all things security
Showing 1 - 25 of 907 RSS Feed

Files Date: 2009-04-01 to 2009-04-30

Ubuntu Security Notice 768-1
Posted Apr 29, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-768-1 - Stephane Chazelas discovered that Apport did not safely remove files from its crash report directory. If Apport had been enabled at some point, a local attacker could remove arbitrary files from the system.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2009-1295
MD5 | eb3ff249410f55b24aad1842dcdf834a
iDEFENSE Security Advisory 2009-04-29.1
Posted Apr 29, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 04.29.09 - Remote exploitation of a design error vulnerability in Symantec Corp.'s Symantec System Center may allow an attacker to execute arbitrary code with SYSTEM privileges. The vulnerability exists within the 'Intel File Transfer' service, which runs the xfr.exe application. When sent a properly formatted request, this service will extract a string from the request, and use it as the path of a program to execute as a new Process. The process will be started with SYSTEM privileges. iDefense has confirmed the existence of this vulnerability in Symantec Client Security version 3.1. Previous versions may also be affected.

tags | advisory, remote, arbitrary
advisories | CVE-2009-1431
MD5 | 2ecf8606a20bc70d4601dea1be45d33b
iAWACS 2009 Call For Papers
Posted Apr 29, 2009
Authored by iawacs2009 | Site esiea-recherche.eu

Call For Papers for the first International Alternative Workshop on Aggressive Computing and Security. It will take place from October 23rd through the 25th, 2009 in Laval, France.

tags | paper, conference
MD5 | db2501d39a76b6f58df6c9131459c7be
S-CMS 1.1 Local File Inclusion
Posted Apr 29, 2009
Authored by ZoRLu

S-CMS version 1.1 suffers from a local file inclusion vulnerability in plugin.php.

tags | exploit, local, php, file inclusion
MD5 | 398ce81584539fbfe129a7c1c755129e
Tiger DMS SQL Injection
Posted Apr 29, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

Tiger DMS suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | d8e63d0d2f66abbc73f6bc67dcb923ed
Trendmicro RAR/CAB/ZIP Bypass
Posted Apr 29, 2009
Authored by Thierry Zoller

The Trendmicro parsing engine can be bypassed by specially crafted and formatted ZIP, RAR, and CAB archives.

tags | advisory
MD5 | 428bff371e0c8c9f0aaaa31275005381
ESET Nod32 CAB Bypass
Posted Apr 29, 2009
Authored by Thierry Zoller

The ESET Nod32 parsing engine can be bypassed by a specially crafted and formatted CAB archive.

tags | advisory
MD5 | d9598a2e55a414296fc9ae1ac834dea1
Zubrag Smart File Download 1.3 File Download
Posted Apr 29, 2009
Authored by Aodrulez | Site aodrulez.blogspot.com

Zubrag Smart File Download version 1.3 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
MD5 | 8ef0c2216ae0efb51beb0bf2ff980555
ProjectCMS 0.1b SQL Injection
Posted Apr 29, 2009
Authored by YEnH4ckEr

ProjectCMS version 1.0b suffers from a remote SQL injection vulnerability in index.php.

tags | exploit, remote, php, sql injection
MD5 | 3f048e603eb91f2e2fdf9c06c7b467f1
eLitius 1.0 SQL Injection
Posted Apr 29, 2009
Authored by Snakespc | Site snakespc.com

eLitius version 1.0 suffers from a remote SQL injection vulnerability in banner-details.php.

tags | exploit, remote, php, sql injection
MD5 | 889c8b03d30b38956548e300653583a1
mpegable Player 2.12 Stack Overflow
Posted Apr 29, 2009
Authored by GolD_M | Site tryag.cc

mpegable Player version 2.12 local stack overflow proof of concept exploit that creates a malicious .yuv file.

tags | exploit, overflow, local, proof of concept
MD5 | deb56882f8b6864fffe2ccdf8deb861c
Baby Web Server 2.7.2.0 File Disclosure
Posted Apr 29, 2009
Authored by ZoRLu

Baby Web Server version 2.7.2.0 arbitrary file disclosure exploit.

tags | exploit, web, arbitrary, info disclosure
MD5 | bfd42d9603d8bd03bc3574f88a48c9fc
LevelOne AMG-2000 Wireless AP Proxy Bypass
Posted Apr 29, 2009
Authored by Johannes Greil | Site sec-consult.com

SEC Consult Security Advisory 20090429-0 - LevelOne AMG-2000 Wireless AP Management Gateway suffers from proxy bypass and plain text vulnerabilities.

tags | exploit, vulnerability
MD5 | 1acca6056a6eb86cbec0f49635149fa5
Symantec WinFax Pro 10.03 Buffer Overflow
Posted Apr 29, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Symantec Fax Viewer Control in WinFax Pro version 10.03 (DCCFAXVW.DLL) remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | 0383216d374f64d818f5a0761433fa73
Debian Linux Security Advisory 1783-1
Posted Apr 29, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1783 - Multiple vulnerabilities have been identified affecting MySQL, a relational database server, and its associated interactive client application.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2008-3963, CVE-2008-4456
MD5 | 4c72025851851cf65b7c6f01dbc7fb22
Debian Linux Security Advisory 1782-1
Posted Apr 29, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1782-1 - Several vulnerabilities have been discovered in mplayer, a movie player for Unix-like systems.

tags | advisory, vulnerability
systems | linux, unix, debian
advisories | CVE-2009-0385, CVE-2008-4866, CVE-2008-5616
MD5 | 553a46baa2885111fd2bafce7846fb3c
Debian Linux Security Advisory 1781-1
Posted Apr 29, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1781-1 - Several vulnerabilities have been discovered in ffmpeg, a multimedia player, server and encoder.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-0385, CVE-2008-3162
MD5 | fb7ce3f1c6487996b0500a33995684b5
Mandriva Linux Security Advisory 2009-101
Posted Apr 29, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-101 - Multiple buffer overflows, integer overflows, NULL pointer dereference and various other vulnerabilities affect the JBIG2 decoder.

tags | advisory, overflow, vulnerability
systems | linux, mandriva
advisories | CVE-2009-0146, CVE-2009-0147, CVE-2009-0165, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183
MD5 | 053bec3b4399e2eec98f07bdd75b0891
Zero Day Initiative Advisory 09-018
Posted Apr 29, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-018 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Symantec Client Security. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Alert Originator service, iao.exe, which listens by default on TCP port 38292. The process blindly copies user-supplied data to a stack buffer via a memcpy call. By supplying a specially crafted packet, an attacker can overflow that buffer leading to arbitrary code execution in the context of the SYSTEM user.

tags | advisory, overflow, arbitrary, tcp, code execution
advisories | CVE-2009-1430
MD5 | 4238afdda32feddeb506c7f8901f4767
Autodesk IDrop ActiveX Code Execution
Posted Apr 29, 2009
Authored by Elazar Broad

Autodesk IDrop remote code execution Active-X related exploit.

tags | exploit, remote, code execution, activex
MD5 | 33738fc96994902b7d66e295f07b9917
Quick N Easy 3.3.5 File Disclosure
Posted Apr 29, 2009
Authored by Cyber-Zone | Site iq-ty.com

Quick 'N Easy Web Server version 3.3.5 arbitrary file disclosure exploit.

tags | exploit, web, arbitrary, info disclosure
MD5 | becc00e2ccc1a67f43e11ee436890c22
Secunia Security Advisory 34856
Posted Apr 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in various Symantec products, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to compromise a vulnerable system.

tags | advisory, local, vulnerability
MD5 | 1a2759e7c6980e2bc0750e2a10966812
Secunia Security Advisory 34836
Posted Apr 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
MD5 | 97288aa298fafe1031139c0b742576de
Secunia Security Advisory 34915
Posted Apr 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in memcached, which can be exploited by malicious people to disclose system information.

tags | advisory
MD5 | 4a4af87c62be43ec29be4bfe61e23132
Secunia Security Advisory 34851
Posted Apr 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for mozilla-firefox. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, slackware
MD5 | 6186c96aa0471eb45f888ba78f528f3a
Page 1 of 37
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close