Exploit the possiblities
Showing 51 - 75 of 988 RSS Feed

Files Date: 2008-02-01 to 2008-02-29

Secunia Security Advisory 29116
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Omar Singer has discovered a vulnerability in Plume CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 2c58b24b66af8ed27d0decf0081ea68f
Secunia Security Advisory 29136
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
MD5 | 99e8ba601371632fa1bc38d0ef1e6dc5
Secunia Security Advisory 29113
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wyrd. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
MD5 | 659692391c129ae20e9b7782efd6a91a
iDEFENSE Security Advisory 2008-02-26.3
Posted Feb 27, 2008
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 02.26.08 - Remote exploitation of a heap based buffer overflow vulnerability in Mozilla Organization's Thunderbird could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability exists when parsing the external-body MIME type in an electronic mail. When calculating the number of bytes to allocate for a heap buffer, sufficient space is not reserved for all of the data being copied into the buffer. This results in up to 3 bytes of the buffer being overflowed, potentially allowing for the execution of arbitrary code. iDefense has confirmed the existence of this vulnerability in Thunderbird version 2.0.0.9 on Linux and Windows. Previous versions may also be affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, windows
advisories | CVE-2008-0304
MD5 | ddaf07621a1a38f7abc2ec79b61d446a
iDEFENSE Security Advisory 2008-02-26.2
Posted Feb 27, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 02.26.08 - Remote exploitation of a stack based buffer overflow vulnerability in Symantec Scan Engine version 5.1.2 could allow an unauthenticated attacker to execute arbitrary code with the privileges of the scan engine process. Symantec Scan Engine listens on TCP port 1344 to accept files for scanning using the Internet Content Adaptation Protocol (ICAP). If the service is sent a specially malformed RAR file, a stack-based buffer overflow will occur. iDefense has confirmed this vulnerability in the Linux build of the Symantec Scan Engine version 5.1.2. This issue does not affect the Windows build of the product. Previous versions are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary, tcp, protocol
systems | linux, windows
advisories | CVE-2008-0309
MD5 | 28d026ef014680041c7b0b128293e0ef
iDEFENSE Security Advisory 2008-02-26.1
Posted Feb 27, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 02.26.08 - Remote exploitation of a Denial of Service vulnerability in Symantec Scan Engine version 5.1.2 could allow an unauthenticated attacker to create a denial of service (DoS) condition. Symantec Scan Engine listens on TCP port 1344 to accept files for scanning using the Internet Content Adaptation Protocol (ICAP). If the service is sent a malformed RAR file, the service will consume massive amounts of memory. This can result in a denial of service condition for the application and operating system. iDefense confirmed the existence of this vulnerability in Symantec Scan Engine 5.1.2. This issue affects both the Windows and Linux builds of the product. Previous versions are suspected to be vulnerable.

tags | advisory, remote, denial of service, tcp, protocol
systems | linux, windows
advisories | CVE-2008-0308
MD5 | 3bdef4d0c069163afa87e6e53aa82965
Gentoo Linux Security Advisory 200802-11
Posted Feb 27, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200802-11 - Multiple vulnerabilities have been found in Asterisk. Versions less than 1.2.21.1-r1 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2007-3762, CVE-2007-3763, CVE-2007-3764, CVE-2007-4103
MD5 | 7c51a2ffb28e6611479cc754e70c9347
Gentoo Linux Security Advisory 200802-12
Posted Feb 27, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200802-12 - Damian Frizza and Alfredo Ortega (Core Security Technologies) discovered a stack-based buffer overflow within the open_flac_file() function in the file demux_flac.c when parsing tags within a FLAC file (CVE-2008-0486). A buffer overflow when parsing ASF headers, which is similar to CVE-2006-1664, has also been discovered. Versions less than 1.1.10.1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2006-1664, CVE-2008-0486
MD5 | 2f5040c756ce9cf9fe09574a5577bc2e
Mandriva Linux Security Advisory 2008-051
Posted Feb 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.

tags | advisory, remote, udp
systems | linux, mandriva
advisories | CVE-2008-0886
MD5 | c1ad1151b4d1a2ed06c0b213eb2cba4a
Mandriva Linux Security Advisory 2008-050
Posted Feb 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Dave Camp at Critical Path Software discovered a buffer overflow in CUPS 1.1.23 and earlier could allow local admin users to execute arbitrary code via a crafted URI to the CUPS service. The Red Hat Security Team also found two flaws in CUPS 1.1.x where a malicious user on the local subnet could send a set of carefully crafted IPP packets to the UDP port in such a way as to cause CUPS to crash or consume memory and lead to a CUPS crash. Finally, another flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.

tags | advisory, remote, overflow, arbitrary, local, udp
systems | linux, redhat, mandriva
advisories | CVE-2007-5848, CVE-2008-0596, CVE-2008-0597, CVE-2008-0886
MD5 | 81ed5a71558215cc1fa00282444155b3
Secunia Security Advisory 29084
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with unknown impact has been reported in H-Sphere SiteStudio.

tags | advisory
MD5 | 5bd69999d6299abc285ada7d21f02f9d
Secunia Security Advisory 29095
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dnssec-tools. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
MD5 | 1791f9d66b2ac810e68c1e09e420b5c5
Secunia Security Advisory 29120
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
MD5 | 80987830a26298b49ee9aba34ed4c884
Secunia Security Advisory 29127
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in DNSSEC-Tools, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 69b61a4d38366a50b7b44665de8c6da3
DumpRam.c
Posted Feb 27, 2008
Authored by WarGame

A simple tool for Linux that allows the dumping of all physical memory (RAM).

systems | linux
MD5 | 9226efe8cb4cc30143ed8d879af57099
ezyedit-xss.txt
Posted Feb 26, 2008
Authored by cybermilitant | Site hacktime.org

ezyEdit 2007 is susceptible to cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 01204d9c5dc6055fd3e58aa9af2f8f1e
CVE-2008-0124-s9y.txt
Posted Feb 26, 2008
Authored by Hanno Boeck | Site hboeck.de

Serendipity (S9Y) is vulnerable to cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
advisories | CVE-2008-0124
MD5 | 85e03397b4a76fadb8bb598544eeabb0
nukeditadmin-sql.txt
Posted Feb 26, 2008
Authored by r3dm0v3 | Site r3dm0v3.persianblog.ir

Nukedit version 4.9.x remote create admin SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | dadf6fde3e0b8263c3eb11bff2af6fb8
dbhcms-rfi.txt
Posted Feb 26, 2008
Authored by Ironfist | Site ironwarez.info

DBHcms versions 1.1.4 and below remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
MD5 | 0621fb2b488bc3876d6072f9dc6c32f2
mininuke-sql.txt
Posted Feb 26, 2008
Authored by S@BUN | Site hackturkiye.com

MiniNuke version 2.1 suffers from a remote SQL injection vulnerability in members.asp.

tags | exploit, remote, sql injection, asp
MD5 | 71a0a7fa2cb923e7051a4b95822fb295
xnu-ipv6-ipcomp.c
Posted Feb 26, 2008
Authored by mu-b | Site digit-labs.org

Apple Mac OS X xnu versions 1228.3.13 and below ipv6-ipcomp remote kernel denial of service proof of concept exploit.

tags | exploit, remote, denial of service, kernel, proof of concept
systems | apple, osx
MD5 | d81eb122c53132981eba29d286edc696
rtpbreak-1.3.tgz
Posted Feb 26, 2008
Authored by Michele Dallachiesa | Site xenion.antifork.org

rtpBreak detects, reconstructs and analyzes any RTP [rfc1889] session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protocol. In particular, it does not require the presence of RTCP packets (voipong needs them) that are not always transmitted from the recent VoIP clients.

Changes: Added -w and -W options, improved output files, fixed some bugs, and improved documentation.
tags | tool, udp, sniffer, protocol
MD5 | 3a3458d99734907e1ae35390ff3cc9c1
Secunia Security Advisory 29096
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in SurgeFTP, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | ae3b5b3b21edc4f1bfc769fba461274c
Whitepaper-Hacking-jBoss-using-a-Browser.pdf
Posted Feb 26, 2008
Authored by Joerg Scheinert | Site nruns.com

Hacking A Default jBoss Installation Using A Browser. This paper is a brief how-to on hacking a default installation using the JMX-Console.

tags | paper
MD5 | 7eb87fd95c756ffe30ba6dc3a886a120
phpnukereportaj-sql.txt
Posted Feb 26, 2008
Authored by Lovebug

The PHP-Nuke module reportaj suffers from multiple SQL injection vulnerabilities.

tags | exploit, php, vulnerability, sql injection
MD5 | 829ef419aaf5fee1a4c6d1ac5915a9b8
Page 3 of 40
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    11 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close