what you don't know can hurt you
Showing 1 - 25 of 28 RSS Feed

Files Date: 2011-01-14

HP Security Bulletin HPSBUX02608 SSRT100333
Posted Jan 14, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02608 SSRT100333 2 - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote execution of arbitrary code, disclosure of information, and other vulnerabilities. Revision 2 of this advisory.

tags | advisory, java, remote, arbitrary, vulnerability
systems | hpux
advisories | CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3552, CVE-2010-3553, CVE-2010-3554, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3559, CVE-2010-3560, CVE-2010-3561, CVE-2010-3562, CVE-2010-3563, CVE-2010-3564, CVE-2010-3565, CVE-2010-3566, CVE-2010-3567, CVE-2010-3568, CVE-2010-3569, CVE-2010-3570, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574
MD5 | 8eece32cf8d4c7962e639b291a8349a0
Sielco Sistemi Winlog 2.07.00 Stack Overflow
Posted Jan 14, 2011
Authored by Luigi Auriemma

Sielco Sistemi Winlog versions 2.07.00 and below suffer from a stack overflow vulnerability.

tags | advisory, overflow
MD5 | fd15be8690f40b824ec26215e48d42a3
Alguest 1.1c-Patched SQL Injection
Posted Jan 14, 2011
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Alguest version 1.1c-patched suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7c036e7846f5e32926f7a2edab5eac87
Debian Security Advisory 2143-1
Posted Jan 14, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2143-1 - Several vulnerabilities have been discovered in the MySQL database server.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-3677, CVE-2010-3680, CVE-2010-3681, CVE-2010-3682, CVE-2010-3833, CVE-2010-3834, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838, CVE-2010-3840
MD5 | 190b1586ae0725ffb7c7de007fc74f13
Mandriva Linux Security Advisory 2011-009
Posted Jan 14, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-009 - Stack-based buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow context-dependent attackers to execute arbitrary code via a long command-line argument, as demonstrated by a CGI program that launches gif2png. Buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow context-dependent attackers to cause a denial of service (application crash) or have unspecified other impact via a GIF file that contains many images, leading to long extensions such as.p100 for PNG output files, as demonstrated by a CGI program that launches gif2png, a different vulnerability than CVE-2009-5018.

tags | advisory, denial of service, overflow, arbitrary, cgi
systems | linux, mandriva
advisories | CVE-2009-5018, CVE-2010-4694
MD5 | d3e60d005b03aaa97579f20e42a1b48d
Mandriva Linux Security Advisory 2011-008
Posted Jan 14, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-008 - Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors. NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.

tags | advisory, remote, web, arbitrary, cgi
systems | linux, mandriva
advisories | CVE-2010-4411
MD5 | b7d7c18882351e92ba9195d839592af5
Mandriva Linux Security Advisory 2011-007
Posted Jan 14, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-007 - Buffer overflow in the MAC-LTE dissector in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of RARs. The updated packages have been upgraded to the latest version which is not affected by this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2011-0444
MD5 | da23e42d38bc494560f636ae0090873f
Mandriva Linux Security Advisory 2011-006
Posted Jan 14, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-006 - The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections. Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.

tags | advisory, remote, web, denial of service, memory leak
systems | linux, mandriva
advisories | CVE-2010-4539, CVE-2010-4644
MD5 | 21f68cfded4bb3660d0d738cd1483079
Objectivity/DB Lack Of Authentication
Posted Jan 14, 2011
Authored by Jeremy Brown

Objectivity/DB includes many different tools for administration. The problem is, anyone can use these tools to perform operations on the host running the lock server, advanced multithreaded server, and probably it's other servers as well, without any authentication. This design flaw puts the host running these servers at risk of potentially unauthorized operations being performed on the system, locally or remotely. This exploit demonstrates this issue and was tested on Objectivity/DB 10 running on Windows.

tags | exploit
systems | windows
MD5 | b3a1c91160229b1a6518a12d9b050459
Joomla People 1.0.0 SQL Injection
Posted Jan 14, 2011
Authored by Salvatore Fresta | Site salvatorefresta.net

Joomla People component version 1.0.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ae3a083eb30b5c9ae00492154c410d3e
ICQ 7 Failed Origin Check
Posted Jan 14, 2011
Authored by Daniel Seither

ICQ 7 does not check the identity of the update server or the authenticity of the updates that it downloads through its automatic update mechanism. By impersonating the update server (think DNS spoofing), an attacker can act as an update server of its own and deliver arbitrary files that are executed on the next launch of the ICQ client. Since ICQ is automatically launched right after booting Windows by default and it checks for updates on every start, it can be attacked very reliably.Proof of concept code included.

tags | exploit, arbitrary, spoof, proof of concept
systems | windows
MD5 | 800c022bdc9d8cf1f3d850bdd9aaf7cd
Blackmoon FTP 3.1 Denial Of Service
Posted Jan 14, 2011
Authored by Craig Freyman

Blackmoon FTP version 3.1 build 1735,1736 denial of service exploit.

tags | exploit, denial of service
MD5 | 91d06b7cc606a36b669c148d1e27793d
PHP Dompdf File Remote File Inclusion
Posted Jan 14, 2011
Authored by jos_ali_joe

PHP Dompdf File suffers from a remote file inclusion vulnerability.

tags | exploit, remote, php, code execution, file inclusion
MD5 | c708d88494f009faddfd156f4ed4dedd
Session Hijacking Basics
Posted Jan 14, 2011
Authored by Filipe Barros

Whitepaper called Session Hijacking Basics.

tags | paper, web
MD5 | 4f9d1dc616b049a5b82564cd89077ac7
Secunia Security Advisory 42929
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Mosets Tree component for Joomla!, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | 9d2ea4a3ba6c700de8a99af7fc5d5e4b
Secunia Security Advisory 42875
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mysql-dfsg-5.0. This fixes multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 13dbe3a3070a68a744f3c4f742ab9641
Secunia Security Advisory 42904
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Sybase EAServer, which can be exploited by malicious people to disclose sensitive information and bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | 4ee5731dfc07098311240cc31d881743
Secunia Security Advisory 42892
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for gcc. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
MD5 | 9cbbd000db387563c2f8fc7fec2c06c4
glfusion CMS 1.2.1 Cross Site Scripting
Posted Jan 14, 2011
Authored by Saif El-Sherei

glfusion CMS version 1.2.1 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | 236cf3a2b70166ea6972316935790722
Secunia Security Advisory 42914
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | 0af1c9503d28a8b199152e817f387e01
Secunia Security Advisory 42894
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Winlog Pro, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | d532f4a88c601699ab1827b2a6f123da
Secunia Security Advisory 42912
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for pcsc-lite. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
MD5 | eddcd50933a222fa78ebc61c374924a4
Secunia Security Advisory 42913
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for Django. This fixes two security issues, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | 39f828180fb0fac70d3121c8b910e38c
Secunia Security Advisory 42901
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Objectivity/DB, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 7b9ba71c08dcfbc621c7ae3e4326aae5
Secunia Security Advisory 42859
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the NVIDIA CUDA Toolkit Developer Drivers for Linux, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local, vulnerability
systems | linux
MD5 | 3a50d75333564445c385ec7061935235
Page 1 of 2
Back12Next

File Archive:

February 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    33 Files
  • 2
    Feb 2nd
    30 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    8 Files
  • 5
    Feb 5th
    11 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    1 Files
  • 8
    Feb 8th
    37 Files
  • 9
    Feb 9th
    15 Files
  • 10
    Feb 10th
    11 Files
  • 11
    Feb 11th
    26 Files
  • 12
    Feb 12th
    8 Files
  • 13
    Feb 13th
    1 Files
  • 14
    Feb 14th
    1 Files
  • 15
    Feb 15th
    9 Files
  • 16
    Feb 16th
    33 Files
  • 17
    Feb 17th
    6 Files
  • 18
    Feb 18th
    10 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    1 Files
  • 21
    Feb 21st
    1 Files
  • 22
    Feb 22nd
    17 Files
  • 23
    Feb 23rd
    15 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    28 Files
  • 26
    Feb 26th
    25 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close