what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 837 RSS Feed

Files Date: 2008-07-01 to 2008-07-31

fipscmslight-sql.txt
Posted Jul 28, 2008
Authored by U238 | Site noexec.blogspot.com

fipsCMS light versions 2.1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a5af4e6f51b82b60bb81c04420426d50e707f9ae3d922716f96896744943c79d
powerdvd_bof.pl.txt
Posted Jul 26, 2008
Authored by LiquidWorm | Site zeroscience.mk

CyberLink PowerDVD versions 8.0 and below crafted PLS/M3U playlist denial of service exploit.

tags | exploit, denial of service
SHA-256 | a0b2c6042043ef33dfc51026f219777fb3e5a3956997e18ea91d32d52cdd97db
Mandriva Linux Security Advisory 2008-155
Posted Jul 26, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Thunderbird program, version 2.0.0.16.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2008-1233, CVE-2008-1234, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237, CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2802, CVE-2008-2803, CVE-2008-2807, CVE-2008-2809, CVE-2008-2811
SHA-256 | 1a1feb90c9988e61bcb518e33f6acd3b11f0f3d648503d3f2efaccfd1b4f80c9
Zero Day Initiative Advisory 08-047
Posted Jul 26, 2008
Authored by Peter Vreugdenhil, Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute code on vulnerable installations of RealPlayer. User interaction is required in that a user must visit a malicious web site. The specific flaw exists in the rmoc3260 ActiveX control. Specifying malicious values for the 'Controls' or 'Console' properties with a specific timing results in a memory corruption which can lead to code execution under the context of the current user.

tags | advisory, remote, web, code execution, activex
advisories | CVE-2008-1309
SHA-256 | e5a1b62ac9be31af6068765c6d46144550da0621b7283dcfd5d9530cfd5aafe5
Zero Day Initiative Advisory 08-046
Posted Jul 26, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists in RealPlayer's rjbdll.dll module when handling the deletion of media library files. An attacker could exploit this vulnerability using an ActiveX control {FDC7A535-4070-4B92-A0EA-D9994BCC0DC5} to import a vulnerable file into the user's media library. Upon deletion of this file, an exploitable stack based buffer overflow can be triggered.

tags | advisory, remote, overflow, arbitrary, activex
SHA-256 | 2d8b4f84809b950729bc6aaba33360d9344f34c731fe1bb7bd34b47bc0023848
Zero Day Initiative Advisory 08-045
Posted Jul 26, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the garbage collection of JavaScript document elements in WebCore. When a CSSStyleSheet object of a style element is copied, and the style element is deallocated, a reference to the ownerNode property of the copied CSSStyleSheet object will result in a heap corruption allowing for the execution of arbitrary code.

tags | advisory, remote, arbitrary, javascript
systems | apple
advisories | CVE-2008-2317
SHA-256 | b433b68fb71e6f89bcc303229b44bf4ed20aa5c9d0698e4e7b03178f568dc5e7
realplayer-exec.txt
Posted Jul 26, 2008
Authored by Elazar Broad

RealPlayer suffers from a vulnerability where the WindowName and Controls properties of rmoc3260.dll do not manage heap memory properly resulting in a use after free condition which can overwrite heap management structures resulting in code execution. RealPlayer 11, 10.5, 10, and Enterprise are all affected.

tags | advisory, code execution
SHA-256 | f4a867bf834fd12002bf185f61e63741d9d542b0daa5b3009f9be2f18b59f04c
SECOBJADV-2008-02.txt
Posted Jul 26, 2008
Authored by Derek Callaway | Site security-objectives.com

Security Objectives Advisory - The Cygwin installation and update process can be subverted to a lack of checksum verification. Cygwin setup.exe version 2.573.2.2 is affected.

tags | advisory
SHA-256 | 7cbfe265f4aef5c957f93a0d315cd5334c327902cc77191d1a586a89fab67f7a
Secunia Security Advisory 31177
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mark Janssen has reported some vulnerabilities in Blackboard Academic Suite, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | 47b3f4a6da9fb3d92b8f5d41577a9e3cf8a8404a408bfe476a11d83f99251917
Secunia Security Advisory 31205
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.SQL has discovered a vulnerability in Atom PhotoBlog, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d556e6a7d45a557a94d6f1c200a9ff7718ca4a40e4177f0663651c54d55b6a58
Secunia Security Advisory 31213
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BlueCat Networks has acknowledged a vulnerability in BlueCat Networks Adonis, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | 4cbddeb039c5677a9505612221d913ee2c6a232b9f4ff2e54b9ae87e5ba64cb6
Secunia Security Advisory 31214
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IRAQI has reported a vulnerability in Live Music Plus, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d0d7772764d93d29a3151d957e73d23c4fdf4eff703a554393a75e6841f80c81
Secunia Security Advisory 31217
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Lore, which can be exploited by malicious people to conduct cross-site scripting-attacks.

tags | advisory, vulnerability, xss
SHA-256 | 09a47817ac455142da7fc69eaa1b2d9e7f6e1bcab38455cb5396da005d881769
Secunia Security Advisory 31220
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, or potentially compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | linux, ubuntu
SHA-256 | c33555efe554154007f0eec9f3a0e55a7e3c3b8df644758ce5feb1ce9c0cd0d9
Secunia Security Advisory 31222
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for rdesktop. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | da6b3ec3dec5683f929aae4db72211e9eccc86251addf794c1817c33cb159a91
Secunia Security Advisory 31223
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for vsftpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | fa585121dcd4c7727104d9d96e4bd8cd6105572bdb54af299ae45bb6197fe7a2
Secunia Security Advisory 31224
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for rdesktop. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 73a4340870193b1f73a1c86c910656609334555d747cc8da5ee33f18ed4963bb
Secunia Security Advisory 31225
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for coreutils. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, redhat
SHA-256 | 6a5a6467a63e070dc20feca15bf5ea08a77786dd710b0a50a3c92081c39b22db
Secunia Security Advisory 31226
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes some vulnerabilities and security issues, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or to bypass certain security restrictions.

tags | advisory, denial of service, local, vulnerability
systems | linux, redhat
SHA-256 | 87a3390b96d65efa94562d921997bc1b3c5eed17eed8c60866eeea1bf591f756
Secunia Security Advisory 31227
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for nss_ldap. This fixes a security issue, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | linux, redhat
SHA-256 | f43a0e989b3c251ff1d7c5f7c6a26a82bbe028521e191042168c627ef5b31e71
Secunia Security Advisory 31229
Posted Jul 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | 5ffa2e85039ef2b44e7a7e5ee9c6f90b49f7be4915f569da22586cbabe121560
ezcontents-rfi.txt
Posted Jul 26, 2008
Authored by HACKERS PAL | Site soqor.net

ezContents suffers from a remote file inclusion vulnerability in minicalendar.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | c0265594b39b6ad236c566af3b2704616c871cb7c8be5b61e98fc84485f3c918
phptest-sql.txt
Posted Jul 26, 2008
Authored by cOndemned | Site condemned.r00t.la

phpTest version 0.6.3 suffers from a remote SQL injection vulnerability in picture.php.

tags | exploit, remote, php, sql injection
SHA-256 | 58f9dde1e7ff5bffb03c452e0c3435ef6ccb6c09109a7178e3683b4c5de4e957
fizzmedia-sql.txt
Posted Jul 26, 2008
Authored by Mr.SQL | Site pal-hacker.com

FizzMedia version 1.51.2 suffers from a SQL injection vulnerability in comment.php.

tags | exploit, php, sql injection
SHA-256 | 0488f6b6b7455d8468f17eb349ca685f02effa7ce12da9882b89b188bf51da1e
Secunia Security Advisory 31221
Posted Jul 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Citrix has acknowledged a vulnerability in NetScaler, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | 4911a1a7cb0d3d4d7f937ecf97694452aac2cd632857a3c6f2cd4b064c7697c9
Page 5 of 34
Back34567Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close