exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 36 RSS Feed

Files Date: 2007-10-12

OpenSSL Security Advisory 20071012
Posted Oct 12, 2007
Site openssl.org

OpenSSL Security Advisory 20071012 - Andy Polyakov discovered a flaw in OpenSSL's DTLS implementation which could lead to the compromise of clients and servers with DTLS enabled. DTLS is a datagram variant of TLS specified in RFC 4347 first supported in OpenSSL version 0.9.8. Note that the vulnerabilities do not affect SSL and TLS so only clients and servers explicitly using DTLS are affected.

tags | advisory, vulnerability
advisories | CVE-2007-4995, CVE-2007-5135
SHA-256 | af582719a8ae86aed227c762b0680e7b01041c84d523533cf73b52a22ecf4779
s21sec-037-en.txt
Posted Oct 12, 2007
Authored by Jose Miguel Esparza | Site s21sec.com

OPAL versions 2.2.8 and below and Ekiga versions 2.0.9 and below suffer from a denial of service condition due to insufficiently validating the Content-Length field of a SIP request.

tags | advisory, denial of service
SHA-256 | 4d364df06d8fbbc07a007d1e0a7b5b491550f9b20da4c09aa796e46c096883f4
iDEFENSE Security Advisory 2007-10-11.1
Posted Oct 12, 2007
Authored by iDefense Labs, Sean de Regge | Site idefense.com

iDefense Security Advisory 10.11.07 - Remote exploitation of multiple integer overflow vulnerabilities in libFLAC, as included with various vendor's software distributions, allows attackers to execute arbitrary code in the context of the currently logged in user. iDefense has confirmed the existence of these vulnerabilities libFLAC 1.2.0, as well as the version of libFLAC included in in the full 5.35 version Winamp. Previous versions of libFLAC may also be vulnerable. The lite version of Winamp does not include support for the FLAC file format, and as such is not vulnerable.

tags | advisory, remote, overflow, arbitrary, vulnerability
advisories | CVE-2007-4619
SHA-256 | e3fa3ebc175734d879a00ff698bd7e293e3b02ba0e1c79866892a74f95817dfc
EEYE-cabright.txt
Posted Oct 12, 2007
Authored by Greg Linares | Site eeye.com

eEye Digital Security has discovered a remote vulnerability in CA BrightStor ARCserve Backup Server that allows an attacker to execute arbitrary code as SYSTEM without any user interaction. The exploit is extremely reliable and can be successfully delivered either across the Internet or within local networks via a random TCP port that is disclosed by the BrightStor portmapper service on TCP/111.

tags | advisory, remote, arbitrary, local, tcp
SHA-256 | 009d71dfb29f2caa5ca0a43c3b72406ccf8c716bee6628c3e41f5d7cf66f485e
cabright-overflow.txt
Posted Oct 12, 2007
Authored by cocoruder | Site ruder.cdut.net

A remote stack overflow vulnerability exist in the RPC interface of CA BrightStor ARCServe BackUp. An arbitrary anonymous attacker can execute arbitrary code on the affected system by exploiting this vulnerability.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2007-5327
SHA-256 | 239e57e4163b68e8237af400d6a05c05dcfeb8f43d3b3ed722f445a675062281
CAID-ARCserve.txt
Posted Oct 12, 2007
Authored by Ken Williams | Site www3.ca.com

Multiple vulnerabilities exist in BrightStor ARCserve Backup that can allow a remote attacker to cause a denial of service, execute arbitrary code, or take privileged action. The first set of vulnerabilities occur due to insufficient bounds checking by multiple components. The second vulnerability occurs due to privileged functions being available for use without proper authorization. The third set of vulnerabilities are due to a memory corruption occurring with the processing of RPC procedure arguments by multiple services. The vulnerabilities allow an attacker to cause a denial of service, or potentially to execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary, vulnerability
advisories | CVE-2007-5325, CVE-2007-5326, CVE-2007-5327, CVE-2007-5328, CVE-2007-5329, CVE-2007-5330, CVE-2007-5331, CVE-2007-5332
SHA-256 | 8860eaa4bfc2250849f113f1ca5d8c680bf62c6a8fde2785a35e35b2338b7fea
HP Security Bulletin 2007-14.76
Posted Oct 12, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX Apache version 2.0.59. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

tags | advisory, denial of service
systems | hpux
advisories | CVE-2007-3847, CVE-2007-3304
SHA-256 | 83f53cbcbb5bd239258285ffd144889964335f29d3a2eb11c043296369aa97a3
HP Security Bulletin 2007-14.36
Posted Oct 12, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Select Identity. The vulnerability could be exploited to allow remote unauthorized access.

tags | advisory, remote
SHA-256 | f8a356f78e457fe425114b413c8aa505e00fcce935ab5ab31c83134d2f756f6b
joomlaswm-rfi.txt
Posted Oct 12, 2007
Authored by Guns | Site 0x90.com.ar

The Joomla! swMenuFree component version 4.6 is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | b580780c5d918d4a66ee6428825abc7482b60a0440ca156db71dbf85a6373c57
php524ioncube-bypass.txt
Posted Oct 12, 2007
Authored by shinnai | Site shinnai.altervista.org

PHP 5.2.4 ionCube version 6.5 extension safe_mode / disable_functions bypass exploit.

tags | exploit, php, bypass
SHA-256 | de9ea6fa287070ddf9db07de4f0152c0ccd34beba5e0b487ea6326d851648800
iphone.tgz
Posted Oct 12, 2007
Authored by Niacin, Dre | Site toc2rta.com

Apple iTouch/iPhone version 1.1.1 tif file remote jailbreak exploit.

tags | exploit, remote
systems | apple, iphone
SHA-256 | 76eecc62ef34b435ef9dfe00b0a4110beda66eb0000f383f69957a7f846df1e1
kwsphpnews-sql.txt
Posted Oct 12, 2007
Authored by S4mi

KwsPHP version 1.0 remote SQL injection exploit that takes advantage of the Newsletter module.

tags | exploit, remote, sql injection
SHA-256 | 35776da6a5beaddb57ea4514beea7e95e71010a018c6e3dbe0375fa044a09be7
joomlaflup-rfi.txt
Posted Oct 12, 2007
Authored by mdx

Joomla Flash uploader version 2.5.1 is susceptible to remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | c751d1567a05f69791e735f763bccf6dde29d8dab059d63fb7021ef21ba36802
Ubuntu Security Notice 529-1
Posted Oct 12, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 529-1 - It was discovered that Tk could be made to overrun a buffer when loading certain images. If a user were tricked into opening a specially crafted GIF image, remote attackers could cause a denial of service or execute arbitrary code with user privileges.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-5137
SHA-256 | 181a30cb952104ee280e828c6d4147ace794a68504848fad11c36abe683a4660
Ubuntu Security Notice 528-1
Posted Oct 12, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 528-1 - Neil Kettle discovered that MySQL could be made to dereference a NULL pointer and divide by zero. An authenticated user could exploit this with a crafted IF clause, leading to a denial of service. Victoria Reznichenko discovered that MySQL did not always require the DROP privilege. An authenticated user could exploit this via RENAME TABLE statements to rename arbitrary tables, possibly gaining additional database access. It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. Phil Anderton discovered that MySQL did not properly verify access privileges when accessing external tables. As a result, authenticated users could exploit this to obtain UPDATE privileges to external tables. In certain situations, when installing or upgrading mysql, there was no notification that the mysql root user password needed to be set. If the password was left unset, attackers would be able to obtain unrestricted access to mysql. This is now checked during mysql start-up.

tags | advisory, remote, denial of service, overflow, arbitrary, root
systems | linux, ubuntu
advisories | CVE-2007-2583, CVE-2007-2691, CVE-2007-3780, CVE-2007-3782
SHA-256 | 7f7e76b344d2d14eab460e08b5f89fb18e6f8f1639b7aabf6d19d33117f1fa43
Mandriva Linux Security Advisory 2007.194
Posted Oct 12, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - More vulnerabilities in libvorbis were found that could be used to cause an application linked to libvorbis to crash or execute arbitrary code if used to open a carefully crafted OGG file.

tags | advisory, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2007-4065, CVE-2007-4066
SHA-256 | d7380cf6430a020b77f7e130e7f0b38e846a7bb33fa53fba4dacc21fabd6d281
picoflat-rfi.txt
Posted Oct 12, 2007
Authored by 0in

PicoFlat CMS versions 0.4.14 and below suffer from a remote file inclusion vulnerability in index.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 374204813c175da3153de1f110ffc7260da8bf052828479234fd5c912d8aee50
webdesktop-rfi.txt
Posted Oct 12, 2007
Authored by S.W.A.T. | Site xmors.com

WebDesktop version 0.1 is susceptible to remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 7f514dfce15b88d3fdc28ea2f2dbc31ffe4ea981244cc4d3cde62677456d7f70
pindorama-rfi.txt
Posted Oct 12, 2007
Authored by S.W.A.T. | Site xmors.com

Pindorama version 0.1 is susceptible to a remote file inclusion vulnerability in client.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 0ca5488f1020f94f5e3062f4b58130aae2b87c21de619807d148f8eeef50fb48
Secunia Security Advisory 27188
Posted Oct 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for util-linux. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | 7a4c61a44299f55b525d60c079654f0408b7c2e6e595c5ec8cb9b62d50468d99
Secunia Security Advisory 27123
Posted Oct 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has reported a vulnerability in FCKEditor, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b56b5bc7f03d7caf124ba65ecbb66b3016d59fdeaecdd01b2ba8005b68d8dc19
Secunia Security Advisory 27155
Posted Oct 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mysql. This fixes some vulnerabilities and security issues, which can be exploited by malicious users to gain escalated privileges, bypass certain security restrictions and cause a DoS (Denial of Service) or malicious people to cause a DoS.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 6a26b6b18dcf02b4c25d616ae585d8fb909377dcac67bb0855c6fa5a17bbdb8c
Secunia Security Advisory 27166
Posted Oct 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aaron Portnoy has reported a vulnerability in EMC RepliStor, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 620d718e6ccbd43babe3318a65a3b4ae8e3577d9781fc97d1211954c45053d75
Secunia Security Advisory 27169
Posted Oct 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andy Davis has reported a vulnerability in Cisco IOS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
systems | cisco
SHA-256 | c433c2279f762f1ce1be11f03860914eba57adb990e2ede43cafa82b862627f2
Secunia Security Advisory 27172
Posted Oct 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BiNgZa has discovered a vulnerability in NuSEO.PHP, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.

tags | advisory, php
SHA-256 | b360c53595e956c3ae4a67ed94305c9a9ab6ad422342704b91b7f4761789b08b
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close