exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2008-05-07 to 2008-05-08

Dradis Information Sharing Tool 1.2
Posted May 7, 2008
Authored by etd | Site dradis.nomejortu.com

dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.

tags | web
SHA-256 | 2851229d6d96c3f46c369880a065f21a90bc2f811297c7114f9152e9648c7f1d
frs-lfi.txt
Posted May 7, 2008
Authored by Matrix86

The PHP-Fusion module Forum Rank System version 6 suffers from a local file inclusion vulnerability.

tags | exploit, local, php, file inclusion
SHA-256 | 04f76e5ed4a0b2c4528a2f8ed6e2df819f5da6eed04dde13409bfe77d7270540
Ubuntu Security Notice 610-1
Posted May 7, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 610-1 - Christian Herzog discovered that it was possible to connect to any LTSP client's X session over the network. A remote attacker could eavesdrop on X events, read window contents, and record keystrokes, possibly gaining access to private information.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2008-1293
SHA-256 | cb3abaade449396b06a92dfa2c942915a1d0de11c5182e0be4bee6bc0db93776
Ubuntu Security Notice 609-1
Posted May 7, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 609-1 - It was discovered that arbitrary Java methods were not filtered out when opening databases in OpenOffice.org. If a user were tricked into running a specially crafted query, a remote attacker could execute arbitrary Java with user privileges. Multiple memory overflow flaws were discovered in OpenOffice.org's handling of Quattro Pro, EMF, and OLE files. If a user were tricked into opening a specially crafted document, a remote attacker might be able to execute arbitrary code with user privileges.

tags | advisory, java, remote, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-4575, CVE-2007-5745, CVE-2007-5746, CVE-2007-5747, CVE-2008-0320
SHA-256 | c38f3f985ebc83c65928bb7d71bee2febda5aa6a848aa40aaf78da2c6ea8c16a
adobe-print-v2.txt
Posted May 7, 2008
Authored by cocoruder | Site ruder.cdut.net

A design error vulnerability exists in Adobe Reader and Adobe Acrobat Professional. A remote attacker who successfully exploit this vulnerability can control the printer without user's permission. Affected software versions include Adobe Reader 8.1.1 and below and Adobe Acrobat Professional 8.1.1 and below. This is an updated advisory.

tags | advisory, remote
advisories | CVE-2008-0655
SHA-256 | 2cbd1fa58213bb05a1302dcd79477d4bf94dbb3a84581019cd11a86426875dff
aap-bypass.txt
Posted May 7, 2008
Authored by cocoruder | Site ruder.cdut.net

Two critical vulnerabilities exist in the javascript API of Adobe Acrobat Professional 7. A remote attacker who successfully exploits these vulnerabilities can execute restricted functions and arbitrary codes on the affected system. Adobe Acrobat Professional version 7.0.9 is affected.

tags | advisory, remote, arbitrary, javascript, vulnerability, bypass
advisories | CVE-2008-2042
SHA-256 | 2439aa2322600b477cca7a6d1e36624932b620e1d197bf4f3031537110a4ef00
Mandriva Linux Security Advisory 2008-098
Posted May 7, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in OpenSSH 4.4 through 4.8 allowed local attackers to bypass intended security restrictions enabling them to execute commands other than those specified by the ForceCommand directive, provided they are able to modify to ~/.ssh/rc.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2008-1657
SHA-256 | 84e9dfc8aed7759a50f77add5c93f3cf1bd57556eacec2e7409d16bc4092ac4b
Mandriva Linux Security Advisory 2008-097
Posted May 7, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in start_kdeinit in KDE 3.5.5 through 3.5.9 where, if it was installed setuid root, it could allow local users to cause a denial of service or possibly execute arbitrary code. By default, start_kdeinit is not installed setuid root on Mandriva Linux, however updated packages have been patched to correct this issue.

tags | advisory, denial of service, arbitrary, local, root
systems | linux, mandriva
advisories | CVE-2008-1671
SHA-256 | 90328bccffe3f3110bfdc3dc25d2e176105bd89c61a4d863d2c8ea4513d4ec86
Page 1 of 1
Back1Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close