exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2007-08-20

Debian Linux Security Advisory 1357-1
Posted Aug 20, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1357-1 - It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. koffice includes a copy of the xpdf code and required an update as well.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-3387
SHA-256 | 3e145bf618f6b02bb84eb231519eaee326c36030f92ceb8c5cfa6de6456b57a6
Mandriva Linux Security Advisory 2007.167
Posted Aug 20, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - David Thiel discovered that libvorbis did not correctly verify the size of certain headers, and did not correctly clean up a broken stream. If a user were tricked into processing a specially crafted Vorbis stream, a remote attacker could possibly cause a denial of service or execute arbitrary code with the user's privileges.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2007-3106, CVE-2007-4029
SHA-256 | 2a84deee1c87a340c848a8dee55fb79a9600e63608ef2b7655ad0d42cfc1ac6d
Mandriva Linux Security Advisory 2007.166
Posted Aug 20, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Sebastian Krahmer of the SUSE Security Team discovered an off-by-one buffer overflow within rsync. It is not clear if this problem is exploitable, however updates are available to correct the issue.

tags | advisory, overflow
systems | linux, suse, mandriva
advisories | CVE-2007-4091
SHA-256 | 2856cbcb8883fca12bbd985f64719c472065b8058c456e26caa66279e4eea75f
Gentoo Linux Security Advisory 200708-15
Posted Aug 20, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200708-15 - Apache mod_jk decodes the URL within Apache before passing them to Tomcat, which decodes them a second time. Versions less than 1.2.23 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-1860
SHA-256 | 4ca0446cdd2d859fba00ae0ccbf75294eaeac3333d1d23f00be373680fe7fdb7
Gentoo Linux Security Advisory 200708-14
Posted Aug 20, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200708-14 - Gregory Shikhman discovered that the default Gentoo setup of NVIDIA drivers creates the /dev/nvidia* with insecure file permissions. Versions less than 100.14.09 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-3532
SHA-256 | 3203e0b987463b596d2ad6afac3f01a8f1b57ea62911556de8ea7253da4a8bd3
Gentoo Linux Security Advisory 200708-13
Posted Aug 20, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200708-13 - Amit Klein from Trusteer reported that the random number generator of ISC BIND leads, half the time, to predictable (1 chance to 8) query IDs in the resolver routine or in zone transfer queries. Additionally, the default configuration file has been strengthen with respect to the allow-recursion{} and the allow-query{} options. Versions less than 9.4.1_p1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-2925, CVE-2007-2926
SHA-256 | 5da141c36e04d27b30083b6e175c74631ce6cba67656598621238778516c2f70
toribashish.zip
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit for vulnerabilities in Toribash versions 2.71 and below.

tags | exploit, vulnerability, proof of concept
SHA-256 | bc7f5880bd7b38c848149f860d5730d6ded7c35e331dd519f7c18c903a4602cb
toribashish.txt
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

Toribash versions 2.71 and below suffer from buffer overflow and format string vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 2aecc01549531c4b7660823f4c93969a51abc19e597475b2ac6e5bcea7bbb71c
rfactox.txt
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

rFactor versions 1.250 and below suffer from buffer overflow and code execution vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
SHA-256 | a9a01d0ca9d025f9d3c5e130dfa1d4697908ec4e38d14ea3a2b0bc476fe97278
unrwebdos.zip
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

Denial of service exploit that demonstrates a buffer overflow in the logging function of the Unreal engine.

tags | exploit, denial of service, overflow
SHA-256 | 256616a46fd983fd5ab187b9b434b3f728d79cf9edac8d029f1e4dce45b796bc
unrwebdos.txt
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

The logging function of the Unreal engine suffers from a buffer overflow.

tags | advisory, overflow
SHA-256 | 7ddf6ee9235d007b3d67bcfd3d6435cdede70d2e7c30362fed19fdc35676cc6b
belgacom_xss.txt
Posted Aug 20, 2007
Authored by Tosser

Belgacom suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8ab58d37525d6a6542d5eb3bb46aa6df3411a25f2be4e56bd3a6088a2131408c
mercury-poc.txt
Posted Aug 20, 2007
Authored by eliteb0y

Mercury SMTP remote preauth stack based overrun proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 5269ff7da8174aa44d0cb1467b56b47b2697e9bda21d10d34f14eeaa3def9b29
discussmaster_2-xss.txt
Posted Aug 20, 2007
Authored by nfw0rm

discussMaster version 2.0 suffers from a cross site scripting vulnerability in forum.asp.

tags | exploit, xss, asp
SHA-256 | 977a0c9a0ee0e72488f752f1bd8c16a4a7201e7734840349f7ab8ef123991b9b
aanval-3.2-stable.tar.gz
Posted Aug 20, 2007
Site aanval.com

Aanval is a web based Snort intrusion detection console. Currently supporting Snort and syslog, Aanval provides dynamic monitoring, comprehensive reporting and powerful alerting capabilities. Several primary features are account hierarchy, data-archiving, real-time data displays, auto signature updating, sensor management tools, easy upgrading, advanced searching, artificial intelligence, timezone control, charts/graphs, query saving and more.

Changes: New Interface, New Session System, Updated Data Storage, Update Indexing System, Report Modifications, Performance Increases, Many Bug Fixes, New Data Store Maintenance Features, and More.
tags | tool, web, sniffer
SHA-256 | 699b6a3807a9cf95309ba0896d24a6379ae45d15248a43f052429013a81a5c3a
vbul368-xss.txt
Posted Aug 20, 2007
Authored by Hasadya Raed

vBulletin version 3.6.8 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8c03dda12ce7d1b518b319542f638585350aa1e97c86953599391c8807734a79
toorconCFP2007.txt
Posted Aug 20, 2007
Site toorcon.org

ToorCon 9 Call For Papers - Papers and presentations are being accepted for ToorCon 9 to be held at the Convention Center in San Diego, CA on October 19th through October 21st, 2007.

tags | paper, conference
SHA-256 | 98bd1dacfeb17cbb1b305b38cc53bbd3a0a7339e5abd47d095d00bd1902a81b5
squirrelcart-rfi.txt
Posted Aug 20, 2007
Authored by ShaiMagal

Squirrelcart versions 1.x.x and below suffer from a remote file inclusion vulnerability in cart.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 39d0ce655f4bb0e38b5a090eaee614ee276852a083b19d7b1d10ee2943c62918
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close