what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2009-11-30

Debian Linux Security Advisory 1942-1
Posted Nov 30, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1942-1 - Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to the execution of arbitrary code or denial of service.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2009-1268, CVE-2008-1829, CVE-2009-2560, CVE-2009-2562, CVE-2009-3241, CVE-2009-3550, CVE-2009-3829
SHA-256 | aaec69629e4af17984ae9d4966878d216bc3c00d7cdde81901ac2bb020fcc6a0
Mandriva Linux Security Advisory 2009-306
Posted Nov 30, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-306 - Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself. The updated packages have been patched to correct these issues.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2009-3897
SHA-256 | d9571c3961fd47c956899a4032f0b9a1cf3398e9d0bebaf5ba4b56b9ba832758
Mandriva Linux Security Advisory 2009-305
Posted Nov 30, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-305 - PHP 5.2.11, and 5.3.x before 5.3.1, does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, local, php, vulnerability, file inclusion
systems | linux, mandriva
advisories | CVE-2009-4017
SHA-256 | 8588d381d2abb27d9725664cce93b232f3fae39d7e26be16675a82809f1bcc9f
Elxis CMS File Disclosure
Posted Nov 30, 2009
Authored by cr4wl3r

Elxis CMS suffers from a local file disclosure vulnerability.

tags | exploit, local, info disclosure
SHA-256 | 487987ab0b7cc4735c71bb9329c7870c89a23ef7e01c401143372c084829a48c
Mandriva Linux Security Advisory 2009-303
Posted Nov 30, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-303 - Some vulnerabilities were discovered and corrected in php-5.2.11.

tags | advisory, php, vulnerability
systems | linux, mandriva
advisories | CVE-2009-3557, CVE-2009-3558, CVE-2009-4017, CVE-2009-4018
SHA-256 | 844464288de02b7df255dd47353061c269f2ec0291cd09a19dade3c22d33c267
Rootkit Hunter 1.3.6
Posted Nov 30, 2009
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: This release offers more ease of use and improved checks. The changelog lists 29 additions including 9 configuration options and details for 12 rootkits, 29 changes including improvements for 15 rootkit checks, and 22 bugfixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | e3f5e21307e4876da4bc4a1521a86f1cda93ad22d4c77366876d7c170dcefc10
Haraldscan Bluetooth Discovery Scanner 0.401
Posted Nov 30, 2009
Authored by Terence Stenvold | Site code.google.com

Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python.

Changes: CLI has added a Number of devices discovered by duration (default is 15 mins). The duration for the above is configurable through -t TIME. You can choose either an in-memory database or a file database. The option was added to disable services scans entirely even if MAC is "Unknown". The option to disable writing devices to a text file was added. The ability to check Harald Scan version with --version was added.
tags | tool, python, wireless
SHA-256 | 339dde2f9af4e33bd285ca05bffe95f97e3935c6d8e989ada01fcdea73f95a11
Oracle SYS.LT.MERGEWORKSPACE Exploit
Posted Nov 30, 2009
Authored by Andrea Purificato | Site rawlab.mindcreations.com

Oracle SYS.LT.MERGEWORKSPACE exploit that grants DBA permissions to an unprivileged user.

tags | exploit
SHA-256 | b5f65c3b64621f1fbfa980d979a3128fdf9f7c890ed9639577adc336e76c847b
Oracle SYS.LT.REMOVEWORKSPACE Exploit
Posted Nov 30, 2009
Authored by Andrea Purificato | Site rawlab.mindcreations.com

Oracle SYS.LT.REMOVEWORKSPACE exploit that grants DBA permissions to an unprivileged user.

tags | exploit
SHA-256 | 07b2d913a409e84fed4e6008b1954a5cbc7ab0c5010d444cca67e58f320bb38e
Oracle SYS.LT.COMPRESSWORKSPACETREE Exploit
Posted Nov 30, 2009
Authored by Andrea Purificato | Site rawlab.mindcreations.com

Oracle SYS.LT.COMPRESSWORKSPACETREE exploit that grants DBA permissions to an unprivileged user.

tags | exploit
SHA-256 | c4934ec56ac73f45c009b54ec261c44817e099a901e8085b4d1459cdc1924e9b
Oracle ctxsys.drvxtabc.create_tables Cursor Exploit
Posted Nov 30, 2009
Authored by Andrea Purificato | Site rawlab.mindcreations.com

Oracle ctxsys.drvxtabc.create_tables exploit that grants DBA permissions to an unprivileged user. This version uses an evil cursor technique.

tags | exploit
SHA-256 | 8d39a9c0f8690e63871668b6fd563b4fdbd4f753c9719adb00a3640742109bd3
Oracle ctxsys.drvxtabc.create_tables Exploit
Posted Nov 30, 2009
Authored by Andrea Purificato | Site rawlab.mindcreations.com

Oracle ctxsys.drvxtabc.create_tables exploit that grants DBA permissions to an unprivileged user.

tags | exploit
SHA-256 | e21120b8e89846075db130caf29552833db3e64fe9ee8b455ea2ba6ace4336df
SweetRice 0.5.3 Remote / Local File Inclusion
Posted Nov 30, 2009
Authored by cr4wl3r

SweetRice versions 0.5.3 and below suffer from remote and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | 529a5da49d0b6735fd6024195c512d6d1c1fe7308164187db46fa70472b8ee78
MuPDF / SumatraPDF Buffer Overflow
Posted Nov 30, 2009
Authored by Christophe Devine

MuPDF and SumatraPDF suffer from a buffer overflow vulnerability. Proof of concept pdf included.

tags | exploit, overflow, proof of concept
SHA-256 | d1b2e1f9b65330d9953cb0fb733379c0749b72d89292a81f9cfa895e81086553
SweetRice 0.5.0 Remote File Inclusion
Posted Nov 30, 2009
Authored by cr4wl3r

SweetRice versions 0.5.0 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 99bab9000ea3b8689459c7dfa2626db2668846a038c55a42f502f4bbdcda7f2e
HP Security Bulletin HPSBUX02482 SSRT090249
Posted Nov 30, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX OpenSSL. The vulnerability could be exploited remotely to inject unauthorized data or to create a Denial of Service (DoS).

tags | advisory, denial of service
systems | hpux
advisories | CVE-2009-3555
SHA-256 | cd73e680643ad55bacc1b844331635889880e335ca49e558ebed8d627b969708
Secunia Security Advisory 37477
Posted Nov 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 1ef4844dde32a8c1c1ea5be60e0a77b57842c17512e89b292758678529ab0234
Secunia Security Advisory 37446
Posted Nov 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ruby on Rails, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss, ruby
SHA-256 | ae89725a5d18f5f1300dd5f878717d782a267f4930f1fd8334df749ad2cb3a3b
Secunia Security Advisory 37490
Posted Nov 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for tomcat6. This fixes some vulnerabilities, which can be exploited by malicious users to disclose sensitive information or manipulate certain data and by malicious people to cause a DoS (Denial of Service) or disclose sensitive information.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | dbb33008c8a17393e0dfedbadb1496ecbd8e90a05410479d6cb0174ba76684a6
Secunia Security Advisory 37496
Posted Nov 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
systems | linux, fedora
SHA-256 | d21534021a29180dc2c2e9021a5f37b31b8e9de152c340ecbd4d4b8faa88df05
Secunia Security Advisory 37509
Posted Nov 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in Haihaisoft Universal Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 18a6132ef33a501603ce6118ac21acde37a72f0f00fe9893e13441e34c46ebef
Secunia Security Advisory 37513
Posted Nov 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Christophe Devine has reported some vulnerabilities in SumatraPDF, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 57b01ccab30976d284b06a160518fc5587ab5dddd8b4c8a0ea8f4152a15e5d3e
Secunia Security Advisory 37494
Posted Nov 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Christophe Devine has reported some vulnerabilities in MuPDF, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
SHA-256 | 1a4b674837e4cf7f6434211f7f97e23216a74d70f16af1cde8c6d961f091846a
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close