Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed

Files Date: 2007-01-07

Secunia Security Advisory 23575
Posted Jan 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kaspersky Antivirus, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 9bed4dee46fdbfcd8f5c9294c20c7bf8
Secunia Security Advisory 23622
Posted Jan 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Eudora WorldMail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 7b64b1e8cd2421f4d631338c79359ed8
iDEFENSE Security Advisory 2007-01-05.2
Posted Jan 7, 2007
Authored by iDefense Labs, Christoph Diehl | Site idefense.com

iDefense Security Advisory 01.05.07 - Remote exploitation of a heap overflow in Opera Software ASA's Opera Web browser could allow an attacker to execute arbitrary code in the security context of the current user. The vulnerability specifically exists due to Opera improperly processing a JPEG DHT marker. The DHT marker is used to define a Huffman Table which is used for decoding the image data. An invalid number of index bytes in the DHT marker will trigger a heap overflow with partially user controlled data. iDefense has confirmed the existence of this vulnerability in Opera version 9.02 on both Windows and Linux. Previous versions may also be affected.

tags | advisory, remote, web, overflow, arbitrary
systems | linux, windows
MD5 | baa00e3119c312f9f99f074d96592fd7
iDEFENSE Security Advisory 2007-01-05.1
Posted Jan 7, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 01.05.07 - Remote exploitation of a typecasting bug in Opera Software ASA's Opera Web browser could allow an attacker to execute arbitrary code on the affected host. A flaw exists within Opera's Javascript SVG implementation. When processing a createSVGTransformFromMatrix request Opera does not properly validate the type of object passed to the function. Passing an incorrect object to this function can result in it using a pointer that is user controlled when it attempts to make the virtual function call. iDefense has confirmed the existence of this vulnerability in Opera version 9.02 on both Windows and Linux. Previous versions may also be affected.

tags | advisory, remote, web, arbitrary, javascript
systems | linux, windows
MD5 | 8b6c9045a44515e5e1faa59cb9858d6e
edittag12-xss.txt
Posted Jan 7, 2007
Authored by Nima Ghotbi

EditTag version 1.2 is susceptible to local file inclusion and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
MD5 | 4150246ef823a1967e51831f10e33f7d
kolayindir-sql.txt
Posted Jan 7, 2007
Authored by ShaFuck31

Kolayindir Download is susceptible to SQL injection attacks.

tags | exploit, sql injection
MD5 | 9c8bf9b0d54f569f246df1bc8a9d00d5
riblog-xss.txt
Posted Jan 7, 2007
Authored by ShaFuck31

RI Blog version 1.3 is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | 076dd6e8634da33338cae7c40c3c1c32
veredirect.txt
Posted Jan 7, 2007
Authored by Aditya Sood

Verisign's Weblogs service is susceptible to redirection attacks.

tags | advisory
MD5 | 1bbfcaa10952c7cca665959a20f48269
Hardened-PHP Project Security Advisory 2007-02.141
Posted Jan 7, 2007
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to SQL injection and arbitrary PHP code execution vulnerabilities.

tags | advisory, arbitrary, php, vulnerability, code execution, sql injection
MD5 | 1979b7121a3b4caad532914c3f3c4ce2
Hardened-PHP Project Security Advisory 2007-01.140
Posted Jan 7, 2007
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to a cross site scripting vulnerability.

tags | advisory, php, xss
MD5 | 70bfd73413a7698ef03e25ec68a65aee
DRUPAL-SA-2007-002.txt
Posted Jan 7, 2007
Authored by Uwe Hermann | Site drupal.org

Drupal security advisory - The way page caching was implemented allows a denial of service attack. An attacker has to have the ability to post content on the site. He or she would then be able to poison the page cache, so that it returns cached 404 page not found errors for existing pages. If the page cache is not enabled, your site is not vulnerable. The vulnerability only affects sites running on top of MySQL.

tags | advisory, denial of service
MD5 | 4ee5ccf0b9c894440a06c49e399edf6f
DRUPAL-SA-2007-001.txt
Posted Jan 7, 2007
Authored by Uwe Hermann | Site drupal.org

Drupal security advisory - A few arguments passed via URLs are not properly sanitized before display. When an attacker is able to entice an administrator to follow a specially crafted link, arbitrary HTML and script code can be injected and executed in the victim's session. Such an attack may lead to administrator access if certain conditions are met.

tags | advisory, arbitrary
MD5 | c63802f3ddcacfd814fb71e3b5b7048f
coppermine-php.txt
Posted Jan 7, 2007
Authored by DarkFig

Coppermine Photo Gallery versions 1.4.10 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | ea64282edbe571b82dfc58e8439e717b
ios-mdb.txt
Posted Jan 7, 2007
Site aria-security.com

Intranet Open Source suffers from a remote password database disclosure vulnerability.

tags | exploit, remote
MD5 | d86e02c24d79ca34b1bc56d35c3f31eb
qbytes.txt
Posted Jan 7, 2007
Authored by slythers

Qbytes, or Quantique Bytes, is a library that can be used for easy recomputation and error detection when performing a cryptographic attack.

tags | library
MD5 | 7ee1d0566e7b3aac7f9368ec4f1ad62c
uberupload.txt
Posted Jan 7, 2007
Authored by Null | Site gammahack.com

Uber Uploader 4.2 suffers from a code execution flaw via uploading a malicious PHP file.

tags | exploit, php, code execution
MD5 | 9092d04f130796a15695c2667dcaf882
Page 1 of 1
Back1Next

File Archive:

September 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    3 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    18 Files
  • 6
    Sep 6th
    18 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    2 Files
  • 9
    Sep 9th
    2 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    17 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    29 Files
  • 14
    Sep 14th
    21 Files
  • 15
    Sep 15th
    3 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    16 Files
  • 19
    Sep 19th
    13 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close