exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2008-04-05 to 2008-04-06

Secunia Security Advisory 29607
Posted Apr 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, redhat
SHA-256 | ba9978c6dd36270b7bb749cf4cfc39b45e461e3b59b5e5c4167fb73e7b549cfa
Debian Linux Security Advisory 1539-1
Posted Apr 5, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1539-1 - Chris Schmidt and Daniel Morissette discovered two vulnerabilities in mapserver, a development environment for spatial and mapping applications. Lack of input sanitizing and output escaping in the CGI mapserver's template handling and error reporting routines leads to cross-site scripting vulnerabilities. Missing bounds checking in mapserver's template handling leads to a stack-based buffer overrun vulnerability, allowing a remote attacker to execute arbitrary code with the privileges of the CGI or httpd user.

tags | advisory, remote, overflow, arbitrary, cgi, vulnerability, xss
systems | linux, debian
advisories | CVE-2007-4542, CVE-2007-4629
SHA-256 | 4e03e1d418c78d4f766449d62f4f3edfe4ee522c8a3346892eadea4de97ee86d
Debian Linux Security Advisory 1538-1
Posted Apr 5, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1538-1 - Erik Sjolund discovered a buffer overflow vulnerability in the Ogg Vorbis input plugin of the alsaplayer audio playback application. Successful exploitation of this vulnerability through the opening of a maliciously-crafted Vorbis file could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-5301
SHA-256 | 6f3b7b5c07f055fae27675663af4a6564e2b826e468e5fba31f6304d7692567a
CAarc-multi.txt
Posted Apr 5, 2008
Authored by Ken Williams | Site www3.ca.com

CA Security Advisory - CA ARCserve Backup for Laptops and Desktops Server contains multiple vulnerabilities that can allow a remote attacker to execute arbitrary code or cause a denial of service condition. CA has issued updates to address the vulnerabilities. The first issue occurs due to insufficient bounds checking on command arguments by the LGServer service. The second issue occurs due to insufficient verification of file uploads by the NetBackup service. In most cases, an attacker can potentially gain complete control of an affected installation. Additionally, only a server installation of BrightStor ARCserve Backup for Laptops and Desktops is affected. The client installation is not affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability, file upload
advisories | CVE-2008-1328, CVE-2008-1329
SHA-256 | 465613d80f35d24daf2fd29de5df3e3834e3533ddc03f34fa29343c01188d0fe
CAalert-multi.txt
Posted Apr 5, 2008
Authored by Ken Williams | Site www3.ca.com

CA Security Advisory - CA Alert Notification Server service contains multiple vulnerabilities that can allow a remote authenticated attacker to execute arbitrary code or cause a denial of service condition. CA has issued updates to address the vulnerabilities. The vulnerabilities are due to insufficient bounds checking in multiple procedures. A remote authenticated attacker or local user can exploit a buffer overflow to execute arbitrary code or cause a denial of service.

tags | advisory, remote, denial of service, overflow, arbitrary, local, vulnerability
advisories | CVE-2007-4620
SHA-256 | 87c606935857a14dd69d4559e0de12e92406b71e84be5dad04da16eda476df5d
HP Security Bulletin 2008-00.32
Posted Apr 5, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with two types of optional HP USB Floppy Drive Keys intended for use with certain ProLiant servers. This vulnerability could cause a local 'W32.Fakerecy' or 'W32.SillyFDC' virus infection.

tags | advisory, local, virus
advisories | CVE-2008-0708
SHA-256 | d91bf5de69ed7863bd3a53d32f7430f4ded5bd0537a568bea144b3bc0dd5cbe1
NDSA20080215.txt
Posted Apr 5, 2008
Authored by Tim Brown | Site nth-dimension.org.uk

Nth Dimension Security Advisory (NDSA20080215) - The Festival server is vulnerable to unauthenticated remote code execution. Further research indicates that this vulnerability has already been reported as a local privilege escalation against both the Gentoo and SuSE GNU/Linux distributions. The remote form of this vulnerability was identified in 1.96~beta-5 as distributed in Debian unstable but it is also believed that Ubuntu Hardy Heron was affected.

tags | advisory, remote, local, code execution
systems | linux, suse, debian, gentoo, ubuntu
SHA-256 | 679be8c3c5c41b4fce67f2ff8f104fcb7afbc9d058857614bb4a84ab75341837
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close