what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2008-10-31 to 2008-10-31

absolutepoll-cookie.txt
Posted Oct 31, 2008
Authored by EgY Coders Team

Absolute Poll Manager XE version 4.1 suffers from a remote cookie handling vulnerability.

tags | exploit, remote
SHA-256 | 835135ecd2a7ddc213ad0df6a41e4e78a421f5137704052d1af954da797852ba
absolutepodcast-cookie.txt
Posted Oct 31, 2008
Authored by EgY Coders Team

Absolute Podcast version 1.0 suffers from a remote cookie handling vulnerability.

tags | exploit, remote
SHA-256 | e836b75dd7b7c39a1804c760d24239691c65d0b161bee7502d76069ec027e366
absolutefilesend-cookie.txt
Posted Oct 31, 2008
Authored by EgY Coders Team

Absolute File Send version 1.0 suffers from a remote cookie handling vulnerability.

tags | exploit, remote
SHA-256 | a141f1a7d430f1619ff0c05e1530b8321d9dbbdcaddd2c18741fa7d7e3aa2ec2
Secunia Security Advisory 32398
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for tomcat5 and apache-jakarta-tomcat-connectors. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, suse
SHA-256 | 54c0015c7ef6edc0f5e26bd1f95d5a7bf98d3da283525d009296ee057dac6716
Secunia Security Advisory 32434
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Interact, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 24c7b31f915875ea7bc3b1dc54473bed6b671cad55a421aafb41ae29be9639e2
umail-filewrite.txt
Posted Oct 31, 2008
Authored by Shennan Wang | Site hi.baidu.com

U-Mail Webmail version 4.91 suffers from an arbitrary file write vulnerability.

tags | exploit, arbitrary
SHA-256 | f9f8d110fd4355bc2b7bf47b11946943d01c986403ffb69a8a7427b881900940
spitfirephoto-sql.txt
Posted Oct 31, 2008
Authored by Beenu Arora | Site beenuarora.com

Spitfire Photo Pro suffers from a remote SQL injection vulnerability in pages.php.

tags | exploit, remote, php, sql injection
SHA-256 | f51a5dbbdfe4cf8ce2ee73476b9edd2907eb2e08c844d9ac9a39a2eeb66ce477
Secunia Security Advisory 32465
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Storage Manager (TSM) Client, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | b24bd4a98833927e0b1b245b575bc3b38b6db2670de28727208de7fc567152e4
Secunia Security Advisory 32470
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Wouter Coekaerts has reported a vulnerability in Quassel IRC, which can be exploited by malicious people to hijack IRC connections.

tags | advisory
SHA-256 | 9f7ec6d718c8c19392d418b52e27973f42c34a2f8b7f381ee6e52c37e90567b9
Secunia Security Advisory 32466
Posted Oct 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities and security issues have been reported in IBM Lotus Connections. Some have an unknown impact and others can be exploited by malicious, local users to disclose sensitive information and by malicious people to disclosure sensitive information, conduct cross-site scripting, script insertion, and SQL injection attacks.

tags | advisory, local, vulnerability, xss, sql injection
SHA-256 | 536b09d332f87a19561d35dbd84d8bbde9fe321c79b8a8d1b380c39e71251320
Ubuntu Security Notice 661-1
Posted Oct 31, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 661-1 - Version 2.6.27 of the Linux kernel changed the order of options in TCP headers. While this change was RFC-compliant, it was found that some old routers and consumer DSL modems would not route traffic for these systems when TCP timestamps were enabled. As a workaround, TCP timestamps were disabled via sysctl.

tags | advisory, kernel, tcp
systems | linux, ubuntu
SHA-256 | 311f97e57605d866249a68172b7dc11e80a03a75092ba7eca86061682aa36681
Gentoo Linux Security Advisory 200810-3
Posted Oct 31, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200810-03 - A memory management error in libspf2 might allow for remote execution of arbitrary code. libspf2 uses a fixed-length buffer to receive DNS responses and does not properly check the length of TXT records, leading to buffer overflows. Versions less than 1.2.8 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2008-2469
SHA-256 | b89962e08445793c2f2fcc7517fcbf293f1324a4ae151bb01f811dca7181f51f
Zero Day Initiative Advisory 08-071
Posted Oct 31, 2008
Authored by Tipping Point, Manuel Santamarina Suarez | Site zerodayinitiative.com

A vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express for Microsoft SQL. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Data Protection for SQL CAD service, dsmcat.exe, which listens by default on a TCP port above 1024. The process trusts a user-supplied size value, receiving the specified amount of data into a static heap buffer. By sending a specially crafted packet, an attacker can overflow that buffer leading to arbitrary code execution in the context of the SYSTEM user.

tags | advisory, overflow, arbitrary, tcp, code execution
SHA-256 | 24d125a250767b917b5d9088755eec5ca28098edb3dfa54584f6c5a6adb291bb
Zero Day Initiative Advisory 08-070
Posted Oct 31, 2008
Authored by Adrian Pastor, Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute a script injection attack on arbitrary sites through vulnerable installations of SonicWALL. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page or open a malicious web link. SonicWALL Pro 2040 is affected.

tags | advisory, remote, web, arbitrary
SHA-256 | 680063bf9eaca59b8914a7661552098e4550767aec39e8e52fb7d8fc7ff6e15e
iDEFENSE Security Advisory 2008-10-30.2
Posted Oct 31, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.30.08 - Remote exploitation of a stack buffer overflow vulnerability in Adobe Systems Inc.'s PageMaker could allow an attacker to execute arbitrary code with the privileges of the current user. A vulnerability exists within the handling of PMD files, the native file format for storing PageMaker documents. When parsing a malformed PMD file, data from the file is copied into a buffer without proper validation. This results in an exploitable stack based buffer overflow. iDefense has confirmed the existence of this vulnerability in Adobe PageMaker version 7.0.1 with the CVE-2007-5169 patch applied. Previous versions may also be affected. However, Adobe InDesign CS, the successor to PageMaker, is not affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2008-6432
SHA-256 | 30285f28d965b9654aef8e6c21708c5bbbf4e22fb01500dce610cc044d6dd20f
iDEFENSE Security Advisory 2008-10-30.1
Posted Oct 31, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.30.08 - Remote exploitation of a memory corruption vulnerability in Novell Inc.'s eDirectory could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability exists due to an area of heap memory being used after it has already been freed. By sending malformed data it is possible to cause an area of heap memory to be freed by one thread, and then reused after another thread allocates the same area of memory. This results in the original thread operating on the data changed by the second thread, which may lead to the execution of arbitrary code. iDefense has confirmed the existence of this vulnerability in eDirectory version 8.8 SP2 for Windows. The Linux version does not appear to be affected. Previous versions may also be affected.

tags | advisory, remote, arbitrary
systems | linux, windows
SHA-256 | 4ae40b78386a4a54495de3992d9f34191e1286ccf1ca4f0cd75ec32f235b1bc5
phpwebsitelink-sql.txt
Posted Oct 31, 2008
Authored by Beenu Arora | Site beenuarora.com

phpWebSite suffers from a remote SQL injection vulnerability in links.php.

tags | exploit, remote, php, sql injection
SHA-256 | de1f8e19cd8b6ded00e9217d202b619d3019680b8804ba94f213296dbaecb10b
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close