exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files Date: 2008-08-14 to 2008-08-15

Mandriva Linux Security Advisory 2008-170
Posted Aug 14, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Thomas Pollet discovered an integer overflow vulnerability in the PNG image handling filter in CUPS. This could allow a malicious user to execute arbitrary code with the privileges of the user running CUPS, or cause a denial of service by sending a specially crafted PNG image to the print server. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2008-1722
SHA-256 | 6027428b40ba6f81523065dcc68298cdbbc56ec431a12d32a36b06ad82559a49
Mandriva Linux Security Advisory 2008-169
Posted Aug 14, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Marc Schoenefeld of the Red Hat Security Response Team discovered a vulnerability in the hplip alert-mailing functionality that could allow a local attacker to elevate their privileges by using specially-crafted packets to trigger alert mails that are sent by the root account. Another vulnerability was discovered by Marc Schoenefeld in the hpssd message parser that could allow a local attacker to stop the hpssd process by sending specially-crafted packets, causing a denial of service. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, local, root
systems | linux, redhat, mandriva
advisories | CVE-2008-2940, CVE-2008-2941
SHA-256 | 6795cd9f04e5887e773481d7eeb670df41567a78f63d3ae89b6d00acd4462e78
Mandriva Linux Security Advisory 2008-168
Posted Aug 14, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in the OCSP search functionality in stunnel that could allow a remote attacker to use a revoked certificate that would be successfully authenticated by stunnel. This flaw only concerns users who have enabled OCSP validation in stunnel. The updated packages have been patched to correct this issue.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2008-2420
SHA-256 | 843d62d83217251c61bdf65b8d108d92c9f85072194511a82c123ff877bd88e8
msm-remote.txt
Posted Aug 14, 2008
Authored by cocoruder | Site ruder.cdut.net

A remote illegal access vulnerability exists in Microsoft Windows Live Messenger. A vicious attacker can control the Live Messenger via constructing a malicious web page.

tags | advisory, remote, web
systems | windows
advisories | CVE-2008-0082
SHA-256 | e193b70a2907428a643a20891cf651e8fda5c7bc6903f72feb2aa3e7972221e4
cyboards-rfilfixss.txt
Posted Aug 14, 2008
Authored by CraCkEr

CyBoards PHP Lite version 1.21 suffers from cross site scripting, local file inclusion, and remote file inclusion vulnerabilities.

tags | exploit, remote, local, php, vulnerability, code execution, xss, file inclusion
SHA-256 | ef50722f4459bd2d59ea512846c76f681c0345a36b24c6fcd02fb9c024f1c34f
navboard-lfixss.txt
Posted Aug 14, 2008
Authored by CraCkEr

NavBoard version 16 suffers from multiple local file inclusion and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 7b885728709d032b398a0528f8689d5d5a5d35668a4802114a6bb5737182ed09
yapbb-rfi.txt
Posted Aug 14, 2008
Authored by CraCkEr

YapBB version 1.2 Beta2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 966b85211c2f88736d0575aeac1b4aef3f97b3a536edd094e7bf6679ab3519a3
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close