what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2007-04-23

Secunia Security Advisory 24963
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has acknowledged a vulnerability in courier-imap, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, imap
systems | linux, gentoo
SHA-256 | f45259c47d5367e0a620e37099d5aa378aabec20040d256f947b75d0e52dd596
Secunia Security Advisory 24958
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in WEBinsta FM Manager, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.

tags | advisory
SHA-256 | a7b2e07757073159d340c7d0096fb73e4e98f310d9af46f4b8c13401fda73f8d
Secunia Security Advisory 24961
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3proxy, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | f03199cc3db5ae902c96d7115694a14e29b85d884a0c9f9fa4b3d4ac40b3cda9
Secunia Security Advisory 24964
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for aircrack-ng. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
SHA-256 | c1c283fcd07a8259c2603ad12fc608f57a8ada56c2282e13f1b5b3f4afa278d0
Secunia Security Advisory 24973
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6e394f65bf273c0de387c42cf7bdab97b05df9de7870dede6ffb6975e9672f90
Secunia Security Advisory 24974
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, debian
SHA-256 | 85f661900da408437517569f55f7018743379caba2c92199a2a266dee49cf1e1
Secunia Security Advisory 24981
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in PhotoFiltre Studio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4dabed05ef92113ad3b787295859cdca6977039278317c694c2da9a58926d94b
Secunia Security Advisory 24986
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in ZomeAlarm products, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
SHA-256 | f14b4fe7b83c41da402240ceb4827c6975ee0321867f6408afc9bd6622b767c2
Secunia Security Advisory 24987
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS / IR, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 5b2826d34e476ea7eaf04ae352f745fc934f5346cc5f597659adfeb14253e9b1
Secunia Security Advisory 24994
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in ACDSee products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f9c9d7d4c7dbed1a7338916d8d60e5fe7ff3d216e8d654054f3552f4d301b72b
Secunia Security Advisory 24995
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to manipulate data, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to manipulate data, conduct cross-site scripting attacks, cause a DoS, and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, xss
systems | linux, suse
SHA-256 | 6b981c18cb8d3392793460523c88ef2080a4dae238f9f9a5702df0f8d156d53a
Secunia Security Advisory 24996
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued an update for freetype and clamav. This fixes some vulnerabilities, where one has unknown impacts, and others can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 2bf3dc05a24ca2e657e3969cfd75dd0a12dda6eb0702029df4fae1f871ff31ac
Secunia Security Advisory 25001
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for 3proxy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
SHA-256 | 26cf37fa8b8ec643d342c39a7b99f7168c3012bfd9d4ab3e72d96b1c92848dd9
Secunia Security Advisory 25003
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in NeatUpload, which can be exploited by malicious people to gain knowledge of potentially sensitive information.

tags | advisory
SHA-256 | 6aa9d4cd0d1b458e772318ad1ce2afdae79217c4d4462bf4c28a52f4075433e3
synscan-5.0b2.tar.gz
Posted Apr 23, 2007
Authored by mu-b, John Anderson | Site digit-labs.org

SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 47dc879fed164cbb41bec07d33de62faf97d964d92278bce0fa318c910ca12ac
gsasl-0.2.16.tar.gz
Posted Apr 23, 2007
Authored by Simon Josefsson

GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.

Changes: See the changelog.
tags | imap, library
SHA-256 | 47dc89ff255055fae7b212c7f568126ab456bce2ad6e4ce02db71b40ab6c626a
lomac-v1.1.2.tar.gz
Posted Apr 23, 2007
Authored by Tim Fraser | Site alum.wpi.edu

LOMAC is a dynamically-loadable security module for Free UNIX kernels that uses Low Water-Mark Mandatory Access Control (MAC) to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised network server daemons. The LOMAC loadable kernel module can be used to harden Linux systems without any changes to existing kernels, applications, or configuration files. Due to its simplicity, LOMAC itself requires no configuration, regardless of the users and applications present on the system.

Changes: Please see changelog.
tags | remote, kernel, trojan
systems | linux, unix
SHA-256 | 7d9fd8c887cfcaee957b0a74460ed59a171f5ee5a1b22718c47e72a0f4b192a0
cm4p-rfi.txt
Posted Apr 23, 2007
Authored by Silitoad | Site silitoad.org

cm4p version 0.6.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 750747d3a9b619127bff1b9d62ad0b017b28084b2be074c64ad867cd167cbf10
metabb-rfi.txt
Posted Apr 23, 2007
Authored by Silitoad | Site silitoad.org

MetaBB version 6 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2fc8ad97bffc99161d1f4d7636cd8b3f442587f0e214860bcc97d8b702a5a2b8
amsn_dos.txt
Posted Apr 23, 2007
Authored by noptrix | Site corehack.org

amsn versions 0.96 and below suffer from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | a11b18835803069e532da4cdb7e5014f4cf6c28610825a6f5a4e1d25507641c0
openssh-disclose.txt
Posted Apr 23, 2007
Authored by Rembrandt

System account enumeration is possible when OpenSSH versions 4.6 and below have ChallengeResponseAuthentication enabled (S/KEY).

tags | advisory, info disclosure
SHA-256 | 1ff367e663ad5227576fda522c34ea8d41163498f44a0745cfb6727e9de28a90
rezervi27-rfi.txt
Posted Apr 23, 2007
Authored by Arham Muhammad

Rezervi Availability version 2.7 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 5401fd091e537799a388f37a68ea842b522c70e155bcd5f41f0df93bd7dd9676
nipper-0.9.3.tgz
Posted Apr 23, 2007
Authored by Ian Ventura-Whiting | Site sourceforge.net

nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing.

Changes: Maintenance release.
systems | cisco, juniper
SHA-256 | 8a276ed572ba90cc7ab49ab643f18c51290a4bc9979a5b90a9ddceef5007e7a1
iDEFENSE Security Advisory 2007-04-20.1
Posted Apr 23, 2007
Authored by iDefense Labs, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 04.20.07 - Local exploitation of multiple design error vulnerabilities within multiple Check Point Zone Alarm products could allow an attacker to gain elevated privileges. iDefense has confirmed the existence of these vulnerabilities within version 5.0.63.0 of srescan.sys as installed with Check Point Zone Labs Zone Alarm Free. All other products within the Zone Alarm product line are suspected to be vulnerable. Previous versions are also suspected to be vulnerable.

tags | advisory, local, vulnerability
SHA-256 | 83b862129517b60146e0d9b85f3dc72dbcc63462a1d0dc679845a5fee0f1a5c2
digioz-rfi.txt
Posted Apr 23, 2007
Authored by Arham Muhammad

DigiOz Guestbook version 1.7.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 279931bf1efcfc114f7654b849131329da7ce741c7fbb388c5eec1dc29c08861
Page 1 of 2
Back12Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    16 Files
  • 7
    Oct 7th
    12 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close