what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 35 of 35 RSS Feed

Files Date: 2009-03-31 to 2009-03-31

Opera 9.64 XML Crash
Posted Mar 31, 2009
Authored by Ahmed Obied

Opera version 9.64 (7400 nested elements) XML parsing remote crash exploit.

tags | exploit, remote
SHA-256 | 5cb5b9f155d8943d137b3ca3dc40cdf8fd7267a79da07db420881ea0bb0d5b96
Ubuntu Security Notice 750-1
Posted Mar 31, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-750-1 - It was discovered that OpenSSL did not properly validate the length of an encoded BMPString or UniversalString when printing ASN.1 strings. If a user or automated system were tricked into processing a crafted certificate, an attacker could cause a denial of service via application crash in applications linked against OpenSSL.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2009-0590
SHA-256 | cee5df51081c632f712fb3d0b9d722d7991012f9cf4b08bb96a43b49ea8b8a2e
Zabbix 1.6.2 Cross Site Request Forgery
Posted Mar 31, 2009
Authored by Adam Baldwin

Zabbix version 1.6.2 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 8ee865f64b5fc17f842d58dc0c0d58f823ba5646c8e910c5bf3f2f0715f41ee8
Zero Day Initiative Advisory 09-015
Posted Mar 31, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-015 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the XUL tree method _moveToEdgeShift(). In some cases this call will trigger garbage collection routines on in use objects which will result in a future call to a dangling pointer. This can be leveraged to execute arbitrary code under the context of the current user.

tags | advisory, remote, arbitrary
advisories | CVE-2009-1044
SHA-256 | 3724f5c1eebf4bf4363f9863b128d77eea5832e13ed30fc3630b4dc48d27f13b
Gentoo Linux Security Advisory 200903-41
Posted Mar 31, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-41 - A vulnerability in gedit might allow local attackers to execute arbitrary code. James Vega reported that gedit uses the current working directory when searching for python modules, a vulnerability related to CVE-2008-5983. Versions less than 2.24.3 are affected.

tags | advisory, arbitrary, local, python
systems | linux, gentoo
advisories | CVE-2008-5983, CVE-2009-0314
SHA-256 | 9e87adba1dba5c46b4ee23d357aa895b4dfb255dbdd9f0d78999caa2a952acdd
Debian Linux Security Advisory 1758-1
Posted Mar 31, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1758-1 - Leigh James that discovered that nss-ldapd, an NSS module for using LDAP as a naming service, by default creates the configuration file /etc/nss-ldapd.conf world-readable which could leak the configured LDAP password if one is used for connecting to the LDAP server.

tags | advisory
systems | linux, debian
advisories | CVE-2009-1073
SHA-256 | 3482db6bd388e318f9f09628d19de5e80409cc0a347911f98bdff01d0d965caf
Community CMS 0.5 SQL Injection
Posted Mar 31, 2009
Authored by Salvatore Fresta

Community CMS version 0.5 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 73fbe3292e9e458e7884a31a8156020bcbd6ced7946fc0f38efc248f58d2a2c4
DeepSec 2009 Call For Papers
Posted Mar 31, 2009
Site deepsec.net

The DeepSec organisation is happy to announce the Call for Papers for the next conference in November 2009. The conference will take place at the Imperial Riding School Renaissance Hotel in Vienna, Austria.

tags | paper, conference
SHA-256 | ed5292cd4338fd3cf6defc69e1390e5db40bce6dfaaad49a43f39ea57052aa47
Ubuntu Security Notice 749-1
Posted Mar 31, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-749-1 - It was discovered that libsndfile did not correctly handle description chunks in CAF audio files. If a user or automated system were tricked into opening a specially crafted CAF audio file, an attacker could execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-0186
SHA-256 | 044d8cd4689b433bcb2bda5fe39b7eea86415e2189918f2d823ccd627677a476
MapServer Overflow / Underflow / Leakage
Posted Mar 31, 2009
Site positronsecurity.com

During an audit of the MapServer version 5.2.1 source code, five vulnerabilities were identified. They include stack and heap overflows, a relative path writing weakness, a file content leakage, as well as a file existence leakage.

tags | advisory, overflow, vulnerability
advisories | CVE-2009-0839, CVE-2009-0840, CVE-2009-0841, CVE-2009-0842, CVE-2009-0843
SHA-256 | ea08f38ca944f2d2526dcf0c76fe5347f4cdd2310e493157f2d5b7394f380a75
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close