the original cloud security
Showing 1 - 16 of 16 RSS Feed

Files Date: 2007-01-07

Secunia Security Advisory 23575
Posted Jan 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kaspersky Antivirus, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 9bed4dee46fdbfcd8f5c9294c20c7bf8
Secunia Security Advisory 23622
Posted Jan 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Eudora WorldMail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 7b64b1e8cd2421f4d631338c79359ed8
iDEFENSE Security Advisory 2007-01-05.2
Posted Jan 7, 2007
Authored by iDefense Labs, Christoph Diehl | Site idefense.com

iDefense Security Advisory 01.05.07 - Remote exploitation of a heap overflow in Opera Software ASA's Opera Web browser could allow an attacker to execute arbitrary code in the security context of the current user. The vulnerability specifically exists due to Opera improperly processing a JPEG DHT marker. The DHT marker is used to define a Huffman Table which is used for decoding the image data. An invalid number of index bytes in the DHT marker will trigger a heap overflow with partially user controlled data. iDefense has confirmed the existence of this vulnerability in Opera version 9.02 on both Windows and Linux. Previous versions may also be affected.

tags | advisory, remote, web, overflow, arbitrary
systems | linux, windows
MD5 | baa00e3119c312f9f99f074d96592fd7
iDEFENSE Security Advisory 2007-01-05.1
Posted Jan 7, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 01.05.07 - Remote exploitation of a typecasting bug in Opera Software ASA's Opera Web browser could allow an attacker to execute arbitrary code on the affected host. A flaw exists within Opera's Javascript SVG implementation. When processing a createSVGTransformFromMatrix request Opera does not properly validate the type of object passed to the function. Passing an incorrect object to this function can result in it using a pointer that is user controlled when it attempts to make the virtual function call. iDefense has confirmed the existence of this vulnerability in Opera version 9.02 on both Windows and Linux. Previous versions may also be affected.

tags | advisory, remote, web, arbitrary, javascript
systems | linux, windows
MD5 | 8b6c9045a44515e5e1faa59cb9858d6e
edittag12-xss.txt
Posted Jan 7, 2007
Authored by Nima Ghotbi

EditTag version 1.2 is susceptible to local file inclusion and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
MD5 | 4150246ef823a1967e51831f10e33f7d
kolayindir-sql.txt
Posted Jan 7, 2007
Authored by ShaFuck31

Kolayindir Download is susceptible to SQL injection attacks.

tags | exploit, sql injection
MD5 | 9c8bf9b0d54f569f246df1bc8a9d00d5
riblog-xss.txt
Posted Jan 7, 2007
Authored by ShaFuck31

RI Blog version 1.3 is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | 076dd6e8634da33338cae7c40c3c1c32
veredirect.txt
Posted Jan 7, 2007
Authored by Aditya Sood

Verisign's Weblogs service is susceptible to redirection attacks.

tags | advisory
MD5 | 1bbfcaa10952c7cca665959a20f48269
Hardened-PHP Project Security Advisory 2007-02.141
Posted Jan 7, 2007
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to SQL injection and arbitrary PHP code execution vulnerabilities.

tags | advisory, arbitrary, php, vulnerability, code execution, sql injection
MD5 | 1979b7121a3b4caad532914c3f3c4ce2
Hardened-PHP Project Security Advisory 2007-01.140
Posted Jan 7, 2007
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to a cross site scripting vulnerability.

tags | advisory, php, xss
MD5 | 70bfd73413a7698ef03e25ec68a65aee
DRUPAL-SA-2007-002.txt
Posted Jan 7, 2007
Authored by Uwe Hermann | Site drupal.org

Drupal security advisory - The way page caching was implemented allows a denial of service attack. An attacker has to have the ability to post content on the site. He or she would then be able to poison the page cache, so that it returns cached 404 page not found errors for existing pages. If the page cache is not enabled, your site is not vulnerable. The vulnerability only affects sites running on top of MySQL.

tags | advisory, denial of service
MD5 | 4ee5ccf0b9c894440a06c49e399edf6f
DRUPAL-SA-2007-001.txt
Posted Jan 7, 2007
Authored by Uwe Hermann | Site drupal.org

Drupal security advisory - A few arguments passed via URLs are not properly sanitized before display. When an attacker is able to entice an administrator to follow a specially crafted link, arbitrary HTML and script code can be injected and executed in the victim's session. Such an attack may lead to administrator access if certain conditions are met.

tags | advisory, arbitrary
MD5 | c63802f3ddcacfd814fb71e3b5b7048f
coppermine-php.txt
Posted Jan 7, 2007
Authored by DarkFig

Coppermine Photo Gallery versions 1.4.10 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | ea64282edbe571b82dfc58e8439e717b
ios-mdb.txt
Posted Jan 7, 2007
Site aria-security.com

Intranet Open Source suffers from a remote password database disclosure vulnerability.

tags | exploit, remote
MD5 | d86e02c24d79ca34b1bc56d35c3f31eb
qbytes.txt
Posted Jan 7, 2007
Authored by slythers

Qbytes, or Quantique Bytes, is a library that can be used for easy recomputation and error detection when performing a cryptographic attack.

tags | library
MD5 | 7ee1d0566e7b3aac7f9368ec4f1ad62c
uberupload.txt
Posted Jan 7, 2007
Authored by Null | Site gammahack.com

Uber Uploader 4.2 suffers from a code execution flaw via uploading a malicious PHP file.

tags | exploit, php, code execution
MD5 | 9092d04f130796a15695c2667dcaf882
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close