Twenty Year Anniversary
Showing 1 - 25 of 32 RSS Feed

Files Date: 2007-06-30

buddy-sql.txt
Posted Jun 30, 2007
Authored by t0pp8uzz, xprog

Buddy Zone version 1.5 suffers from a SQL injection vulnerability in view_sub_cat.php.

tags | exploit, php, sql injection
MD5 | 6b02a46081981df486cc15d6e714f36b
w3filer-overflow.txt
Posted Jun 30, 2007
Authored by r0ut3r

W3Filer version 2.1.3 remote stack overflow denial of service exploit.

tags | exploit, remote, denial of service, overflow
MD5 | f9883ae6ed53977343346b0f757b7433
snort-2.6.1.5.tar.gz
Posted Jun 30, 2007
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Various new additions and modifications.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
MD5 | e52a7ea6ba9743a8f8ca397cd26fa1bf
snort-2.7.0.RC2.tar.gz
Posted Jun 30, 2007
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Target-based stream reassembly, UDP session tracking, and more.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
MD5 | 832e2f9d0ecf077f3289a0abf49e9db9
AS07062901.txt
Posted Jun 30, 2007
Authored by Seth Fogie | Site airscanner.com

Airscanner Mobile Security Advisory - FlexiSpy.com's user administration web application contains a critical bug that allows anyone to view anyone else's captured voice, SMS, email, or location.

tags | advisory, web
MD5 | 74fb23ba69e3f83513553654b75d2f0b
Debian Linux Security Advisory 1325-1
Posted Jun 30, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1325-1 - Ulf Harnhammer discovered that a format string vulnerability in the handling of shared calendars may allow the execution of arbitrary code. It was discovered that the IMAP code in the Evolution Data Server performs insufficient sanitizing of a value later used an array index, which can lead to the execution of arbitrary code.

tags | advisory, arbitrary, imap
systems | linux, debian
advisories | CVE-2007-1002, CVE-2007-3257
MD5 | 94a262ab5007fe2d9720a0ad3ddfeb4d
youtube-bypass.txt
Posted Jun 30, 2007

YouTube.com suffers from an age verification bypass vulnerability.

tags | exploit, bypass
MD5 | e315ab84e1331eec71c614ae24e85508
vbzoom-sql.txt
Posted Jun 30, 2007
Authored by Hasadya Raed

VBZooM version 1.12 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | 4b80d4c45e974162b7270da7e2cc7d95
Ubuntu Security Notice 479-1
Posted Jun 30, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 479-1 - Multiple flaws in the MadWifi driver were discovered that could lead to a system crash. A physically near-by attacker could generate specially crafted wireless network traffic and cause a denial of service. A flaw was discovered in the MadWifi driver that would allow unencrypted network traffic to be sent prior to finishing WPA authentication. A physically near-by attacker could capture this, leading to a loss of privacy, denial of service, or network spoofing. A flaw was discovered in the MadWifi driver's ioctl handling. A local attacker could read kernel memory, or crash the system, leading to a denial of service.

tags | advisory, denial of service, kernel, local, spoof
systems | linux, ubuntu
advisories | CVE-2006-7177, CVE-2006-7178, CVE-2006-7179, CVE-2007-2829, CVE-2007-2830, CVE-2006-7180, CVE-2007-2831
MD5 | 7f1f06c23808577845fca734298e7ccc
flac123-overflow.txt
Posted Jun 30, 2007
Authored by David Thiel | Site isecpartners.com

flac123 version 0.0.9, also known as flac-tools, is vulnerable to a buffer overflow in vorbis comment parsing. This allows for the execution of arbitrary code.

tags | advisory, overflow, arbitrary
MD5 | 3f267591db23c699112102a030ecc7b4
xeforum-privesc.txt
Posted Jun 30, 2007
Authored by Firewall

XEForum suffers from a privilege escalation vulnerability via cookie modification.

tags | exploit
MD5 | 8ee7b6d3bb2d0780afe128db342a7e54
netweaver-xss.txt
Posted Jun 30, 2007
Authored by Cyrill Brunschwiler | Site csnc.ch

SAP NetWeaver Nw04 versions SP15 to SP 19 and SAP NetWeaver Nw04s versions SP7 to SP 11 suffer from a cross site scripting flaw.

tags | advisory, xss
MD5 | 1c8f8688095063d6c14dff218b31a3d8
Mandriva Linux Security Advisory 2007.137
Posted Jun 30, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - David Coffey discovered an uninitialized pointer free flaw in the RPC library used by kadmind. A remote unauthenticated attacker who could access kadmind could trigger the flaw causing kadmind to crash or possibly execute arbitrary code. David Coffey also discovered an overflow flaw in the same RPC library. A remote unauthenticated attacker who could access kadmind could trigger the flaw causing kadmind to crash or possibly execute arbitrary code. Finally, a stack buffer overflow vulnerability was found in kadmind that allowed an unauthenticated user able to access kadmind the ability to trigger the vulnerability and possibly execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-2442, CVE-2007-2443, CVE-2007-2798
MD5 | 2e1a3145902e2c36d59b1688739cdf10
Secunia Security Advisory 25769
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun JavaDoc, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fb5b5471fecd4b59a0fac110c88a184d
Secunia Security Advisory 25823
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Java Web Start, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, java, web
MD5 | 1acf78093e63d31cb34e1b485f407794
Secunia Security Advisory 25846
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Coppermine Photo Gallery, which can be exploited by malicious people and malicious users to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | b6a7c5dd71359122128de876522ce1da
Secunia Security Advisory 25861
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for MadWifi. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to gain knowledge of potentially sensitive information or to cause a DoS.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
MD5 | da032572388de223d731a6a1a82defdf
Secunia Security Advisory 25862
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for OpenOffice_org. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, suse
MD5 | db767e1849950178086b6549c09a0da0
Secunia Security Advisory 25867
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
MD5 | 367ebdb5460922eb9f286bac6aa5eb82
Secunia Security Advisory 25874
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for hiki. This fixes a vulnerability, which can be exploited by malicious people to delete arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
MD5 | 30d8110f2530324ed7af5f546c415309
Secunia Security Advisory 25881
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported a vulnerability in DirectAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | a8b0a4b9d73a6824f76c193514926cf4
Secunia Security Advisory 25883
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3Com IntelliJack Switch NJ220, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | e5c3e846959e9827d473615ef33a514c
Secunia Security Advisory 25884
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeType, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
MD5 | e9bdcd8db2d556d09b92e962c2ab6469
Secunia Security Advisory 25885
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM OS/400, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | fcea0545cebaafc5688cec9739deaa46
Secunia Security Advisory 25888
Posted Jun 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued an update for kerberos5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 6173edfb30528efd7b6a1b2c6f501776
Page 1 of 2
Back12Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close