exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 35 of 35 RSS Feed

Files Date: 2008-06-06 to 2008-06-07

Secunia Security Advisory 30553
Posted Jun 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
SHA-256 | d0ab00adafc07e14009f1f485f8729b2de91dd0bae253607aedc6010406ce5c5
Secunia Security Advisory 30556
Posted Jun 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in multiple VMware Products, which can be exploited by malicious, local users to bypass certain security restrictions or to gain escalated privileges.

tags | advisory, local, vulnerability
SHA-256 | da0923dd7eeff6b382fbb62c136a73c20a26940137aba79f155dd9e20bb3c506
Secunia Security Advisory 30557
Posted Jun 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Sopas Ferreira has discovered some vulnerabilities in SamTodo, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 081b9c295bac452e33321f0f67f8b9dc7e97bc767cc2c3821ce562833398333c
Secunia Security Advisory 30559
Posted Jun 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in ALFTP FTP Client, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | aee7fe51fef158ddb00717f9ead5d8dd95b8e3fe1dd8877fee2d120217e44e6f
Secunia Security Advisory 30561
Posted Jun 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hadihadi has discovered a vulnerability in the eChat plugin for e107, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | a4a11b417eceb6a93ac1e85a0fb6c28742b367811c563a26be394260cb9f94a2
Secunia Security Advisory 30563
Posted Jun 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for snort. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 12d79868a9de49c0dd0715f272bb0011afeb6cfbe684d19b4127654e8a55dad4
Secunia Security Advisory 30564
Posted Jun 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for evolution. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 4de289660564d24efcf384524dc6b52b48a63252680a843e4526b60ab4c167f9
iDEFENSE Security Advisory 2008-06-04.3
Posted Jun 6, 2008
Authored by iDefense Labs, Stephen Fewer | Site idefense.com

iDefense Security Advisory 06.04.08 - Local exploitation of a input validation vulnerability within VMware's Hgfs.sys driver could allow an unprivileged attacker to execute arbitrary code within the kernel of a Windows guest operating system. When a VMware guest operating system has the VMware Tools package installed, the hgfs.sys driver is loaded on the machine. This driver allows any user to open the device "\\.\hgfs" and issue IOCTLs with a buffering mode of METHOD_NEITHER. This allows untrusted user mode code to pass kernel addresses as arguments to the driver. iDefense confirmed the existence of this vulnerability in hgfs.sys as included with VMware Workstation 5.5.4. Other versions are suspected vulnerable as well.

tags | advisory, arbitrary, kernel, local
systems | windows
advisories | CVE-2008-5671
SHA-256 | 94965d18331de5c2c720b4857032236ba30344a29f60b2f9431727bdeac556fa
GNU SIP Witch Telephony Server
Posted Jun 6, 2008
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Added plugin support, zeroconf, and scripting plugins.
tags | telephony, protocol
SHA-256 | 9a79e8d2e981a8447436c2f9da1d184c6b8c2b93b250b3de3168b51129e40358
freesshd-sehoverflow.txt
Posted Jun 6, 2008
Authored by Matteo Memelli | Site be4mind.com

FreeSSHD version 1.2.1 post authentication remote SEH overflow exploit that spawns a shell on port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | f7343d892c3d08b25b42c2fd3eed90f2a31ecb113628845c1d671d69ea95a842
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close