exploit the possibilities
Showing 1 - 25 of 51 RSS Feed

Files Date: 2009-07-16

Mandriva Linux Security Advisory 2009-151
Posted Jul 16, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-151 - Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option. This update provides fixes for this vulnerability.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-0692
MD5 | b1d27be5487b0d393815ba575954468f
Nmap Port Scanner 5.00
Posted Jul 16, 2009
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Added SCTP port scanning support to Nmap. The Nmap Reference Guide has been translated to German by Open Source Press and Indonesian by Tedi Heriyanto. Fixed a display hanging problem on Mac OS X. Various other fixes and improvements have also been added.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 6b5b28f421cae71fd2710c1247c8db66
Debian Linux Security Advisory 1835-1
Posted Jul 16, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1835-1 - Several vulnerabilities have been discovered in the library for the Tag Image File Format (TIFF).

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-2285, CVE-2009-2347
MD5 | dd1a0b2fba3b09d64fc647da4eb752fc
Debian Linux Security Advisory 1834-1
Posted Jul 16, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1834 - A denial of service flaw was found in the Apache mod_proxy module when it was used as a reverse proxy. A remote attacker could use this flaw to force a proxy process to consume large amounts of CPU time. This issue did not affect Debian 4.0 "etch".

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2009-1890, CVE-2009-1891
MD5 | 9da6d0c2e0678b33ca52d85bf0085aec
Sguil/PADS SQL Injection / Crash
Posted Jul 16, 2009
Authored by Ataraxia | Site allmybase.com

Sguil/PADS suffers from remote SQL injection and crash vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | dd85a6b0e8892f2a5c853364d4ddfbb0
iDEFENSE Security Advisory 2009-07-14.1
Posted Jul 16, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 07.14.09 - Remote exploitation of a heap based buffer overflow vulnerability in Microsoft Corp.'s Embedded OpenType Font Engine (T2EMBED.DLL) could allow an attacker to execute arbitrary code with the privileges of the current user. During the processing of a malicious OpenType Font, an integer truncation issue can occur on a specific length value. This can result in a large overwrite of the heap using attacker controlled data. The attacker may gain arbitrary execution control by overwriting specific data structures on the heap, such as an object virtual function table. iDefense has confirmed the existence of this vulnerability in the Embedded OpenType Font Engine for Windows Vista SP1 (T2EMBED.DLL version 6.0.6001.18000) and Windows XP SP3 (T2EMBED.DLL version 5.1.2600.5512). Previous versions may also be affected.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2009-0231
MD5 | 779aa063fcc7380f50da5a7045798bbc
Cisco Security Advisory 20090715-uccx
Posted Jul 16, 2009
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Unified Contact Center Express (Cisco Unified CCX) server contains both a directory traversal vulnerability and a script injection vulnerability in the administration pages of the Customer Response Solutions (CRS) and Cisco Unified IP Interactive Voice Response (Cisco Unified IP IVR) products. Exploitation of these vulnerabilities could result in a denial of service condition, information disclosure, or a privilege escalation attack.

tags | advisory, denial of service, vulnerability, info disclosure
systems | cisco
advisories | CVE-2009-2047, CVE-2009-2048
MD5 | 4f86e850b9a893fbe6fa930ec1a9e551
Music Tag Editor 1.61 Buffer Overflow
Posted Jul 16, 2009
Authored by LiquidWorm | Site zeroscience.mk

Music Tag Editor version 1.61 build 212 suffers from a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
MD5 | 5d088d0413c0566beff4eb0cfbae3d18
Microsoft Office Web Components Active-X Overflow
Posted Jul 16, 2009

Microsoft Office Web Components Active-X related buffer overflow proof of concept exploit.

tags | exploit, web, overflow, activex, proof of concept
MD5 | c9ae2e1978fb53bf02c1352eac335b8a
Secunia Security Advisory 35646
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and a security issue have been discovered in AEF, which can be exploited by malicious users to disclose certain system information or to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 2faf7f98d7287b762b3ffa20f32417f2
Secunia Security Advisory 35822
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - n00b has reported a vulnerability in Live for Speed, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 3f4a45582f0ccaad5888e7126494109d
Secunia Security Advisory 35879
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Image Assist module for Drupal, which can be exploited by malicious users to conduct script insertion attacks or to disclose potentially sensitive information.

tags | advisory, vulnerability
MD5 | ace8ac640c0e5d5b014cd09a6ca24bf3
Secunia Security Advisory 35828
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has discovered a vulnerability in Music Tag Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | a8ccef3c8cead93e9bbb2cd554a087d8
Secunia Security Advisory 35832
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for ISC dhclient. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
systems | netbsd
MD5 | 734c38f80235df1a8781494cc309402c
Secunia Security Advisory 35831
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for dhcp. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, local
systems | linux, redhat
MD5 | 8a99d159dc14ca69afb9ea52be80fc44
Secunia Security Advisory 35841
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for dhcp3. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | dc16e53253adede502cadfd718e40a8c
Secunia Security Advisory 35849
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | 3aa21f3108b5454d9a5817e84848fe77
Secunia Security Advisory 35838
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Moudi has reported a vulnerability in ScriptsEz Easy Image Downloader, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | ac323776a739f662e778a9dc566c5075
Secunia Security Advisory 35776
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and a security issue have been reported in various Oracle products. Some have unknown impacts, others can be exploited by malicious people to cause a DoS (Denial of Service), conduct spoofing attacks, disclose sensitive information, or compromise a vulnerable system.

tags | advisory, denial of service, spoof, vulnerability
MD5 | 0dec418827c4d7e1a46a0cd8af0d3c68
Secunia Security Advisory 35850
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
systems | linux, redhat
MD5 | 836c284650f58e95a15e9fa9fd69089b
Secunia Security Advisory 35830
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for dhcp3. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 796e9d907e1afc35384457b7590eebc2
Secunia Security Advisory 35836
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Moudi has reported a vulnerability in eCardMAX FormXP 2007, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 86542d84048844c88cd1bc4fdbbdabac
Secunia Security Advisory 35851
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for dhcp3. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
systems | linux, debian
MD5 | 437b1b870497b0a2b8d529f0f9a23c99
Secunia Security Advisory 35845
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ADbNewsSender, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
MD5 | 16e839b451bb1ccdedb2359af24d3b2f
Secunia Security Advisory 35837
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Moudi has reported some vulnerabilities in eCardMAX 2008, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 42fc7f0b6ded1326e593c2026ddd3d01
Page 1 of 3
Back123Next

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    29 Files
  • 21
    Jan 21st
    12 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    17 Files
  • 25
    Jan 25th
    34 Files
  • 26
    Jan 26th
    23 Files
  • 27
    Jan 27th
    24 Files
  • 28
    Jan 28th
    14 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close