exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 92 RSS Feed

Files Date: 2007-05-03 to 2007-05-04

Mandriva Linux Security Advisory 2007.097
Posted May 3, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A problem with the way xscreensaver verifies user passwords was discovered by Alex Yamauchi. When a system is using remote authentication (i.e. LDAP) for logins, a local attacker able to cause a network outage on the system could cause xscreensaver to crash, which would unlock the screen.

tags | advisory, remote, local
systems | linux, mandriva
advisories | CVE-2007-1859
SHA-256 | bd6ea4fe888f2d8f67328e5e2797f47bb793f3c6aaf724d821bc118d19df96ce
TPTI-07-06.txt
Posted May 3, 2007
Authored by Pedram Amini | Site dvlabs.tippingpoint.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cerulean Studios Trillian Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Rendezvous / XMPP (Extensible Messaging and Presence Protocol) messaging subsystem. Trillian locates nearby users through the '_presence' mDNS (multicast DNS) service on UDP port 5353. Once a user is registered through mDNS, messaging is accomplished via XMPP over TCP port 5298.

tags | advisory, remote, arbitrary, udp, tcp, protocol
advisories | CVE-2007-2418
SHA-256 | 2fbe961a03444391b1fc35b9482c4017e92353628e9ec1605fa9996224f7441b
TPTI-07-05.txt
Posted May 3, 2007
Authored by Aaron Portnoy | Site dvlabs.tippingpoint.com

A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of IBM Tivoli Provisioning Manager for OS Deployment. Authentication is not required to exploit this vulnerability. The specific flaws exist in the handling of HTTP requests to the rembo.exe service listening on TCP port 8080. Several components of an HTTP request can be modified to trigger buffer overflows. For example, by supplying an overly long filename an attacker is able to overflow a 150 byte stack buffer and subsequently execute arbitrary code.

tags | advisory, remote, web, overflow, arbitrary, tcp
advisories | CVE-2007-1868
SHA-256 | f65866c78f7bb498f38dd97caeb0ed17fc84a6714768fecf96aa9e304bd1c62e
Mandriva Linux Security Advisory 2007.096
Posted May 3, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The BGP routing daemon in Quagga did not properly validate length values in NLRI attributes which could allow a remote attacker to cause a denial of service via a crafted UPDATE message that triggered an assertion error or out of bounds read.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2007-1995
SHA-256 | 751730867882a5c9d6a763a58a6b0a8973c8c346b2b6fea2b84b9e097baff778
Debian Linux Security Advisory 1286-1
Posted May 3, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1286-1 - Several local and remote vulnerabilities have been discovered in the Linux 2.6 kernel that may lead to a denial of service or the execution of arbitrary code.

tags | advisory, remote, denial of service, arbitrary, kernel, local, vulnerability
systems | linux, debian
advisories | CVE-2007-0005, CVE-2007-0958, CVE-2007-1357, CVE-2007-1592
SHA-256 | 72ace028690c1ac846278f5e7f4d5d52a2d53a4f7e398bf44dfa8822b2a5e465
iDEFENSE Security Advisory 2007-05-02.1
Posted May 3, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 05.02.07 - Remote exploitation of a heap overflow vulnerability within LiveData's Protocol Server could allow an attacker to cause the service to crash or potentially execute arbitrary code with SYSTEM privileges. iDefense has confirmed the existence of this vulnerability in LiveData Protocol Server version 5.00.045 which was the current release as of September 13th 2006.

tags | advisory, remote, overflow, arbitrary, protocol
SHA-256 | d2168fc5f09b9336d21e4398c99c6b284bf69b052840d5fa6156063914825764
Cisco Security Advisory 20070502-asa
Posted May 3, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco Adaptive Security Appliance (ASA) and PIX security appliances. These vulnerabilities include two Lightweight Directory Access Protocol (LDAP) authentication bypass vulnerabilities and two denial of service (DoS) vulnerabilities.

tags | advisory, denial of service, vulnerability, protocol
systems | cisco
SHA-256 | 938b16270987c9949389c0f5f59abe21ef4c478ccd6f2b976da7d85360cd4f56
mailcopa.txt
Posted May 3, 2007
Site skilltube.com

MailCopa is susceptible to an arbitrary code execution vulnerability.

tags | advisory, arbitrary, code execution
SHA-256 | 50dce7d02353605899b2977d154541cb034851dcbfbfb59fd3445cf88d6b443a
Ubuntu Security Notice 456-1
Posted May 3, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 456-1 - A really old denial of service issue with net-snmp has finally been fixed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2005-4837
SHA-256 | 125fdfb43df19722f1ab66d2c154cbb6495fd4ae38d1e6b3b9352c02f61f4b12
Gentoo Linux Security Advisory 200705-5
Posted May 3, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200705-05 - The Quagga development team reported a vulnerability in the BGP routing daemon when processing NLRI attributes inside UPDATE messages. Versions less than 0.98.6-r2 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-1995
SHA-256 | 6a607378c17401310a4268154ac4c1cd8b508e5d326576bb411a8c6602ac212b
Gentoo Linux Security Advisory 200705-4
Posted May 3, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200705-04 - Alex Solvey discovered that the path_info variable used in file RegistryCooker.pm (mod_perl 2.x) or file PerlRun.pm (mod_perl 1.x), is not properly escaped before being processed. Versions less than 1.30 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-1349
SHA-256 | 9e5a6dcdbd9b47cf10b752a5cf947783beb13a0c3c7d1e64f9432dc44e3893bb
CMSmadesimple-sql.txt
Posted May 3, 2007
Authored by Daniel Lucq | Site scanit.be

CMS Made Simple version 1.05 is susceptible to a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | e738af64f8d980e5b68b264308728a14da5a690aba0b0207f657b9c11a441998
woot07-cfp.txt
Posted May 3, 2007
Site usenix.org

WOOT '07 Call For Papers - The First USENIX Workshop on Offensive Technologies (WOOT) will be held August 6, 2007 in Boston, MA, USA.

tags | paper, conference
SHA-256 | 3629d47e087f7256727ca7e5600e1144b8d83649cc6fe4487b1108deef981177
Atomixb0f.zip
Posted May 3, 2007
Authored by PRETH00NKER | Site mexhackteam.org

AtomixMP3 is susceptible to a buffer overflow condition. Advisory and proof of concept exploit included.

tags | exploit, overflow, proof of concept
SHA-256 | 4e57cf5f8d570dea7dc7efbc57cb118f037eae3d6e69307c5c66cd35b870e19c
Mandriva Linux Security Advisory 2007.095
Posted May 3, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A directory traversal vulnerability was found in KTorrent prior to 2.1.2, due to an incomplete fix for a prior directory traversal vulnerability that was corrected in version 2.1.2. Previously, KTorrent would only check for the string .., which could permit strings such as ../.

tags | advisory
systems | linux, mandriva
advisories | CVE-2007-1799
SHA-256 | 95e6acfad66c7d3960aa609df736b5c6c92cfe0c12dae9aefc472859674d3a16
Zero Day Initiative Advisory 07-023
Posted May 3, 2007
Authored by Tipping Point, Dino A. Dai Zovi | Site zerodayinitiative.com

A vulnerability allows attackers to execute arbitrary code on systems with vulnerable installations of Apple's QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.

tags | advisory, arbitrary
systems | apple
advisories | CVE-2007-2175
SHA-256 | ba713c314baf1496080cf8a7f18d2fc09ea9f48434abc1007d75e1a4358968f5
Gentoo Linux Security Advisory 200705-3
Posted May 3, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200705-03 - Tomcat allows special characters like slash, backslash or URL-encoded backslash as a separator, while Apache does not. Versions less than 5.5.22 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-0450
SHA-256 | af5ff8f4aba2e8e66a38f61809dad3fef6df6019b9e4b4050eaf522de529babc
Gentoo Linux Security Advisory 200705-2
Posted May 3, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200705-02 - Greg MacManus of iDefense Labs has discovered an integer overflow in the function bdfReadCharacters() when parsing BDF fonts. Versions less than 2.1.10-r3 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2007-1351
SHA-256 | b8b78c0b16839c9d9ee86e8b2030072f94aa9dffa92ae1fd77a6499c2192ef60
Gentoo Linux Security Advisory 200705-1
Posted May 3, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200705-01 - Bryan Burns of Juniper Networks discovered a vulnerability in chunkcounter.cpp when processing large or negative idx values, and a directory traversal vulnerability in torrent.cpp. Versions less than 2.1.3 are affected.

tags | advisory
systems | linux, gentoo, juniper
advisories | CVE-2007-1384, CVE-2007-1385, CVE-2007-1799
SHA-256 | b57efc215d1526e13a88dad0980b79388b365f50a3326ebe8a381ad5c7ef0948
Debian Linux Security Advisory 1285-1
Posted May 3, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1285-1 - WordPress versions 2.1.2 and below suffer from cross site scripting and SQL injection vulnerabilities.

tags | advisory, vulnerability, xss, sql injection
systems | linux, debian
advisories | CVE-2007-1622, CVE-2007-1893, CVE-2007-1894, CVE-2007-1897
SHA-256 | a98a6076e468434c9252d39dd5d954bd709dea42a7ef308569745adce9f4a38d
yate-dos.txt
Posted May 3, 2007
Authored by Yuri Gushin

Yate version 1.1.0 suffers from a denial of service vulnerability due to a null pointer reference.

tags | advisory, denial of service
advisories | CVE-2007-1693
SHA-256 | bf971e0d8192dbc7b4a1f344f636029f44bae424d1afdfc4430a2a296f1f7ee1
iDEFENSE Security Advisory 2007-04-30.1
Posted May 3, 2007
Authored by iDefense Labs, enhalos | Site idefense.com

iDefense Security Advisory 04.30.07 - Remote exploitation of multiple vulnerabilities in the Internet Relay Chat (IRC) module of Cerulean Studios' Trillian could allow for the interception of private conversations or execution of code as the currently logged on user. When handling long CTCP PING messages containing UTF-8 characters, it is possible to cause the Trillian IRC client to return a malformed response to the server. This malformed response is truncated and is missing the terminating newline character. This could allow the next line sent to the server to be improperly sent to an attacker. When a user highlights a URL in an IRC message window Trillian copies the data to an internal buffer. If the URL contains a long string of UTF-8 characters, it is possible to overflow a heap based buffer corrupting memory in a way that could allow for code execution. A heap overflow can be triggered remotely when the Trillian IRC module receives a message that contains a font face HTML tag with the face attribute set to a long UTF-8 string. iDefense has confirmed the existence of this vulnerability in Cerulean Studios Trillian 3.1.

tags | advisory, remote, overflow, vulnerability, code execution
SHA-256 | 52ff569f01cf668cdc9ed199dd0dfde4c56ca3d899c956a30770ee3961bca59c
za6.txt
Posted May 3, 2007
Site matousec.com

ZoneAlarm 6 insufficiently protects the \Device\vsdatant driver from manipulation by malicious applications.

tags | advisory
SHA-256 | 655d93d220df07a7674c237d2624e5f29d3aa3437c307a52a5e3e13a794493f6
Debian Linux Security Advisory 1284-1
Posted May 3, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1284-1 - Several vulnerabilities have been discovered in the QEMU processor emulator, which may lead to the execution of arbitrary code or denial of service.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2007-1320, CVE-2007-1321, CVE-2007-1322, CVE-2007-1323, CVE-2007-1366
SHA-256 | f124a37a9317e0c8bf7a05197fcbf8c27cfaf939d12fd5f7217c496efe0fc02a
eannu-sql.txt
Posted May 3, 2007
Authored by Ilker Kandemir

E-Annu is susceptible to a SQL injection vulnerability in home.php.

tags | exploit, php, sql injection
SHA-256 | 9ca3b07db9f6299c7ab271ec4288ab4317b9c88efea943748f367f9d19ff0f4c
Page 1 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close