exploit the possibilities
Showing 26 - 42 of 42 RSS Feed

Files Date: 2008-10-31 to 2008-10-31

absolutepoll-cookie.txt
Posted Oct 31, 2008
Authored by EgY Coders Team

Absolute Poll Manager XE version 4.1 suffers from a remote cookie handling vulnerability.

tags | exploit, remote
MD5 | 9e07621b5b78b6bea39a3da1d3b9707c
absolutepodcast-cookie.txt
Posted Oct 31, 2008
Authored by EgY Coders Team

Absolute Podcast version 1.0 suffers from a remote cookie handling vulnerability.

tags | exploit, remote
MD5 | 0f2c6ef038ed7366fd22ac6dedba457a
absolutefilesend-cookie.txt
Posted Oct 31, 2008
Authored by EgY Coders Team

Absolute File Send version 1.0 suffers from a remote cookie handling vulnerability.

tags | exploit, remote
MD5 | 5739f287830cacc7d60d09761eb78c70
Secunia Security Advisory 32398
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for tomcat5 and apache-jakarta-tomcat-connectors. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, suse
MD5 | 39f731ae494db11c1e5ecb521ab01ae6
Secunia Security Advisory 32434
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Interact, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | c7dea2c8c823801b2b202d460f6e9af6
umail-filewrite.txt
Posted Oct 31, 2008
Authored by Shennan Wang | Site hi.baidu.com

U-Mail Webmail version 4.91 suffers from an arbitrary file write vulnerability.

tags | exploit, arbitrary
MD5 | 1e61e49f18a302e551fd72f00b2e9738
spitfirephoto-sql.txt
Posted Oct 31, 2008
Authored by Beenu Arora | Site beenuarora.com

Spitfire Photo Pro suffers from a remote SQL injection vulnerability in pages.php.

tags | exploit, remote, php, sql injection
MD5 | 2d9a55b3a305087d1935d87766ba9423
Secunia Security Advisory 32465
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Storage Manager (TSM) Client, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | cbfcb95138050c8225698fcf4f3d2725
Secunia Security Advisory 32470
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Wouter Coekaerts has reported a vulnerability in Quassel IRC, which can be exploited by malicious people to hijack IRC connections.

tags | advisory
MD5 | a70f8984b05008c066e95915f7ed7c91
Secunia Security Advisory 32466
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities and security issues have been reported in IBM Lotus Connections. Some have an unknown impact and others can be exploited by malicious, local users to disclose sensitive information and by malicious people to disclosure sensitive information, conduct cross-site scripting, script insertion, and SQL injection attacks.

tags | advisory, local, vulnerability, xss, sql injection
MD5 | a7ad5623a428677a26c693f7a110ddd4
Ubuntu Security Notice 661-1
Posted Oct 31, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 661-1 - Version 2.6.27 of the Linux kernel changed the order of options in TCP headers. While this change was RFC-compliant, it was found that some old routers and consumer DSL modems would not route traffic for these systems when TCP timestamps were enabled. As a workaround, TCP timestamps were disabled via sysctl.

tags | advisory, kernel, tcp
systems | linux, ubuntu
MD5 | 0b7ccac861f877ccf94fd82c4ccb6c2d
Gentoo Linux Security Advisory 200810-3
Posted Oct 31, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200810-03 - A memory management error in libspf2 might allow for remote execution of arbitrary code. libspf2 uses a fixed-length buffer to receive DNS responses and does not properly check the length of TXT records, leading to buffer overflows. Versions less than 1.2.8 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2008-2469
MD5 | d194021a49e34d688459bbbac4f43be7
Zero Day Initiative Advisory 08-071
Posted Oct 31, 2008
Authored by Tipping Point, Manuel Santamarina Suarez | Site zerodayinitiative.com

A vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express for Microsoft SQL. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Data Protection for SQL CAD service, dsmcat.exe, which listens by default on a TCP port above 1024. The process trusts a user-supplied size value, receiving the specified amount of data into a static heap buffer. By sending a specially crafted packet, an attacker can overflow that buffer leading to arbitrary code execution in the context of the SYSTEM user.

tags | advisory, overflow, arbitrary, tcp, code execution
MD5 | aae91fdbcd4042c03d43b7718a801a2e
Zero Day Initiative Advisory 08-070
Posted Oct 31, 2008
Authored by Adrian Pastor, Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute a script injection attack on arbitrary sites through vulnerable installations of SonicWALL. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page or open a malicious web link. SonicWALL Pro 2040 is affected.

tags | advisory, remote, web, arbitrary
MD5 | b7dd02b04be1d0bff49f71d22bb74279
iDEFENSE Security Advisory 2008-10-30.2
Posted Oct 31, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.30.08 - Remote exploitation of a stack buffer overflow vulnerability in Adobe Systems Inc.'s PageMaker could allow an attacker to execute arbitrary code with the privileges of the current user. A vulnerability exists within the handling of PMD files, the native file format for storing PageMaker documents. When parsing a malformed PMD file, data from the file is copied into a buffer without proper validation. This results in an exploitable stack based buffer overflow. iDefense has confirmed the existence of this vulnerability in Adobe PageMaker version 7.0.1 with the CVE-2007-5169 patch applied. Previous versions may also be affected. However, Adobe InDesign CS, the successor to PageMaker, is not affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2008-6432
MD5 | a509d8404c6e3108915748c8bbcbc7d6
iDEFENSE Security Advisory 2008-10-30.1
Posted Oct 31, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.30.08 - Remote exploitation of a memory corruption vulnerability in Novell Inc.'s eDirectory could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability exists due to an area of heap memory being used after it has already been freed. By sending malformed data it is possible to cause an area of heap memory to be freed by one thread, and then reused after another thread allocates the same area of memory. This results in the original thread operating on the data changed by the second thread, which may lead to the execution of arbitrary code. iDefense has confirmed the existence of this vulnerability in eDirectory version 8.8 SP2 for Windows. The Linux version does not appear to be affected. Previous versions may also be affected.

tags | advisory, remote, arbitrary
systems | linux, windows
MD5 | 271093d51ea71c3b41b3748bd5ffadd1
phpwebsitelink-sql.txt
Posted Oct 31, 2008
Authored by Beenu Arora | Site beenuarora.com

phpWebSite suffers from a remote SQL injection vulnerability in links.php.

tags | exploit, remote, php, sql injection
MD5 | c6f29c05374f87634f5df8eed471aad7
Page 2 of 2
Back12Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    2 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    16 Files
  • 13
    Feb 13th
    19 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    33 Files
  • 21
    Feb 21st
    11 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close