what you don't know can hurt you
Showing 1 - 25 of 44 RSS Feed

Files Date: 2010-01-27

Debian Linux Security Advisory 1979-1
Posted Jan 27, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1979-1 - Multiple vulnerabilities have been discovered in lintian, a Debian package checker.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-4013, CVE-2009-4014, CVE-2009-4015
SHA-256 | 66bdce5efc2c4f89600880114fde96c74c17bd93a0f636d2f784a32d116812e2
SAP BusinessObjects Cross Site Scripting
Posted Jan 27, 2010
Authored by Richard Brain | Site procheckup.com

SAP BusinessObjects version 12 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 085ac75868915cdcd505723a58a8951419e5f53a87bd76e3d537fde452b51eec
Ubuntu Security Notice 803-2
Posted Jan 27, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 803-2 - USN-803-1 fixed a vulnerability in Dhcp. Due to an error, the patch to fix the vulnerability was not properly applied on Ubuntu 8.10 and higher. Even with the patch improperly applied, the default compiler options reduced the vulnerability to a denial of service. Additionally, in Ubuntu 9.04 and higher, users were also protected by the AppArmor dhclient3 profile. This update fixes the problem. Original advisory details: It was discovered that the DHCP client as included in dhcp3 did not verify the length of certain option fields when processing a response from an IPv4 dhcp server. If a user running Ubuntu 6.06 LTS or 8.04 LTS connected to a malicious dhcp server, a remote attacker could cause a denial of service or execute arbitrary code as the user invoking the program, typically the 'dhcp' user. For users running Ubuntu 8.10 or 9.04, a remote attacker should only be able to cause a denial of service in the DHCP client. In Ubuntu 9.04, attackers would also be isolated by the AppArmor dhclient3 profile.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-0692
SHA-256 | c90a7824d2bd0d7a5899ee65553262f2b5893da989fde41ccb00958d6d18c356
ProCheckUp Security Advisory 2009.15
Posted Jan 27, 2010
Authored by ProCheckUp, Richard Brain | Site procheckup.com

HP System Management

tags | exploit
SHA-256 | ddcc79a177acbbd59d6d2d079154c3d46d3fcfdbb7f16e567efe08e109ead8d5
Cisco Security Advisory 20100127-mp
Posted Jan 27, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple vulnerabilities exist in Cisco Unified MeetingPlace. These range from insufficient validation of SQL commands to privilege escalation.

tags | advisory, vulnerability
systems | cisco
advisories | CVE-2010-0139, CVE-2010-0140, CVE-2010-0141, CVE-2010-0142
SHA-256 | 4aa2bb0a2d41ca620ec9b7fb3d6cde2d020c75b3fc9ea78f77febad00c3de1b2
MySQL yaSSL SSL Hello Message Buffer Overflow
Posted Jan 27, 2010
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the yaSSL (1.7.5 and earlier) implementation bundled with MySQL <= 6.0. By sending a specially crafted Hello packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-0226
SHA-256 | 8b56d9e271eea43f1c56b4b45991c680b198e3681ff3e9ad94e03dd50625addc
Geo++(R) GNCASTER HTTP Digest Authentication Faulty Implementation
Posted Jan 27, 2010
Site redteam-pentesting.de

During a penetration test, RedTeam Pentesting discovered that the GNCaster software has multiple bugs in its implementation of HTTP Digest Authentication. Versions 1.4.0.7 and below are affected.

tags | advisory, web
SHA-256 | 9d79b054da7caa24e58f55b14bf0e509c7751dadf932bbd3cc895783315d6c75
Geo++(R) GNCASTER Insecure Handling Of NMEA-Data
Posted Jan 27, 2010
Site redteam-pentesting.de

During a penetration test, RedTeam Pentesting discovered that the GNCaster software does not handle NMEA-data correctly. An attacker that has valid login credentials can use this to crash the server software or potentially execute code on the server. Versions 1.4.0.7 and below are affected.

tags | exploit
SHA-256 | c8321376fc3974e6a79d282a3479efecae9a016d1d25c3ce7e253a9da0f392ad
Mandriva Linux Security Advisory 2010-028
Posted Jan 27, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-028 - KDE KSSL in kdelibs 3.5.4, 4.2.4, and 4.3 does not properly handle a \\'\\0\\' (NUL) character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692. The gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc in FreeBSD 6.4 and 7.2, NetBSD 5.0, and OpenBSD 4.5 allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a large precision value in the format argument to a printf function, related to an array overrun. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, spoof
systems | linux, netbsd, freebsd, openbsd, mandriva
advisories | CVE-2009-2702, CVE-2009-2537, CVE-2009-0689
SHA-256 | bcbed668507255178c552af90eaf168b462be20aa49012dc6e3325cff54e5b26
Mod_proxy From Apache 1.3 Integer Overflow
Posted Jan 27, 2010
Authored by Adam Zabrocki

Mod_proxy from Apache 1.3 suffers from an integer overflow. Full details and proof of concept provided.

tags | exploit, overflow, proof of concept
SHA-256 | 11dd93d3866b4c509284c60e2c79acc4279efc7fb07033aa2aaf0688759ed0f2
CamShot SEH Overwrite Exploit
Posted Jan 27, 2010
Authored by tecnik

CamShot version 1.2 SEH overwrite exploit.

tags | exploit
SHA-256 | 8cfbdd7126889ec323f873b5ca4e041d8178af252b9414b780f1e33fcf77ad97
HP Security Bulletin HPSBMA02502 SSRT090171
Posted Jan 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be exploited to gain unauthorized access.

tags | advisory
advisories | CVE-2009-4183
SHA-256 | f005f9cfa047a6194fc3cee0b7cdb059b9ebba599306ba8cfe92220af2f03747
ServersMan 3.1.5 Denial Of Service
Posted Jan 27, 2010
Authored by mr_me

The Apple iPhone/iPod Serversman HTTP server version 3.1.5 suffers from a denial of service vulnerability. Proof of concept included.

tags | exploit, web, denial of service, proof of concept
systems | apple, iphone
SHA-256 | 14826ef462af461e7fb714d5a56e0f06d387feb80e73363c158926d4dd7b98dc
Netsupport Manager Denial Of Service
Posted Jan 27, 2010
Authored by Matthew Whitehead

Netsupport Manager versions prior to Jan 11, 2010 suffered from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 697d0090eaffd9dbe7c2679699615f98262f9c178486afb2f31a815dcc92df61
Joomla Customers Who Bought SQL Injection
Posted Jan 27, 2010
Authored by bhunt3r

The Joomla Customers Who Bought module suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cd8ad83643fa7b5d58c05896b7e2fda1dcf7328e810a07f0986b3143d756ec0a
ShareTronix 1.0.4 Cross Site Scripting
Posted Jan 27, 2010
Authored by MaXe

ShareTronix version 1.0.4 suffers from a html injection / cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 817dd253441e5956c60d6960212f583a0f82663cec4551a180c396943ae62d25
Lalim Compact Player Denial Of Service
Posted Jan 27, 2010
Authored by Red-D3v1L

Lalim Compact Player suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | b8d0ca4537da1f9398b31364d4a69c004d1c269b5be45f0b57c08645e0eba1de
Geo++(R) GNCASTER 1.4.0.7 Insecure Handling Of Long URLs
Posted Jan 27, 2010
Site redteam-pentesting.de

During a penetration test, RedTeam Pentesting discovered that the GNCASTER software does not handle long URLs correctly. An attacker can use this to crash the server software or potentially execute code on the server.Versions 1.4.07 and below are affected.

tags | exploit
SHA-256 | 67f6376c0ea6f3cd887c980ec39b831bccb583cf0aef753ee78c623a431765ae
Weaning The Web Off Of Session Cookies
Posted Jan 27, 2010
Authored by Timothy D. Morgan | Site vsecurity.com

Whitepaper called Weaning The Web Off Of Session Cookies. It compares the security weaknesses and usability limitations of both cookie-based session management and HTTP digest authentication; demonstrating how digest authentication is clearly the more secure system in practice.

tags | paper, web
SHA-256 | 8037409600569b8d43de2c78faf6df1c248608e53de405e52921675f233564e4
Mandriva Linux Security Advisory 2010-027
Posted Jan 27, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-027 - KDE KSSL in kdelibs 3.5.4, 4.2.4, and 4.3 does not properly handle a \\'\\0\\' (NUL) character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle allocation failures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document that triggers write access to an offset of a NULL pointer. WebKit in Apple Safari before 4.0.2, KHTML in kdelibs in KDE, QtWebKit (aka Qt toolkit), and possibly other products does not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to recursion in certain DOM event handlers. WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692. The gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc in FreeBSD 6.4 and 7.2, NetBSD 5.0, and OpenBSD 4.5 allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a large precision value in the format argument to a printf function, related to an array overrun. WebKit, as used in Safari before 3.2.3 and 4 Public Beta, on Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 and Windows allows remote attackers to execute arbitrary code via a crafted SVGList object that triggers memory corruption. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, spoof, javascript
systems | linux, netbsd, windows, freebsd, openbsd, apple, osx, mandriva, iphone
advisories | CVE-2009-2702, CVE-2009-1687, CVE-2009-1725, CVE-2009-1690, CVE-2009-1698, CVE-2009-2537, CVE-2009-0689, CVE-2009-0945
SHA-256 | 701ad2e7099f449e19e82471a31b95691ff8ff843d3d5029da766636d5585359
Joomla 3D Cloud Cross Site Scripting
Posted Jan 27, 2010
Authored by MustLive

The Joomla 3D Cloud component suffers from cross site scripting and html injection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2f0548ab3c0d2730e28512102cb6383dea1d481208f56ea912cb6bbcc9d3dabb
Joomla Virtuemart 1.1.4 SQL Injection
Posted Jan 27, 2010
Authored by bhunt3r

The Joomla Virtuemart component version 1.1.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c26e8777783cbc37cab0493ce13510a293c5dd19ee2ddbf58dc4a3bc936d91fd
Debian Linux Security Advisory 1978-1
Posted Jan 27, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1978-1 - Several remote vulnerabilities have been discovered in phpgroupware, a Web based groupware system written in PHP.

tags | advisory, remote, web, php, vulnerability
systems | linux, debian
advisories | CVE-2009-4414, CVE-2009-4415, CVE-2009-4416
SHA-256 | 69f85bade634aaa80b3a1ffe6f5ddcafd82e697ba944c468ffbf9fa38537dbdd
Methods Of Quick Exploitation Of Blind SQL Injection
Posted Jan 27, 2010
Authored by Dmitriy Evteev | Site securitylab.ru

Whitepaper called Methods Of Quick Exploitation Of Blind SQL Injection.

tags | paper, sql injection
SHA-256 | c69a4c103d432b2d88223df4dc98088b20c316605edf6809bd15d959593d2fd5
LookMer Music Portal Database Disclosure
Posted Jan 27, 2010
Authored by LionTurk

LookMer Music Portal suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | a3ee94babad164467618891403ee460acf6ea0ce265ec1b2dc0617c058fd9c7b
Page 1 of 2
Back12Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close