exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Debian Linux Security Advisory 1519-1
Posted Mar 17, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1519-1 - It was discovered that the Horde web application framework permits arbitrary file inclusion by a remote attacker through the theme preference parameter.

tags | advisory, remote, web, arbitrary, file inclusion
systems | linux, debian
advisories | CVE-2008-1284
SHA-256 | 8aea956be722bc6e913c627aa8a53df918f3a96617a8147c3806e747e4223c0b

Related Files

Debian Linux Security Advisory 1828-1
Posted Jul 7, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1828-1 - It was discovered that the ocsinventory-agent which is part of the ocsinventory suite, a hardware and software configuration indexing service, is prone to an insecure perl module search path. As the agent is started via cron and the current directory (/ in this case) is included in the default perl module path the agent scans every directory on the system for its perl modules. This enables an attacker to execute arbitrary code via a crafted ocsinventory-agent perl module placed on the system.

tags | advisory, arbitrary, perl
systems | linux, debian
advisories | CVE-2009-0667
SHA-256 | 01ea95ee4e4ff0ba15deed33170e9f12d9edf5d90549f107b4a205e0cd2a1e84
Debian Linux Security Advisory 1827-1
Posted Jul 6, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1827-1 - It was discovered that ipplan, a web-based IP address manager and tracker, does not sufficiently escape certain input parameters, which allows remote attackers to conduct cross-site scripting attacks.

tags | advisory, remote, web, xss
systems | linux, debian
advisories | CVE-2009-1732
SHA-256 | 00635cca24bc92600de8f93c3721c5247f197717d7229303c32358b985872512
Debian Linux Security Advisory 1826-1
Posted Jul 6, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1826-1 - Several vulnerabilities have been discovered in eggdrop, an advanced IRC robot.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2007-2807, CVE-2009-1789
SHA-256 | a8b2c212aff1ffb3827b0c945e8b7f60cc18b1a588ac272831cca100696988e7
Debian Linux Security Advisory 1825-1
Posted Jul 6, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1825-1 - It was discovered that the statuswml.cgi script of nagios, a monitoring and management system for hosts, services and networks, is prone to a command injection vulnerability. Input to the ping and traceroute parameters of the script is not properly validated which allows an attacker to execute arbitrary shell commands by passing a crafted value to these parameters.

tags | advisory, arbitrary, shell, cgi
systems | linux, debian
advisories | CVE-2009-2288
SHA-256 | 0b0c8bcd8fd8d0b6301b324a8896ae8ce2c6068e6e1a207cae7ec3151af6db50
Debian Linux Security Advisory 1824-1
Posted Jun 26, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1824-1 - Several remote vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2009-1150, CVE-2009-1151
SHA-256 | c0543d372c815f7c798ee667d335e91cd6644265af5e237a867f283f8dcbb999
Debian Linux Security Advisory 1823-1
Posted Jun 26, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1823-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-1886, CVE-2009-1888
SHA-256 | b1dd505f4ed9dfea23e529ccd125a387967f454cd3fb8e82cf20c7cf12975af8
Debian Linux Security Advisory 1822-1
Posted Jun 24, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1822-1 - It was discovered that mahara, an electronic portfolio, weblog, and resume builder is prone to several cross-site scripting attacks, which allow an attacker to inject arbitrary HTML or script code and steal potential sensitive data from other users.

tags | advisory, arbitrary, xss
systems | linux, debian
SHA-256 | 70c1ca906437e7d6c7e45bd64c5bf1389a3aa517f8ae08d92e53b44931f8e0f5
Debian Linux Security Advisory 1821-1
Posted Jun 24, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1821-1 - Sam Hocevar discovered that amule, a client for the eD2k and Kad networks, does not properly sanitise the filename, when using the preview function. This could lead to the injection of arbitrary commands passed to the video player.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2009-1440
SHA-256 | 19ecb775ea2427799e1863353b3f9dc86b452cc722a2ca8f2f764f7c4f24aae1
Debian Linux Security Advisory 1820-1
Posted Jun 19, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1820-1 - Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1834, CVE-2009-1835, CVE-2009-1836, CVE-2009-1837, CVE-2009-1838, CVE-2009-1839, CVE-2009-1840, CVE-2009-1841
SHA-256 | 7b5d3b0a439f9bf630e0430301b87524237426c51c21e9ac498ad7d2f0f32c39
Debian Linux Security Advisory 1819-1
Posted Jun 19, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1819-1 - Several vulnerabilities have been discovered in vlc, a multimedia player and streamer.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2008-1768, CVE-2008-1769, CVE-2008-1881, CVE-2008-2147, CVE-2008-2430, CVE-2008-3794, CVE-2008-4686, CVE-2008-5032
SHA-256 | 7827ca0570fa45743fb8336eab394c44bf38311c688135f7bd9b204c89d50949
Debian Linux Security Advisory 1818-1
Posted Jun 19, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1818-1 - Laurent Almeras and Guillaume Smet have discovered a possible SQL injection vulnerability and cross-site scripting vulnerabilities in gforge, a collaborative development tool. Due to insufficient input sanitising, it was possible to inject arbitrary SQL statements and use several parameters to conduct cross-site scripting attacks.

tags | advisory, arbitrary, vulnerability, xss, sql injection
systems | linux, debian
SHA-256 | ef3ab886c53dfa59ff5ebaf2e13c7fc33993ce4e386d80d7b4077eb59b1d7f05
Debian Linux Security Advisory 1817-1
Posted Jun 19, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1817-1 - Michael Brooks discovered that ctorrent, a text-mode bittorrent client, does not verify the length of file paths in torrent files. An attacker can exploit this via a crafted torrent that contains a long file path to execute arbitrary code with the rights of the user opening the file.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2009-1759
SHA-256 | 04a3025ed0f99514632bf98b2b6b03c9b67be83812ffe576041b45ae447a9ea3
Debian Linux Security Advisory 1816-1
Posted Jun 17, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1816-1 - It was discovered that the Apache web server did not properly handle the "Options=" parameter to the AllowOverride directive.

tags | advisory, web
systems | linux, debian
advisories | CVE-2009-1195
SHA-256 | f481cb1d57b719487008c76e6c82018b67522e8df574fcfe60b4624260c4a8b3
Debian Linux Security Advisory 1815-1
Posted Jun 15, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1815-1 - It was discovered that the Rasterbar Bittorrent library performed insufficient validation of path names specified in torrent files, which could lead to denial of service by overwriting files.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2009-1760
SHA-256 | ad63608a9520d0d064fda0d70c6160937238a9bb33814e1fb611af3e163f35cd
Debian Linux Security Advisory 1814-1
Posted Jun 15, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1814-1 - Two vulnerabilities have been found in libsndfile, a library to read and write sampled audio data.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-1788, CVE-2009-1791
SHA-256 | 1251a085719d046c220358316daf5f8f362b05eb479e9c0d4ad744ff518c15b4
Debian Linux Security Advisory 1813-1
Posted Jun 8, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1813-1 - Several vulnerabilities have been found in evolution-data-server, the database backend server for the evolution groupware suite.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-0587, CVE-2009-0547, CVE-2009-0582
SHA-256 | 1002c5fc4a272b70abb7fe9aeb4ac9bae8ab7298336ed8a53b447e1a61708174
Debian Linux Security Advisory 1812-1
Posted Jun 5, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1812-1 - Apr-util, the Apache Portable Runtime Utility library, is used by Apache 2.x, Subversion, and other applications. Two denial of service vulnerabilities have been found in apr-util.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2009-0023
SHA-256 | eb8c93e812784e1119a6b541920db3a85bbaec679c272db21dd323b2a1f0665a
Debian Linux Security Advisory 1810-1
Posted Jun 3, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1810-1 - Anibal Sacco discovered that cups, a general printing system for UNIX systems, suffers from null pointer dereference because of its handling of two consecutive IPP packets with certain tag attributes that are treated as IPP_TAG_UNSUPPORTED tags. This allows unauthenticated attackers to perform denial of service attacks by crashing the cups daemon.

tags | advisory, denial of service
systems | linux, unix, debian
advisories | CVE-2009-0949
SHA-256 | 1bd16047f6f2688935a4db4002019a5bca9dee9d10b9673b7d868bce30d1c98d
Debian Linux Security Advisory 1809-1
Posted Jun 3, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1809-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2009-1630, CVE-2009-1633, CVE-2009-1758
SHA-256 | 79f152838b2185e00ecf0e1f8740e157acf2c11de21d97e03e413d77ae6237cd
Debian Linux Security Advisory 1808-1
Posted Jun 2, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1808-1 - Markus Petrux discovered a cross-site scripting vulnerability in the taxonomy module of drupal6, a fully-featured content management framework. It is also possible that certain browsers using the UTF-7 encoding are vulnerable to a different cross-site scripting vulnerability.

tags | advisory, xss
systems | linux, debian
SHA-256 | 5755dfe6d523cc338bc55c72c1ca5ca245f4daddc9ff1a385a1067ef0b9868d8
Debian Linux Security Advisory 1807-1
Posted Jun 2, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1807-1 - James Ralston discovered that the sasl_encode64() function of cyrus-sasl2, a free library implementing the Simple Authentication and Security Layer, suffers from a missing null termination in certain situations. This causes several buffer overflows in situations where cyrus-sasl2 itself requires the string to be null terminated which can lead to denial of service or arbitrary code execution.

tags | advisory, denial of service, overflow, arbitrary, code execution
systems | linux, debian
advisories | CVE-2009-0688
SHA-256 | afb4f27e7294bb89587a5da4a5b1dee6b80a732514182675444d918eba3d9825
Debian Linux Security Advisory 1806-1
Posted May 24, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1806-1 - Matt Murphy discovered that cscope, a source code browsing tool, does not verify the length of file names sourced in include statements, which may potentially lead to the execution of arbitrary code through specially crafted source code files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2009-0148
SHA-256 | 590b7b56f51b92b716841c881d2dc6ed98216cc086adc0ad81629be53ea6274b
Debian Linux Security Advisory 1805-1
Posted May 24, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1805-1 - Several vulnerabilities have been discovered in Pidgin, a graphical multi-protocol instant messaging client.

tags | advisory, vulnerability, protocol
systems | linux, debian
advisories | CVE-2009-1373, CVE-2009-1375, CVE-2009-1376
SHA-256 | cbce861a8fc059dce0e2e207159753b832372c40084d4da5642331a83f7f5a29
Debian Linux Security Advisory 1802-2
Posted May 24, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1802-2 - Michal Hlavinka discovered that the fix for code execution in the map_yp_alias function, known as CVE-2009-1579 and released in DSA 1802-1, was incomplete. This update corrects the fix for that function.

tags | advisory, code execution
systems | linux, debian
advisories | CVE-2009-1578, CVE-2009-1579, CVE-2009-1580, CVE-2009-1581, CVE-2009-1381
SHA-256 | 427516df8ef9ab4b92105500b37d7a760f482163d4eb284532448ec29c628c7f
Debian Linux Security Advisory 1804-1
Posted May 21, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1804-1 - Several remote vulnerabilities have been discovered in racoon, the Internet Key Exchange daemon of ipsec-tools. The The Common Vulnerabilities and Exposures project identified the

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2009-1574, CVE-2009-1632
SHA-256 | b05210a0a0059e39b906612cffac26f4bf213a579ea7b6061e4b07d926b8d381
Page 4 of 4
Back1234Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close