exploit the possibilities
Showing 1 - 25 of 41 RSS Feed

Files Date: 2007-03-09

CA Security Advisory 35145
Posted Mar 9, 2007
Authored by Ken Williams, Computer Associates | Site www3.ca.com

The CA eTrust Admin GINA component contains a privilege escalation vulnerability within the reset password interface. This vulnerability is exploitable only through physical interactive access or through Remote Desktop. Affected products include eTrust Admin 8.1 SP2 (8.1.2), eTrust Admin 8.1 SP1 (8.1.1), and eTrust Admin 8.1 (8.1.0).

tags | advisory, remote
advisories | CVE-2007-1345
MD5 | c6562cb4f6cf0c40deb50930f24bdb74
PHP import_request_variables() Arbitrary Variable Overwrite
Posted Mar 9, 2007
Authored by Stefano Di Paola, Francesco Ongaro | Site wisec.it

PHP versions greater than or equal to 4.0.7 and less than or equal to 5.2.1 suffer from an arbitrary variable overwrite in import_request_variables().

tags | exploit, arbitrary, php
MD5 | 7caa19415b07b0f1e5e2e58ca201d09d
msfilemanagement.txt
Posted Mar 9, 2007
Authored by 3APA3A | Site securityvulns.com

Article discussing file management security issues in Microsoft Windows Vista/2003/XP/2000.

tags | advisory
systems | windows, vista
MD5 | 60fcecd6b876c994b1fd5658afc80a4f
Port Scanning Techniques Whitepaper
Posted Mar 9, 2007
Authored by Kris Katterjohn

Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. PDF version.

tags | paper
MD5 | 05be6acb8706affe0b8e6ecd74c9f657
Port Scanning Techniques Whitepaper
Posted Mar 9, 2007
Authored by Kris Katterjohn

Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. Text version.

tags | paper
MD5 | d364aff084d227d502bf80560824558a
Mandriva Linux Security Advisory 2007.057
Posted Mar 9, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The DMO_VideoDecoder_Open function in dmo/DMO_VideoDecoder.c in xine-lib does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-1246
MD5 | 562e47f8063bed302281781b8b55331b
Mandriva Linux Security Advisory 2007.056
Posted Mar 9, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Off-by-one buffer overflow in the parse_elements function in the 802.11 printer code (print-802_11.c) for tcpdump 3.9.5 and earlier allows remote attackers to cause a denial of service (crash) via a crafted 802.11 frame. NOTE: this was originally referred to as heap-based, but it might be stack-based.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2007-1218
MD5 | 23e9227a2dcc706ff24062c147a89876
Mandriva Linux Security Advisory 2007.055
Posted Mar 9, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The DMO_VideoDecoder_Open function in loader/dmo/DMO_VideoDecoder.c in MPlayer 1.0rc1 and earlier does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-1246
MD5 | 06eeabeee1d7b3c4dcad4dc31f13e7c8
Mandriva Linux Security Advisory 2007.054
Posted Mar 9, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference.

tags | advisory, remote, denial of service, javascript
systems | linux, mandriva
advisories | CVE-2007-1308
MD5 | a77962f885d2c63b82cb3cbfea4a21b7
Ubuntu Security Notice 432-1
Posted Mar 9, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 432-1 - Gerardo Richarte from Core Security Technologies discovered that when gnupg is used without --status-fd, there is no way to distinguish initial unsigned messages from a following signed message. An attacker could inject an unsigned message, which could fool the user into thinking the message was entirely signed by the original sender.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2007-1263
MD5 | d76fe00ba7ed0901c41309e218dcf780
Ubuntu Security Notice 424-2
Posted Mar 9, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 424-2 - USN-424-1 fixed vulnerabilities in PHP. However, some upstream changes were not included, which caused errors in the stream filters. This update fixes the problem.

tags | advisory, php, vulnerability
systems | linux, ubuntu
advisories | CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988
MD5 | 219a1698f3f5eeb48f76f07a7f036242
php_446_crack_opendict_local_bof.txt
Posted Mar 9, 2007
Authored by rgod | Site retrogod.altervista.org

PHP version 4.4.6 crack_opendict() local buffer overflow exploit.

tags | exploit, overflow, local, php
MD5 | 5b2cf9a4e45e3f034abfa01236f53aef
BlackhatCFP-2007.txt
Posted Mar 9, 2007
Site blackhat.com

Black Hat USA 2007 Call For Papers. Black Hat USA Briefings 2007 takes place at Caesars Palace Las Vegas, Nevada, July 28-August 2.

tags | paper, conference
MD5 | a398c6eae3273d4dbe9487ea3d63c862
dynaliens-xss.txt
Posted Mar 9, 2007
Authored by sn0oPy

dynaliens versions 2.0 and 2.1 suffer from admin bypass and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
MD5 | dc59cafd849865443635ea2b98d3af1b
MU Security Advisory 2007-03.01
Posted Mar 9, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

Asterisk crashes when handed an otherwise valid request message but with no URI and no SIP-version in the request-line of the message. Asterisk versions 1.2.15 and 1.4.0, along with prior versions, are affected.

tags | advisory
MD5 | 6121b1df2013a98c7d28e32af079e4af
conquest-overflow.txt
Posted Mar 9, 2007
Authored by Luigi Auriemma | Site aluigi.org

Conquest versions 8.2a (svn 691) and below suffer from buffer overflow and memory corruption vulnerabilities.

tags | advisory, overflow, vulnerability
MD5 | 3da5d084d52b1e3a07f772753d604e34
winamp512-overflow.txt
Posted Mar 9, 2007
Authored by Umesh Wanve

Winamp versions 5.12 and below crafted .PLS file remote buffer overflow exploit. Written in Perl.

tags | exploit, remote, overflow, perl
MD5 | 41c3a7c3969f9df5042520f40c2cdd81
winzip-heap.txt
Posted Mar 9, 2007
Authored by prdelka | Site blogs.23.nu

WinZip versions 10.0.7245 and below FileView ActiveX buffer overflow exploit.

tags | exploit, overflow, activex
MD5 | 913c84a6dd47879e09db4eeadfb75fc3
modsec-bypass.txt
Posted Mar 9, 2007
Authored by Stefan Esser | Site hardened-php.net

mod_security versions 2.1.0 and below suffer from a POST rules bypass vulnerability.

tags | exploit, bypass
MD5 | 63bb020fd56ca91ddc3ceb090ff1e03f
esser-php.txt
Posted Mar 9, 2007
Authored by Stefan Esser | Site hardened-php.net

PHP versions 4.4.5 and below and 5.2.1 and below shmop SSL RSA private key disclosure exploit.

tags | exploit, php
MD5 | 3625f9fdc8d9132a625db7e2ce1735a7
snort-dos.txt
Posted Mar 9, 2007
Authored by Antimatt3r

Snort versions 2.6.1.1, 2.6.1.2, and 2.7.0 remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 6e20a13f424102045efa3174b98dae4b
Debian Linux Security Advisory 1264-1
Posted Mar 9, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1264-1 - Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code.

tags | advisory, remote, arbitrary, php, vulnerability
systems | linux, debian
advisories | CVE-2007-0906, CVE-2007-0907, CVE-2006-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988
MD5 | cba80f138b4bfe360b191dd48744fb9d
Zero Day Initiative Advisory 07-010
Posted Mar 9, 2007
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows attackers to execute arbitrary code on Apple QuickTime Player version 7.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of forged size fields in user-defined data atoms (UDTA). By setting this field to an overly large value, an integer overflow occurs resulting in an exploitable heap overflow. Successful exploitation results in code execution under the context of the running user.

tags | advisory, overflow, arbitrary, code execution
systems | apple
advisories | CVE-2007-0714
MD5 | fa5eb46c403649874472d707ec4b66a1
Zero Day Initiative Advisory 07-09
Posted Mar 9, 2007
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on Novell NetMail version 3.5.2. Authentication is not required to exploit this vulnerability. The specific flaw exists in the webadmin.exe process bound by default on TCP port 89. During HTTP Basic authentication, a long username of at least 213 bytes will trigger a stack based buffer overflow due to a vulnerable sprintf() call. Exploitation of this issue can result in arbitrary code execution.

tags | advisory, remote, web, overflow, arbitrary, tcp, code execution
advisories | CVE-2007-1350
MD5 | 37113389bf6ad945a40bce9599763946
Advisory2-24012007.txt
Posted Mar 9, 2007
Authored by AlFa | Site virtuax.be

PhpMyAdmin versions 2.9.2 and below suffer from cross site scripting and cross site request forgery flaws.

tags | exploit, xss, csrf
MD5 | 74a320204d81438afaf88dc1f55d7263
Page 1 of 2
Back12Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close