what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2007-01-04

Secunia Security Advisory 23537
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SPINE, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | d6a86fde64c5e756708c359a4f6704857158b6fd486a4ab833e4ce3a7ed1aa39
Secunia Security Advisory 23484
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OvBB, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 1cc6b85af4cb81435fcc25e28e2479ef98c9a6f463872e607223f47d7da0ba48
Secunia Security Advisory 23556
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cisco has acknowledged a security issue in Cisco Clean Access, which can be exploited by malicious people to gain knowledge of sensitive information.

tags | advisory
systems | cisco
SHA-256 | b999e2e63a972e3cf18c410aab360c41497f1f04d519181d7768c6816bf8d58d
Secunia Security Advisory 23559
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ddacac977989a01b39bec3ad4b32967698a753375a804564fd8b757fadc43059
Secunia Security Advisory 23590
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - DarkFig has discovered a vulnerability in Simple Web Content Management System, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, web, sql injection
SHA-256 | 2d5c166a760f957afeb99b935b484b4d769a0e8daff6b1947d6c94d595b36af8
Secunia Security Advisory 23594
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aria-Security has reported a security issue in WineGlass, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 12b379e9d704a6e131bdafd9743d087f73c5c7cd9981d8cc074df0c251d70727
Secunia Security Advisory 23608
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenBSD, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | openbsd
SHA-256 | 6ffb1f64cc61135b9cc02d28a77dbb911b8336f30d6c4d0f0136d1c13da08ba3
Secunia Security Advisory 23610
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ajann has reported a vulnerability in E-SMART CART, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | f403b34ca0fef48d8150e281c0b3c7f7576e21eb7ce409aa742e98bb3f54f16c
Secunia Security Advisory 23612
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 9af80692b83a06f9195e16be3e668c426142dfd94a849e5cf003ec1d336f0060
Secunia Security Advisory 23616
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | 07b4d99c31dc64111b9149dc2f634c2a2bf148d59cb4f8973fa24777cca8320b
Secunia Security Advisory 23617
Posted Jan 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cisco has acknowledged a security issue in Cisco Clean Access, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | cisco
SHA-256 | 83d1780072e1b1a18f6e0be7ec08e846bbe386baf869b9be73d4a6c30b69d012
MOAB-03-01-2007.rb.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of the HREFTrack field in Apple QuickTime allows cross-zone scripting, leading to potential remote arbitrary code execution.

tags | exploit, remote, arbitrary, code execution
systems | apple
SHA-256 | 82e3af040fcc4e61d05647eb0b0db44301d563a10028b396f5a1ff378299df69
VLCMediaSlayer-ppc.pl.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This is just a vanilla format string exploit for OSX on ppc.

tags | exploit, remote, arbitrary, udp, code execution, ppc
systems | apple
advisories | CVE-2007-0017
SHA-256 | eee494f2f67e54b963758dd0fa93937a50e35597b8d00f31b63f7f421bb37406
VLCMediaSlayer-x86.pl.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This exploit will create a malicious .m3u file that will cause VLC Player for OSX to execute arbitrary code.

tags | exploit, remote, arbitrary, udp, code execution
systems | apple
advisories | CVE-2007-0017
SHA-256 | 4a8563fe447682266c5981ff8f4f4eb1e3e5a7ac789b3d0b1ce506d8981cf777
MOAB-01-01-2007.rb.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - Apple Quicktime stack buffer overflow exploit that makes use of the rtsp URL Handler vulnerability.

tags | exploit, overflow
systems | apple
advisories | CVE-2007-0015
SHA-256 | d599dfe435a136f896e1f7fd01b079a21a224eedd8616619700a2c3b1a2ac617
Ubuntu Security Notice 398-2
Posted Jan 4, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 398-2 - USN-398-1 fixed vulnerabilities in Firefox 2.0. This update provides the corresponding updates for Firefox 1.5. Various flaws have been reported in Firefox that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious web page containing JavaScript or SVG.

tags | advisory, web, arbitrary, javascript, vulnerability
systems | linux, ubuntu
advisories | CVE-2006-6497, CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504, CVE-2006-6506, CVE-2006-6507
SHA-256 | cecb847616a2d9e0cddb5e0a6361b5c21e6dd4b0e79bfc314097fd08f6e6b6bc
Cisco Security Advisory 20070103-CleanAccess
Posted Jan 4, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco Clean Access Manager (CAM) and Cisco Clean Access Server (CAS) suffer from an unchangeable shared secret vulnerability. Also, manual backups of the database ('snapshots') taken on the CAM are susceptible to brute force download attacks. A malicious user can guess the file name and download it without authentication. The file itself is not encrypted or otherwise protected.

tags | advisory
systems | cisco
SHA-256 | 7b00f3eb2825890e55e0b5bf60f81370daffaf7941f14cc000df1988a356d1c9
adobeplugin.txt
Posted Jan 4, 2007
Authored by Stefano Di Paola | Site wisec.it

The Adobe Acrobat Reader plugin is susceptible to session riding and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6f8787159ec262edcfdaedc27ea3b2c37a154fdd74c3dce34a6fc9e8817c536d
perforce.txt
Posted Jan 4, 2007
Authored by Ben Bucksch | Site bucksch.org

It appears that the Perforce client/server model is a bit broken. The client appears to give the server full control over the machine of the client. This,.. is not happiness.

tags | advisory
SHA-256 | ae2ad23b5ef08618c4d5984a4280734db24c2ba34bd13a8862f0e473ec52a11c
nmapxmlprettyprint.pdf
Posted Jan 4, 2007
Authored by Thomas J. Munn

Small whitepaper discussing how to produce a management-friendly version of nmap output.

tags | paper
SHA-256 | 8d41930e50e372274a52da913c85b393a87979a3bedd833718862ccafa3061be
ajax-attack.txt
Posted Jan 4, 2007
Authored by Amichai Shulman, Guy Karlebach

Brief whitepaper discussing the hacking of AJAX DWR applications.

tags | paper
SHA-256 | 6c5d8ba8ddbd21a85894c20cb3d5862246ff8206bb67d1314a13e58a171b8c3e
gb03-db.txt
Posted Jan 4, 2007
Site aria-security.com

GuestBook version 0.3a suffers from a direct database download vulnerability.

tags | exploit
SHA-256 | 79e23e4dc3eba1cbcff582efa77e6cc4726bf8f5fd5d782cef8ee812587a86c8
carbon-db.txt
Posted Jan 4, 2007
Site aria-security.com

Carbon Communities suffers from a direct database download vulnerability.

tags | exploit
SHA-256 | 676018490441c9f67e2374754f884ada1a117c0e93bd0339afc595fba6880c23
wine-db.txt
Posted Jan 4, 2007
Site aria-security.com

WineGlass suffers from a direct database download vulnerability.

tags | exploit
SHA-256 | 2a1e673af1f7589c5a7c4a3494b0ac44d377c910e9468d43f1f658268d7d6ddb
swcms.php.txt
Posted Jan 4, 2007
Authored by DarkFig

Simple Web Content Management System remote SQL injection exploit.

tags | exploit, remote, web, sql injection
SHA-256 | ae1947f37891ca007e171029404c600608b010a2265cef7d487134f813e64348
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close