exploit the possibilities
Showing 1 - 23 of 23 RSS Feed

Files Date: 2007-01-03

Secunia Security Advisory 21694
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered some vulnerabilities and a security issue in The Address Book, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting, cross-site request forgery, script insertion, and SQL injection attacks, disclose sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection, csrf
MD5 | 5792648af03bec5fdf5af10d57c7b84e
Secunia Security Advisory 23483
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefano Di Paola and Giorgio Fedon have discovered a vulnerability in Adobe Reader, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | d920e5a343c92b95f5a392773770d61e
Secunia Security Advisory 23538
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aria-Security Team has discovered a security issue in RBlog, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 19659e614da89f81ebf6207dd58021a3
Secunia Security Advisory 23547
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Doz has reported some vulnerabilities in AShop Deluxe, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 8a4af3d908f5295450d98d444207b0e3
Secunia Security Advisory 23555
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for libmodplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
MD5 | d764759dd8b6fe3d036112f7cd076188
Secunia Security Advisory 23564
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ajann has reported a vulnerability in TaskTracker Pro, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | c0a093f3d5f9b841e9fc688f4fb192e9
Secunia Security Advisory 23566
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ajann has reported a vulnerability in Enthrallweb eCars, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 1b73276415f56be60c02ed2289e2546b
Secunia Security Advisory 23582
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NanoyMaster has discovered a vulnerability in CMS Made Simple, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 07488bcab58666ff0e5eaf7c12528238
Secunia Security Advisory 23583
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Will Dormann has discovered a vulnerability in ICONICS Gauge ActiveX, ICONICS Switch ActiveX, and ICONICS Vessel ActiveX, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
MD5 | 93fcc9173495df829d76c76d2bd24718
Secunia Security Advisory 23585
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Soroush Dalili has reported a vulnerability in Hosting Controller, which can be exploited by malicious users to disclose sensitive information and to manipulate data.

tags | advisory
MD5 | 7068d1453cbccf692d44801a27cde2b7
Secunia Security Advisory 23588
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for w3m. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, ubuntu
MD5 | 7e7889c357314d0933b949d73705e653
Secunia Security Advisory 23589
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of certain information, conduct cross-site scripting attacks, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
MD5 | 30305c8f656b1682c20dd8c61126e2a0
Secunia Security Advisory 23592
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kevin Finisterre and LMH have reported a vulnerability in VLC media player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 4177be458c597724cb06174d4d076658
Secunia Security Advisory 23593
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges or to cause a DoS (Denial of Service) and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, mandriva
MD5 | fb676f79e2b546877c1a42811d68909f
Secunia Security Advisory 23596
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Miredo, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | ec17fadee40c0ce878466afedec71583
Secunia Security Advisory 23601
Posted Jan 3, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | 5c5144589bbad4571d665a5d2993ba1b
carolinacon-2007-cfp.txt
Posted Jan 3, 2007
Site carolinacon.org

The CarolinaCon Call For Papers is now open. It's an annual technology conference to enhance local and global awareness of current technology issues and developments, provide affordable technology education sessions to the unwashed masses, deliver varied/informative/interesting presentations on a wide variety of InfoSec/hacking/technology/science topics, and mix in enough entertainment and side contests/challenges to make for a truly fun event.

tags | paper, local, conference
MD5 | 87aab06e884877e06642a5030e18b17f
Mandriva Linux Security Advisory 2007.002
Posted Jan 3, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which could allow a local user to cause a Denial of Service (process crash). The seqfile handling in the 2.6 kernel up to 2.6.18 allows local users to cause a DoS (hang or oops) via unspecified manipulations that trigger an infinite loop while searching for flowlabels. An integer overflow in the 2.6 kernel prior to 2.6.18.4 could allow a local user to execute arbitrary code via a large maxnum value in an ioctl request. A race condition in the ISO9660 filesystem handling could allow a local user to cause a DoS (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures. A vulnerability in the bluetooth support could allow for overwriting internal CMTP and CAPI data structures via malformed packets.

tags | advisory, denial of service, overflow, arbitrary, kernel, local, vulnerability
systems | linux, mandriva
advisories | CVE-2006-5757, CVE-2006-5751, CVE-2006-5173, CVE-2006-5619, CVE-2006-6106
MD5 | c52590a8885f06097dd021687a1f9561
Mandriva Linux Security Advisory 2007.001
Posted Jan 3, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier allow user-assisted remote attackers to execute arbitrary code via long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2006-4192
MD5 | 51a3a40df8054e9dcf031fcb45413519
Windows_Vista_64bits_and_unexported_kernel_symbols.pdf
Posted Jan 3, 2007
Authored by Matthieu Suiche | Site msuiche.net

Whitepaper entitled Windows Vista 64bits And Unexported Kernel Symbols.

tags | paper, kernel
systems | windows, vista
MD5 | d3517b08b5aaeb3831f9c6e828a16dd2
freeradius113.txt
Posted Jan 3, 2007
Authored by sapheal

A critical security vulnerability has been found in FreeRadius version 1.1.3. Arbitrary code execution is possible due to improper bounds-checking.

tags | advisory, arbitrary, code execution
MD5 | 1a124f5f3053e76c7816ebfe3bca5273
openforum.txt
Posted Jan 3, 2007
Site aria-security.net

OpenForum is susceptible to a direct database download flaw.

tags | exploit
MD5 | 40d5889acf21c042c8a9fd041e533254
aspbb.txt
Posted Jan 3, 2007
Site aria-security.net

AspBB is susceptible to a direct database download flaw.

tags | exploit
MD5 | 59a346168a15e22418c1aa874d33c8cc
Page 1 of 1
Back1Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    9 Files
  • 10
    Jul 10th
    7 Files
  • 11
    Jul 11th
    4 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close