exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 44 RSS Feed

Files Date: 2009-03-25

Aanval Intrusion Detection Tool
Posted Mar 25, 2009
Site aanval.com

Aanval is the industry's most comprehensive snort and syslog intrusion detection, correlation and management console. Aanval is designed specifically to scale from small single sensor installations to global enterprise deployments. Aanval is browser based and designed to work on all current variants of UNIX, Linux and Mac OS X.

tags | tool, sniffer
systems | linux, unix, apple, osx
SHA-256 | 7529ddd8b8b8f4e4b5479dc8b9eb5760f8587674e55143525914854bc468b580
Debian Linux Security Advisory 1745-2
Posted Mar 25, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1745-2 - Several security issues have been discovered in lcms, a color management library. This update fixes a possible regression introduced in DSA-1745-1 and also enhances the security patch.

tags | advisory
systems | linux, debian
advisories | CVE-2009-0581, CVE-2009-0723, CVE-2009-0733
SHA-256 | c77800fadd6c284e42c35d6fcb110b184e99091d0e1d7a6cdfbdea548c3735e4
Adobe Reader JBIG2 Symbol Dictionary Buffer Overflow
Posted Mar 25, 2009
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability Adobe Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the processing of JBIG2 streams. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file containing a malformed JBIG2 symbol dictionary segment. Successful exploitation may allow execution of arbitrary code. Adobe Reader versions 8.1.3 and 9.0.0 are affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2009-0193
SHA-256 | 3a6f7e4aad0b7d0f7fb53f01f4c49768416ddd1ab350f118ec3c37a4d19d7965
Adobe Acrobat Reader Memory Corruption
Posted Mar 25, 2009
Authored by Jonathan Brossard | Site ivizsecurity.com

Adobe Acrobat Reader suffers from a memory corruption vulnerability. Versions 9.0.0 and 8.1.3 are affected.

tags | advisory
SHA-256 | 3fd5159ce227deda8ad64450f949dbfdf2df7c0a4cc546070dccc3e295484604
Pivot Scan Written In Ruby
Posted Mar 25, 2009
Authored by Augusto Pereyra | Site code.google.com

Pivot Scan is a scanner written in Ruby for the meterpreter tool.

tags | tool, scanner, ruby
systems | unix
SHA-256 | 45ecdf791525de7234a5d539bbcfc9801fc8ecc45b4c462216830f1b0c819b69
DirectAdmin 1.33.1 Bypass
Posted Mar 25, 2009
Authored by S4S-T3rr0r!sT | Site hackteach.org

DirectAdmin versions 1.33.1 and below suffer from a symlink permission bypass vulnerability.

tags | exploit, bypass
SHA-256 | 53052199c58574efd9c8e08901a5480d5721d6a9a1745f95edae74e88a503fb3
Secunia Security Advisory 34396
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in PHPizabi, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information, or compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | f6fba59a653815517d0ba3520ffc5793b7a8d6e82ea6758d16ed79db5de14b57
Secunia Security Advisory 34463
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for lcms. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, slackware
SHA-256 | 73c5f0f79cfde7a49061fae802d40d11d532771bc61aeb7cafb6938a1b716e92
Secunia Security Advisory 34426
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ldns, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
SHA-256 | 5238acb231f6b9babed46dc03a1edfe733e00c7a82e98283b5b1aeaea76285d1
Secunia Security Advisory 34431
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Media Entertainment Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | f950e9b5405457184fa8705208b326a9448391301a3c49fbf0aa1d6a00916427
Secunia Security Advisory 34389
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hannon Hill Cascade Server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 4eb72c99fd4a5682e03be05e470c7de8c47573da1a2baf0b9b528a2a4e828d07
Secunia Security Advisory 34342
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in cPanel, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 8c0b9f482135f28b253a65a51ed0d65b3dfe3fb52702a1d71e1b0175c5e43e6f
Secunia Security Advisory 34468
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct HTTP response splitting attacks or disclose sensitive information.

tags | advisory, web, vulnerability
SHA-256 | 8d4d42cc29551c79dfe47049785f3680f75f463c00ce2de1a4d3c57121fe45f4
Secunia Security Advisory 34392
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | ac2530cb2e538d6c9e4ea58923a77289ab167a8f32eb6d3f7231f284dee61214
Secunia Security Advisory 34430
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | da98cf350490254cb226f7f3c29142e48360b71a06515219ae1acb4550ec3ae1
Secunia Security Advisory 34270
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in PSCS VPOP3 Email Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 9a423a9359338d44e5def46eb8e3d1422877599727b1530dade65334387a0b41
Secunia Security Advisory 34425
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in 3Com Switch 5500 and 5500G, which can lead to the disclosure of sensitive information.

tags | advisory
SHA-256 | 9eeca5f04af9b991f1f6a8341e5d2ae22b76d5afa23eebce84eb8b846e371705
Secunia Security Advisory 34177
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for NetworkManager. This fixes a security issue, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
systems | linux, redhat
SHA-256 | dbdb9c7e805cf41e598b651703b7101647dab39dc505efd46a8f13129b3e8c58
Secunia Security Advisory 34473
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for NetworkManager. This fixes some security issues, which can be exploited by malicious, local users to manipulate certain data and disclose potentially sensitive information.

tags | advisory, local
systems | linux, redhat
SHA-256 | 24ccc39dcdded4583f6a126a94251357129ece16d4ea9132fbc6df4e32e879b5
Secunia Security Advisory 34470
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Access Support ActiveX Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
SHA-256 | 9e0b2965046174ba7b572970d0937d2eb82d66f5f03ca68931bf0df768630575
Secunia Security Advisory 34347
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kerberos 5, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 38e183ed84d950d3b0a8299e7cf017071fa590d4ffc74ecf8834d739a9cdadd5
Secunia Security Advisory 34413
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in eXeScope, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a4af8e40baa8985612281f00dc1dbec1c6d239d47e2f2adc3057ca58336cfdd9
Secunia Security Advisory 34169
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in e107, which can be exploited by malicious people to conduct cross-site request forgery attacks and malicious users to conduct script insertion attacks.

tags | advisory, vulnerability, csrf
SHA-256 | 636ef975fb860cd5552e88c21a2167c63778c0ec4923ccbcc3d30c529f4d3f9e
Secunia Security Advisory 34411
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 00756de4697604fc22a3771b8a26704e6981a1c4a7c3861b59e083de2d382552
Secunia Security Advisory 34416
Posted Mar 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for glib2. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | acde10c223acb520bc9341ddc1a02aba533c0acc1b429c0b868cf6f5ffffd630
Page 1 of 2
Back12Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    11 Files
  • 30
    Jun 30th
    7 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close