5 | 4e0f112638c474ea9793b70bea109bed
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close