what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 176 RSS Feed

Files Date: 2008-03-12 to 2008-03-13

perforces.zip
Posted Mar 12, 2008
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit for Perforce Servers versions 2007.3/143793 and below which suffer from NULL pointer, invalid memory access, and endless loop vulnerabilities.

tags | exploit, vulnerability, proof of concept
SHA-256 | 1dd163d775ebc9b1c4abf52d79d9f0cd78dd073b5c8fd08e2b09ec2daa6335d1
perforces.txt
Posted Mar 12, 2008
Authored by Luigi Auriemma | Site aluigi.org

Perforce Servers versions 2007.3/143793 and below suffer from NULL pointer, invalid memory access, and endless loop vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 40b7c8196cc7d7c26a3289c793200a705f3c2b1cf9d1e9f9faff7eb34b7d0012
Vista_Physical_Attacks.pdf
Posted Mar 12, 2008
Authored by Peter Panholzer | Site sec-consult.com

Physical Security Attacks On Windows Vista - A short whitepaper discussing the firewire unlock attack.

tags | paper
systems | windows
SHA-256 | 5f035da0bc475ea3fd4753cf55841d7118ed5b5a109b008da86072262ddd24dc
WebCT 4.x Javascript Session Stealer
Posted Mar 12, 2008
Authored by Benjamin Lupton

WebCT Campus Edition version 4.1.5.8 suffers from multiple javascript related session stealing vulnerabilities.

tags | exploit, javascript, vulnerability
SHA-256 | 9f02a83db30f2b4f111a50f535c11c17913b5a61d6f146d92532ddc17b11e90b
lks-format.txt
Posted Mar 12, 2008
Authored by vashnukad | Site vashnukad.com

It appears that the Linux Kiss Server version 1.2 suffers from a format string vulnerability.

tags | advisory
systems | linux
SHA-256 | cd1bc5ebd7a34b22360783ccff5fb8ddcf0dbbb025e55f10527277783e35dc7d
icd-study.pdf
Posted Mar 12, 2008
Site secure-medicine.org

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. This paper is a study regarding wireless technology in implantable cardioverter defibrillators (ICDs) being susceptible to hack attacks.

tags | paper
SHA-256 | 0ed778576445793fa55a12ccf8d3fca0b36fba685620b7f8b9ad002005ac1a7c
Mandriva Linux Security Advisory 2008-060
Posted Mar 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Several severe security issues were discovered in the Joomla! PHP-based content management system. These issues have been fixed in version 1.0.15 which is provided with this update.

tags | advisory, php
systems | linux, mandriva
advisories | CVE-2007-6642, CVE-2007-6643, CVE-2007-6644, CVE-2007-6645
SHA-256 | 58b45982d290a51264f847919958903b79ddff72163bf4857863b3a461c6e3fa
Gentoo Linux Security Advisory 200803-11
Posted Mar 12, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200803-11 - Joey Hess reported that vobcopy appends data to the file /tmp/vobcopy.bla in an insecure manner. Versions less than 1.1.0 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-5718
SHA-256 | 25c681b9fa3e94c0fbd2ec1c18833c998326084332b3ec319444583e217b38d4
Ubuntu Security Notice 584-1
Posted Mar 12, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 584-1 - Jonathan Clarke discovered that the OpenLDAP slapd server did not properly handle modify requests when using the Berkeley DB backend and the NOOP control was used. An authenticated user with modify permissions could send a crafted modify request and cause a denial of service via application crash. Ubuntu 7.10 is not affected by this issue. Ralf Haferkamp discovered that the OpenLDAP slapd server did not properly handle modrdn requests when using the Berkeley DB backend and the NOOP control was used. An authenticated user with modrdn permissions could send a crafted modrdn request and possibly cause a denial of service via application crash.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2007-6698, CVE-2007-6698
SHA-256 | 56b08681c41e3d1474d2d57c53bc9140ac991a5cde6cef4939f8c62c627861d7
Mandriva Linux Security Advisory 2008-059
Posted Mar 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw in the Tcl regular expression handling engine was originally discovered by Will Drewry in the PostgreSQL database server's Tcl regular expression engine. This flaw can result in an infinite loop when processing certain regular expressions.

tags | advisory
systems | linux, mandriva
advisories | CVE-2007-4772
SHA-256 | 69bd180d13a45c0d100ed726b8f091f5ba4f9841bbaae42b85ac5daebcb4ab8d
Gentoo Linux Security Advisory 200803-10
Posted Mar 12, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200803-10 - lighttpd contains a calculation error when allocating the global file descriptor array (CVE-2008-0983). Furthermore, it sends the source of a CGI script instead of returning a 500 error (Internal Server Error) when the fork() system call fails (CVE-2008-1111). Versions less than 1.4.18-r2 are affected.

tags | advisory, cgi
systems | linux, gentoo
advisories | CVE-2008-0983, CVE-2008-1111
SHA-256 | 360b597a94cb9975c44c892646eff653429144ecb590d27194b2bb0ecb765dc3
Gentoo Linux Security Advisory 200801-9
Posted Mar 12, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200801-09:03 - The previous version of the X.Org X server (1.3.0.0-r4) did not properly address the integer overflow vulnerability in the MIT-SHM extension (CVE-2007-6429). It failed to check on Pixmaps of certain bit depths. Versions less than 1.3.0.0-r5 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2007-5760, CVE-2007-5958, CVE-2007-6427, CVE-2007-6428, CVE-2007-6429, CVE-2008-0006
SHA-256 | ec9718e4bc7cbfde57e6fbae71ba194bdc3199ce1bdd7c9822705ba14c88559b
Ubuntu Security Notice 583-1
Posted Mar 12, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 583-1 - Ulf Harnhammar discovered that Evolution did not correctly handle format strings when processing encrypted emails. A remote attacker could exploit this by sending a specially crafted email, resulting in arbitrary code execution.

tags | advisory, remote, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2008-0072
SHA-256 | de63b123c9a1cee483e103bd14102f1e7f065f80460804cae7ed3f45460c2dab
Mandriva Linux Security Advisory 2008-058
Posted Mar 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in slapo-pcache in slapd of OpenLDAP prior to 2.3.39 when running as a proxy-caching server. It would allocate memory using a malloc variant rather than calloc, which prevented an array from being properly initialized and could possibly allow attackers to cause a denial of service. Two vulnerabilities were found in how slapd handled modify (prior to 2.3.26) and modrdn (prior to 2.3.29) requests with NOOP control on objects stored in the BDB backend. An authenticated user with permission to perform modify or modrdn operations could cause slapd to crash.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2007-6698, CVE-2008-0658, CVE-2007-5708
SHA-256 | e1dd55f35e35b48f7bfc6c5d283befa889c1a4ab1ae5d0dfa300f4c283fd33ee
Debian Linux Security Advisory 1512-1
Posted Mar 12, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1512-1 - Ulf Harnhammar discovered that Evolution, the e-mail and groupware suite, had a format string vulnerability in the parsing of encrypted mail messages. If the user opened a specially crafted email message, code execution was possible.

tags | advisory, code execution
systems | linux, debian
advisories | CVE-2008-0072
SHA-256 | 9402a08a62d7316259919341c76df564fda29993750e3ba47d980ceef4d71148
OpenNHRP NBMA Next Hop Resolution 0.5
Posted Mar 12, 2008
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: Various bug fixes and some new functionality added.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | 92cf6287ca8648c58a1bf3ef82deb976f6a65163d8b7e3c4dd272d23e120518e
radialnet-0.44.tar.gz
Posted Mar 12, 2008
Authored by Joao Medeiros | Site dca.ufrn.br

RadialNet is a network visualization tool. It consists in a graphical visualization of the networks mapped with Nmap, with some efforts to make it easy to find security problems.

Changes: Fixed bug caused by gtk.gdk.PixbufLoader. Added new version of XMLTreeParser.py called XMLHandler.py. Added new version of bestwidgets. Changed radialnet.py file name to radialnet.pyw.
tags | tool, nmap
systems | unix
SHA-256 | 20e1eae6181531547742d5a8550e56bb3110decb92e91e2ccd16b6cc4f4f2fbd
icq-dos.txt
Posted Mar 12, 2008
Authored by spdr

ICQ Toolbar versions 2.3 ActiveX remote denial of service exploit.

tags | exploit, remote, denial of service, activex
SHA-256 | 74da912743972bf3b6843c60fbd3962165a38f4108595d36b215ead70a4aec48
xoopswfdownloads-sql.txt
Posted Mar 12, 2008
Authored by S@BUN | Site hackturkiye.com

The XOOPS wfdownloads module suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a27e450136288a1d7739cef79f2d864955cb92db8b691a099a1ce484370e097f
xoopsglossario-sql.txt
Posted Mar 12, 2008
Authored by S@BUN | Site hackturkiye.com

The XOOPS Glossario module version 2.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 375839145f2f138740f92a0a527c12eac7975027b00a62a8f4dd438c26c42bc7
Secunia Security Advisory 28659
Posted Mar 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Numara FootPrints, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 02d0f6cd86adc17f9d864aa4c223da5b82edc4eff4625ab3ac161ea316ca4b40
Secunia Security Advisory 29025
Posted Mar 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nir Goldshlager (Avnet) has reported a vulnerability in IBM Lotus QuickPlace, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ebccc615089970f9c512c92ba454f2142bf36f14a52d6b2d1f9be66581e6d84f
Secunia Security Advisory 29057
Posted Mar 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Evolution, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 160f72382ca176f72ca3f1e1551d96a1c2b0ca2575723a8afac62757ceb4830e
Secunia Security Advisory 29152
Posted Mar 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for opera. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, or to bypass certain security restrictions.

tags | advisory, vulnerability, xss
systems | linux, gentoo
SHA-256 | ee3c5ca0f387783ede04102aae4fd89a27b8651562b4f391257110131bf5cde4
Secunia Security Advisory 29163
Posted Mar 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | d215c58aeca1f4ebfde19cd4adf9327391a88a4283219b5948313c5836e3238c
Page 3 of 7
Back12345Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close