exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2008-10-06

vmware-emulation.txt
Posted Oct 6, 2008
Authored by Derek Soeder

By exploiting the VMware flaw described in this document, user-mode code executing in a virtual machine may gain kernel privileges within the virtual machine, dependent upon the guest operating system. The flaw has been proven exploitable on x64 versions of Windows, and it has produced potentially exploitable crashes on x64 versions of *BSD. The Linux kernel does not allow exploitation of the flaws on x64 versions of Linux.

tags | advisory, kernel
systems | linux, windows, bsd
advisories | CVE-2008-4279, CVE-2008-3890
SHA-256 | bc46bdf127b13616ebd5b44a7bcba711654e92899537c4c70c898cd5d96217a6
VMware Security Advisory 2008-0016
Posted Oct 6, 2008
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware addresses an in-guest privilege escalation on 64-bit guest operating systems in ESX, ESXi, and previously released versions of our hosted product line. Updated VMware VirtualCenter Update 3 addresses potential information disclosure and updates Java JRE packages.

tags | advisory, java, info disclosure
advisories | CVE-2008-4279, CVE-2008-4278, CVE-2008-3103, CVE-2008-3104, CVE-2008-3105, CVE-2008-3106, CVE-2008-3107, CVE-2008-3108, CVE-2008-3109, CVE-2008-3110, CVE-2008-3111, CVE-2008-3112, CVE-2008-3113, CVE-2008-3114, CVE-2008-3115
SHA-256 | 01a45ebae3605a3c400cbd4ce5d054f72ec5ac917c678a7e64d411f691300d89
Mandriva Linux Security Advisory 2008-210
Posted Oct 6, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string. The updated packages have been patched to fix the issue.

tags | advisory, remote, web, arbitrary
systems | linux, mandriva
advisories | CVE-2008-3906
SHA-256 | e87336d272aa0fa7befce21c24fe58db23bac3604b093f6100a5f4f014144c58
Mandriva Linux Security Advisory 2008-209
Posted Oct 6, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - St├ęphane Bertin discovered a flaw in the pam_krb5 existing_ticket configuration option where, if enabled and using an existing credential cache, it was possible for a local user to gain elevated privileges by using a different, local user's credential cache. The updated packages have been patched to prevent this issue.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2008-3825
SHA-256 | 3263d16d5b4df29a8e6dd30063a4c78ff742b8f68bb089d78bb6aac7b65460a4
Secunia Security Advisory 32004
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - boom3rang has discovered a vulnerability in the Recepies (Recept) module for PHP-Fusion, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, php, sql injection
SHA-256 | 12779e2aef4ef9e9f46ddfb0c307e70fb8bc16e34ac7c2b104517cf0eb2010d7
Secunia Security Advisory 32115
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Defsanguje has discovered a vulnerability in Microsoft Windows Vista, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows
SHA-256 | 831b111414f76c7268ed49dfdb70ff228c862f40ff33040373fac24fe3ce3eb9
Secunia Security Advisory 32123
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Nucleus EUC-JP, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a5f89f6f75c6f0ecff587eb1124d4e78508d22f3d75d38159e712c14c45decdb
Secunia Security Advisory 32141
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SirGod has discovered some vulnerabilities in JMweb MP3 Music Audio Search and Download Script, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 98a7335372ced27656beeaa37c8ffa77bd71f93e616bbe254c98415a0c37ff9c
Secunia Security Advisory 32150
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - dmnt has discovered two vulnerabilities in Serv-U, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 8ae2c5607ab9b3e3303853bfc8864035f8f1b8b3fc5f89a8ede6530968f3e081
Secunia Security Advisory 32168
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - S_DLA_S has discovered a vulnerability in AmpJuke, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | c737931718b7a243064ad88beb91cd222be697f07788e9b869fa715916b85fe1
Secunia Security Advisory 32174
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for pam_krb5. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
SHA-256 | a2ee3e6380bfc0c23fc0abed9695724ad33937a3eb490f6c40270de6ad305a67
Secunia Security Advisory 32175
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 0af672521d19c984ad4242330aaf69d1c3201698826a0ec2bf11e10faad1eafd
Secunia Security Advisory 32176
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ghost Hacker has reported a vulnerability in Website Directory, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 667f0ad6dd59feda2ac88c72233f0b4efb858e504b196b0cad67a4172349ad35
Secunia Security Advisory 32179
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged a weakness and some vulnerabilities in VMware VirtualCenter, which can be exploited by malicious, local users to disclose sensitive information, and by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
SHA-256 | c4eb61daa3b2fe24d9bb179b8884b9d04ae8f8137c4f123477cb6dd046242baa
Secunia Security Advisory 32180
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged some vulnerabilities in VMware ESX Server, which can be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 2d5be59a918eb5ee5b4014f7580fb651123b9600c390e863b7f5c1031717a1cf
ayeview220-dos.txt
Posted Oct 6, 2008
Authored by suN8Hclf | Site dark-coders.pl

AyeView version 2.20 malformed GIF image denial of service exploit.

tags | exploit, denial of service
SHA-256 | a26efce99b915a43ca4e002a869bd19a4b941d48f2d685aee352d3fd8d3637d1
faststone-dos.txt
Posted Oct 6, 2008
Authored by suN8Hclf | Site dark-coders.pl

FastStone Image Viewer version 3.6 malformed BMP image denial of service exploit.

tags | exploit, denial of service
SHA-256 | 1284870a3663271c1cb591c5d3c901ee6735bdba22a6e9148b08bcdff01391e4
ayeview-dos.txt
Posted Oct 6, 2008
Authored by suN8Hclf | Site dark-coders.pl

AyeView version 2.20 invalid bitmap header parsing denial of service exploit.

tags | exploit, denial of service
SHA-256 | 9ada5ff4a3bb577bc6fa51dcabf831e6a852b7dad6b7e60fdc54fd6afbbb3fc4
vista-access.txt
Posted Oct 6, 2008
Authored by Defsanguje

Microsoft Windows Vista access violation from limited account denial of service blue screen of death exploit.

tags | exploit, denial of service
systems | windows
SHA-256 | c1f3a692fc163324f440f798f6db2fa7d92396e6f59f7ed7e36df7e9ad735baf
hammer-traversal.txt
Posted Oct 6, 2008
Authored by Brad Antoniewicz

Hammer Software MetaGauge version 1.0.0.17 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2008-4421
SHA-256 | b7c38dcf52a5a106beaa86d8e29567cd70e6d8a1d3f7b880295137d31cfcfc8e
mirc634-overflow.txt
Posted Oct 6, 2008
Authored by SkD

MIRC version 6.34 remote buffer overflow exploit that spawns calc.exe.

tags | exploit, remote, overflow
SHA-256 | 7395c86dff59c0fbcb031226149a38324b2c0c6eba091636a7a3542528089724
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close