exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 865 RSS Feed

Files Date: 2008-03-01 to 2008-03-31

Secunia Security Advisory 29526
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and weaknesses have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 256bf39347fa94d25d60db1bb5f30b87b73b4a7ad9539af48cf091f1412bf583
Secunia Security Advisory 29532
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Russ McRee has discovered two vulnerabilities in CubeCart, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 0097658e089a5e14b8e55b7eac383b9b3b49227f99a64dcabdb3593f9395c9fc
Secunia Security Advisory 29533
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Arsalan Emamjomehkashan has reported some vulnerabilities in Aeries Browser Interface, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | cba3e949359be1c92f9742979e3dad7f1d46a7096330ec64ec2b92df3cf66670
Secunia Security Advisory 29536
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, ruby
SHA-256 | a42ed452d55ae8a2ff4f4d4470fdbc3ff2914801b837d261eca745a0ffcb7c58
Secunia Security Advisory 29537
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for gnome-ssh-askpass and openssh. This fixes a vulnerability, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
SHA-256 | 948b2e174f45229f8dad6b950a4024f3594a45e47b6b8c70482ba694e1fe3c80
Secunia Security Advisory 29538
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered some vulnerabilities in LEADTOOLS Multimedia, which can be exploited by malicious people to overwrite arbitrary files.

tags | advisory, arbitrary, vulnerability
SHA-256 | 752197f427cb6f1fd9661f741fd056b3902ff89a524e2dd70be5c63e70a697f8
Secunia Security Advisory 29540
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - teeed has reported a vulnerability in File Transfer, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 520556a91f90cc7652f378a234c284873cfa170fae0ada76e5bec30294bb5072
Secunia Security Advisory 29547
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and weaknesses have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 088cdec7f3f7f7f92fc6aadf554e529798355e4af974abe9f535ca64d6713eb3
Secunia Security Advisory 29548
Posted Mar 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 93087a58bcf6d38c7484e2126913575b506cd94037b00f7025076bfc7badb09c
Secunia Security Advisory 29529
Posted Mar 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in some Sun SPARC Enterprise T5120 and T5220 Servers, which can be exploited by malicious users to bypass certain security restrictions

tags | advisory
SHA-256 | 05a143d831e9af3dff5d4204985207a0a8cb10c593608de03de031b45867e88a
Cisco Security Advisory 20080326-pptp
Posted Mar 26, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Two vulnerabilities exist in the virtual private dial-up network (VPDN) solution when Point-to-Point Tunneling Protocol (PPTP) is used in certain Cisco IOS releases prior to 12.3. PPTP is only one of the supported tunneling protocols used to tunnel PPP frames within the VPDN solution. The first vulnerability is a memory leak that occurs as a result of PPTP session termination. The second vulnerability may consume all interface descriptor blocks on the affected device because those devices will not reuse virtual access interfaces. If these vulnerabilities are repeatedly exploited, the memory and/or interface resources of the attacked device may be depleted.

tags | advisory, vulnerability, protocol, memory leak
systems | cisco
advisories | CVE-2008-1151, CVE-2008-1150
SHA-256 | a9b789f67d015ebfaacfdad835aecae916f95ae2cd8af25a282d09ab989b9064
Cisco Security Advisory 20080326-mvpn
Posted Mar 26, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the Cisco implementation of Multicast Virtual Private Network (MVPN) is subject to exploitation that can allow a malicious user to create extra multicast states on the core routers or receive multicast traffic from other Multiprotocol Label Switching (MPLS) based Virtual Private Networks (VPN) by sending specially crafted messages.

tags | advisory
systems | cisco
advisories | CVE-2008-1156
SHA-256 | 590abd633caccc57ef5091f07338b3bb47024165cb0abfe8e22de9efa1b6de59
Cisco Security Advisory 20080326-IPv4IPv6
Posted Mar 26, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP) services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the device. Packets that are routed throughout the router can not trigger this vulnerability. Successful exploitation will prevent the interface from receiving any additional traffic. The only exception is Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash. Only the interface on which the vulnerability was exploited will be affected.

tags | advisory, denial of service, udp, protocol
systems | cisco
advisories | CVE-2008-1153
SHA-256 | eaab00543556990c9814d3f8fdd5005a6f0b3ae28e6943684965111b23bafee3
Cisco Security Advisory 20080326-queue
Posted Mar 26, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Certain Cisco Catalyst 6500 Series and Cisco 7600 Router devices that run branches of Cisco IOS based on 12.2 can be vulnerable to a denial of service vulnerability that can prevent any traffic from entering an affected interface. For a device to be vulnerable, it must be configured for Open Shortest Path First (OSPF) Sham-Link and Multi Protocol Label Switching (MPLS) Virtual Private Networking (VPN). This vulnerability only affects Cisco Catalyst 6500 Series or Catalyst 7600 Series devices with the Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720) or Route Switch Processor 720 (RSP720) modules. The Supervisor 32, Supervisor 720, Supervisor 720-3B, Supervisor 720-3BXL, Route Switch Processor 720, Route Switch Processor 720-3C, and Route Switch Processor 720-3CXL are all potentially vulnerable.

tags | advisory, denial of service, protocol
systems | cisco
advisories | CVE-2008-0057
SHA-256 | dcb91b8e9e526a01e6830474e66caabdc396217550f5f948e3ede12a6af14b52
Cisco Security Advisory 20080326-dlsw
Posted Mar 26, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS contains multiple vulnerabilities in the Data-link Switching (DLSw) feature that may result in a reload or memory leaks when processing specially crafted UDP or IP Protocol 91 packets. Cisco has released free software updates that address these vulnerabilities. Workarounds are available to mitigate the effects of these vulnerabilities.

tags | advisory, udp, vulnerability, protocol, memory leak
systems | cisco
advisories | CVE-2008-1152
SHA-256 | c0d42ecfdbd323b7c72cd98ba5fa908269034f82bd1bcde8170b8fa5f6a55b4e
Mandriva Linux Security Advisory 2008-076
Posted Mar 26, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Two vulnerabilities were found in the Website META Language (WML) package that allowed local users to overwrite arbitrary files via symlink attacks.

tags | advisory, arbitrary, local, vulnerability
systems | linux, mandriva
advisories | CVE-2008-0665, CVE-2008-0666
SHA-256 | 642f93fb28c1a2234f77263f6160cec95cf0a8097345eac770f28404eaf2d0ff
Zero Day Initiative Advisory 08-013
Posted Mar 26, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory for Linux. Authentication is not required to exploit this vulnerability. The specific flaw exists in the libnldap library. When a large LDAP delRequest message is sent, a stack overflow occurs overwriting a function pointer. This results in a situation allowing the execution of arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux
advisories | CVE-2008-0924
SHA-256 | 46d033672b84882059d7bd3a080efd1b899bcbeaad30ac9d9f03740fdca6aa26
soliduro.zip
Posted Mar 26, 2008
Authored by Luigi Auriemma | Site aluigi.org

Demonstration exploit code for IBM solidDB versions 6.00.1018 and below which suffer from format string, crash, NULL pointer, and server termination vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 038d3b3993fe0c01cfed2a62f8ce866d6eb763003f023ba470ac0ff67e251358
soliduro.txt
Posted Mar 26, 2008
Authored by Luigi Auriemma | Site aluigi.org

IBM solidDB versions 6.00.1018 and below suffer from format string, crash, NULL pointer, and server termination vulnerabilities.

tags | advisory, vulnerability
SHA-256 | ff89c52841e7aa03bcec7f58142e408965df48f8aa3e374a90daa645b36be539
ipb23x-xss.txt
Posted Mar 26, 2008
Authored by SHAHEE_MIRZA

Invision Power Board versions 2.3.x and below allow for an arbitrary iframe insertion.

tags | exploit, arbitrary, xss
SHA-256 | 8c908879829b9103be2ddd6cb8070b795c89440b8481bc82b9cd15d3aa20e5ed
Secunia Security Advisory 29480
Posted Mar 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Digital Security Research Group has discovered a vulnerability in PowerBook, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 89ae84f02d17c4b3bb5a2ea74c9e267bff94a7d387381d3f67d060b4f112b7d3
Secunia Security Advisory 29509
Posted Mar 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Daniel Papasian has reported a vulnerability in the PECL Alternative PHP Cache (APC) extension, which can be exploited by malicious users to bypass certain security restrictions and potentially by malicious people to compromise a vulnerable system.

tags | advisory, php
SHA-256 | 8b50ce052fe5c6a38ed3f14cbe0d6d75a6d302a164f33816e15eeb716917e9b1
Ubuntu Security Notice 596-1
Posted Mar 26, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 596-1 - Chris Clark discovered that Ruby's HTTPS module did not check for commonName mismatches early enough during SSL negotiation. If a remote attacker were able to perform man-in-the-middle attacks, this flaw could be exploited to view sensitive information in HTTPS requests coming from Ruby applications. It was discovered that Ruby's FTPTLS, telnets, and IMAPS modules did not check the commonName when performing SSL certificate checks. If a remote attacker were able to perform man-in-the-middle attacks, this flaw could be exploited to eavesdrop on encrypted communications from Ruby applications using these protocols.

tags | advisory, remote, web, imap, protocol, ruby
systems | linux, ubuntu
advisories | CVE-2007-5162, CVE-2007-5770
SHA-256 | c8117d450a2491ab5a1b7ababcad5544029bd84fc845134213c6b2b164d9e5ba
Ubuntu Security Notice 595-1
Posted Mar 26, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 595-1 - Michael Skladnikiewicz discovered that SDL_image did not correctly load GIF images. If a user or automated system were tricked into processing a specially crafted GIF, a remote attacker could execute arbitrary code or cause a crash, leading to a denial of service. David Raulo discovered that SDL_image did not correctly load ILBM images. If a user or automated system were tricked into processing a specially crafted ILBM, a remote attacker could execute arbitrary code or cause a crash, leading to a denial of service.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2008-0544, CVE-2007-6697
SHA-256 | 8787a0170078a9d1a7576ce3ff41cf570558373d705eef090cfb9ca7e6eb0737
Ubuntu Security Notice 594-1
Posted Mar 26, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 594-1 - It was discovered that Net::DNS did not correctly validate the size of DNS replies. A remote attacker could send a specially crafted DNS response and cause applications using Net::DNS to abort, leading to a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2007-6341
SHA-256 | 9226a1928d84d1cb3b36af5f475f4d2dd2386512949872d5714643ddfa6187ff
Page 4 of 35
Back23456Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close