what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 754 RSS Feed

Files Date: 2007-01-01 to 2007-01-31

ohh-indirect-privilege-escalation.pdf
Posted Jan 30, 2007
Authored by David Litchfield | Site ngssoftware.com

Defeating Virtual Private Databases, a chapter from the Oracle Hacker's Handbook.

tags | paper
SHA-256 | 7cf148e1ab70f4357ff232e00ce6a5f24bef89a12e5de8bc87246be02511702f
ohh-defeating-vpd.pdf
Posted Jan 30, 2007
Authored by David Litchfield | Site ngssoftware.com

Indirect Privilege Escalation, a chapter from the Oracle Hacker's Handbook.

tags | paper
SHA-256 | 7f8124fe32864ca4771a493debdf86f128eba3b844b6479d4bfc1da1fee9ff8a
OpenPKG Security Advisory 2007.8
Posted Jan 30, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - Ralf S. Engelschall from OpenPKG GmbH discovered a Denial of Service (DoS) vulnerability in the CVS/Subversion/Git Version Control System (VCS) frontend CVSTrac, version 2.0.0.

tags | advisory, denial of service
advisories | CVE-2007-0347
SHA-256 | 1db2c81b325a11b28837a0856dc30080a87ebbd7a7462ccc43a328ae1aaabdf4
cvstrac200-dos.txt
Posted Jan 30, 2007
Authored by Ralf S. Engelschall | Site engelschall.com

A denial of service vulnerability exists in CVSTrac version 2.0.0.

tags | advisory, denial of service
advisories | CVE-2007-0347
SHA-256 | c3e819ccb3c01d6ba451eb4cc93f2bda4fecfbbdbff2faf373697b773a92b7c7
Universal_printer_provider_exploit.zip
Posted Jan 30, 2007
Authored by Andres Tarasco | Site 514.es

Universal exploit for vulnerable EnumPrintersW() calls related to the spooler service. Allows code execution with SYSTEM privileges. Affected includes DiskAccess NFS Client (dapcnfsd.dll version 0.6.4.0), Citrix Metaframe - cpprov.dll, and Novell - nwspool.dll.

tags | exploit, code execution
advisories | CVE-2006-5854
SHA-256 | 2b62efa9f7692468c57fd5ccfb6faa392631ea515d577bee9c4b44042069ea68
mdpro-sql.txt
Posted Jan 30, 2007
Authored by adexior

MDPro version 1.0.76 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 67b93c40bf535eae6b65f8d736d5676b8f99e6ee8e43003bae1bc46428309adb
phorum-xss.txt
Posted Jan 30, 2007
Authored by DoZ | Site hackerscenter.com

Phorum version 5.1.18 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | d7d2b47d9dbdca9ea9a6793b7db5dbf6d0f4a006257debc2f52d2fc35f2f5eee
VIINCIS-CFP2007.txt
Posted Jan 30, 2007
Site acis.org.co

Call for papers for the VII National Computer and Information Security Conference ACIS 2007.

tags | paper, conference
SHA-256 | dd0782f05bae52eecf61023092cd375013e530fc91712ed24047b14d4a4fcd1b
OpenPKG Security Advisory 2007.7
Posted Jan 30, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - As confirmed by vendor security advisories, two security issues exist in the DNS server BIND, versions up to 9.3.4. The first issue is a "use after free" vulnerability which allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors that cause BIND to "dereference (read) a freed fetch context". The second issue allows remote attackers to cause a Denial of Service (DoS) via a type "*" (ANY) DNS query response that contains multiple resource record (RR) sets in the answer section, which triggers an assertion error. To be vulnerable you need to have enabled DNSSEC validation in the configuration by specifying "trusted-keys".

tags | advisory, remote, denial of service
advisories | CVE-2007-0493, CVE-2007-0494
SHA-256 | efdefa323f0250b7bbccf97b1808ac633e806735791adbf26f360bd1575549c6
Debian Linux Security Advisory 1254-1
Posted Jan 30, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1254-1 - It was discovered that the Bind name server daemon is vulnerable to denial of service by triggering an assertion through a crafted DNS query. This only affects installations which use the DNSSEC extensions. Please note that the CVE listed in this advisory is incorrect.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 6cd0b28f7a592d03c87e7a76555f16a04e17f15468171c11f59095f9b4adf432
MOAB-28-01-2007.rb.txt
Posted Jan 29, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - crashdump follows symlinks within the /Library/Logs/CrashReporter/ directory, allowing admin-group users to execute arbitrary code and overwrite files with elevated privileges. In couple with a specially crafted Mach-O binary, this can be used to write a malicious crontab entry, which will run with root privileges. This ruby code demonstrates this vulnerability.

tags | exploit, arbitrary, root, ruby
systems | apple
advisories | CVE-2007-0467
SHA-256 | a2f484f050a3539545bc04527aebfb7718411d5e564498448fa7024d15700ebe
MOAB-27-01-2007.tgz
Posted Jan 29, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Flip4Mac fails to properly handle WMV files with a crafted ASF_File_Properties_Object size field, leading to an exploitable memory corruption condition, which can be abused remotely for arbitrary code execution. This tgz holds a malicious .wmv file that demonstrates this vulnerability.

tags | exploit, arbitrary, code execution
systems | apple
advisories | CVE-2007-0466
SHA-256 | 5b0f7f222237672bd530a2f1c52368b0a593f5907f49c47913ca01b2f7900a50
zzuf-0.7.tar.gz
Posted Jan 29, 2007
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

tags | fuzzer
SHA-256 | af33c3e95ab78780cc665425a8501f20125bfaafaa42c3a591b2d0d864512fd7
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Jan 29, 2007
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: strongSwan now interoperates with the NCP Secure Entry Client, the Shrew Soft VPN Client, and the Cisco VPN client, doing both XAUTH and Mode Config. UNITY attributes are now recognized and UNITY_BANNER is set to a default string.
tags | kernel, encryption
systems | linux
SHA-256 | 0592405ee0823ab30ba95d77a05c4c3abf75a7700369c7081cf3027f88779728
advchk-1.03.tar.gz
Posted Jan 29, 2007
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | 7647220d9c735a9b47abfad651bc8d1729cce27857d94c6cbefbe73b4a289997
Writing_nasl_scripts.pdf
Posted Jan 29, 2007
Authored by Hemil Shah

Small whitepaper discussing Nessus and the functions related to writing NASL scripts along with some debugging tips.

tags | paper
SHA-256 | 5dcce405cebc18a2ae6613adf1d60c2234575ab10fafd44022e7bd6710af2778
MsgEng.py.txt
Posted Jan 29, 2007
Authored by Winny Thomas

Heap overflow exploit for msgeng.exe in Computer Associates BrightStor ARCserve Backup.

tags | exploit, overflow
SHA-256 | a973115577880be9cb7f40039a629b7c8037ece864581b839544fb8c6ac71cb9
Gentoo Linux Security Advisory 200701-25
Posted Jan 29, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200701-25 - Multiple memory corruption vulnerabilities have been found in the ProcDbeGetVisualInfo() and the ProcDbeSwapBuffers() of the DBE extension, and ProcRenderAddGlyphs() in the Render extension. Versions less than 1.1.1-r4 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 3fadaad7ec9d1fb7eac7fa1a9be6db52dde726e16a943a5cfc90ae29ac43e978
Debian Linux Security Advisory 1253-1
Posted Jan 29, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1253-1 - Several security related problems have been discovered in Mozilla and derived products such as Mozilla Firefox. Several vulnerabilities in the layout engine allow remote attackers to cause a denial of service and possibly permit them to execute arbitrary code. Several vulnerabilities in the JavaScript engine allow remote attackers to cause a denial of service and possibly permit them to execute arbitrary code. A bug in the js_dtoa function allows remote attackers to cause a denial of service. "shutdown" discovered a vulnerability that allows remote attackers to gain privileges and install malicious code via the watch JavaScript function. Steven Michaud discovered a programming bug that allows remote attackers to cause a denial of service. "moz_bug_r_a4" reported that the src attribute of an IMG element could be used to inject JavaScript code.

tags | advisory, remote, denial of service, arbitrary, javascript, vulnerability
systems | linux, debian
advisories | CVE-2006-6497, CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503
SHA-256 | 903b8d0b1637e035832fd2e1b4594cbb4040713c207066157a72c19363a420f3
lcs11-rfi.txt
Posted Jan 29, 2007
Authored by Tr_ZiNDaN

Local Calendar System version 1.1 suffers from a remote file inclusion flaw.

tags | exploit, remote, local, code execution, file inclusion
SHA-256 | c50edb7132dd5b2668271546d7f7ae83b5d0845c3dac08229c7671e138c9c4cd
Debian Linux Security Advisory 1252-1
Posted Jan 29, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1252-1 - Kevin Finisterre discovered several format string problems in vlc, a multimedia player and streamer, that could lead to the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2007-0017
SHA-256 | b0db124c8561325792c13a5af9c131d5054868d9821503f2946b24f92ead5191
admentor-sql.txt
Posted Jan 29, 2007
Authored by sn0oPy

AdMentor suffers from a SQL injection vulnerability that allows for login bypass.

tags | exploit, sql injection
SHA-256 | 963c580bc9e516ab4a0a77b6412697f0b757200ddd54f6e66e93392c639e7af7
stompy.tgz
Posted Jan 29, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Stompy is a free tool to perform a fairly detailed black-box assessment of WWW session identifier generation algorithms. Session IDs are commonly used to track authenticated users, and as such, whenever they're predictable or simply vulnerable to brute-force attacks, we do have a problem.

tags | web
SHA-256 | dcd57db394e72ee795957f83e0d04d93a1be556851e9863fb99cda714b1c58de
Ubuntu Security Notice 398-4
Posted Jan 29, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 398-4 - USN-398-2 fixed vulnerabilities in Firefox 1.5. However, when auto-filling saved-password login forms without a username field, Firefox would crash. This update fixes the problem.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2006-6497, CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502, CVE-2006-6504, CVE-2006-6503
SHA-256 | bea97abaa047b10151e1f611823e730cf0576315c5c5e840a4936905b535ad69
Mandriva Linux Security Advisory 2007.029
Posted Jan 29, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.

tags | advisory, remote, web, denial of service
systems | linux, mandriva
advisories | CVE-2006-5876
SHA-256 | 67370c064597b1b36cf3c0e4cc4bc41027683a938bcdd961a84d300d60b2634f
Page 1 of 31
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close