what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 64 RSS Feed

Files Date: 2007-10-10

pagemaker-overflow.txt
Posted Oct 10, 2007
Authored by Tan Chew Keong | Site vuln.sg

Adobe Pagemaker versions 7.0.1 and 7.0.2 suffer from a buffer overflow vulnerability when handling long font names. Links to full advisory are provided however the author has removed the exploits related to the vulnerability.

tags | advisory, overflow
SHA-256 | 4d649063f056168db14f9bd0375f8e3ad886dc0ae43795c2a6b08c1fe0359a45
Gentoo Linux Security Advisory 200710-9
Posted Oct 10, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200710-09 - Chris Evans reported an integer overflow within the FreeType PCF font file parser. NX and NX Node are vulnerable to this due to shipping XFree86 4.3.0, which includes the vulnerable FreeType code. Versions less than 3.0.0 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2006-1861
SHA-256 | 3a9239dcfea19ae1b63de62872bbf157179a136141258f98772d86f60011feda
Gentoo Linux Security Advisory 200710-8
Posted Oct 10, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200710-08 - KPDF includes code from xpdf that is vulnerable to an integer overflow in the StreamPredictor::StreamPredictor() function. Versions less than 1.6.3-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2007-3387
SHA-256 | 381a2e4a9e88cc3c225d25d30e09d7aaf76971ddcb097b4f5de944157ede3b22
shellexecute.txt
Posted Oct 10, 2007
Authored by Kriz

Small write up discussing how ShellExecute() works and how applications must make use of it.

tags | paper
SHA-256 | 7a9b8aea89ccd7fbd91c4adf251cb37df6751074c2749b4e00907f8bac322700
wic1000-null.txt
Posted Oct 10, 2007
Authored by Luigi Auriemma | Site aluigi.org

World in Conflict versions 1.000 and below suffer from a denial of service vulnerability due to allowing access to a NULL pointer.

tags | advisory, denial of service
SHA-256 | dbef05b91e1f849784a4d9edcf6c2240e954adac928fbc2a32714040008e6435
Technical Cyber Security Alert 2007-282A
Posted Oct 10, 2007
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA07-282A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, Microsoft Outlook Express and Windows Mail, Microsoft Office, Microsoft Office for Mac, and Microsoft SharePoint. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | windows
SHA-256 | e0859f7589473840c9dfb074ebdd09f56024344f1e9cc298514d8a3c4d5b467b
Secunia Security Advisory 27135
Posted Oct 10, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
SHA-256 | 455bb8c3072b80122fc5ca725f6f1ac334508d5e43cb955577f7d01dd6ada448
iDEFENSE Security Advisory 2007-10-09.1
Posted Oct 10, 2007
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDefense Security Advisory 10.09.07 - Remote exploitation of a heap overflow in Microsoft Corp.'s Windows Mail and Outlook Express NNTP clients may allow an attacker to execute code with the privileges of the logged on user.

tags | advisory, remote, overflow
systems | windows
advisories | CVE-2007-3897
SHA-256 | 8b33b8798d8b760973d1bdb3e31f6e4db4c8ed300300f9438a91fdcb87c7ca17
ledgersmb-sql.txt
Posted Oct 10, 2007
Authored by Chris Travers

LedgerSMB versions 1.0.0 through 1.2.7 and SQL-Ledger version 2.x are susceptible to SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
SHA-256 | eda42bf7f295bb93c14358c74c7fcb4333fb8f63d7b699a043b52c7b3368a891
sip-pwn.txt
Posted Oct 10, 2007
Authored by Radu State

The Linksys SPA-941 version 5.1.8 is susceptible to a cross site scripting vulnerability using SIP as a vector of attack.

tags | exploit, xss
SHA-256 | 0958d5a7f2e07f89b846c84b23a0dcf0bafece8411139aa26cd887a7b529b58f
Ubuntu Security Notice 527-1
Posted Oct 10, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 527-1 - Joris van Rantwijk discovered that the Xen host did not correctly validate the contents of a Xen guests's grug.conf file. Xen guest root users could exploit this to run arbitrary commands on the host when the guest system was rebooted.

tags | advisory, arbitrary, root
systems | linux, ubuntu
advisories | CVE-2007-4993
SHA-256 | b20366bfd1d1fb2c8d548ccbaca36149c280a32d2dedb03ec5ce0141a24f9566
sipvicious-0.2.tar.gz
Posted Oct 10, 2007
Authored by Sandro Gauci | Site sipvicious.org

SIPVicious tools address the need for traditional security tools to be ported to SIP. This package consists of a SIP scanner, a SIP wardialer, and a SIP PBX cracker. Written in Python.

Changes: Multiple features have been added and tweaked.
tags | telephony, python
SHA-256 | b4ce7d3390a65075e49977aa14755b3028fc45bc726cd7eaafb4a1d36f7bc67f
lightblog-exec.txt
Posted Oct 10, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

LightBlog version 8.4.1.1 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 4e118497976bd7cb4eb74a897f54fbbb0382096bd54bb724aa3db4335c3b74c2
dnewsweb-xss.txt
Posted Oct 10, 2007
Authored by DoZ | Site hackerscenter.com

The DNews News Server is susceptible to cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | a540f73157973907cb350119d482dced0f6bcd1836e5dc5d650ece23c064a755
blackhat-dcamsterdam-cfp.txt
Posted Oct 10, 2007
Site blackhat.com

The speaker lineup for Black Hat Japan 2007 has been announced along with the Call For Papers for Black Hat D.C. and Black Hat Amsterdam.

tags | paper, conference
SHA-256 | 0b75ab511d25ac44fd050ee64161f08f69d479ac2bdc73716b76ade740fa5426
rcbd.c
Posted Oct 10, 2007
Authored by St0rM-MaN

Simple connect-back back door for Unix. Sends statistical information regarding the remote server such as uid/gid, uname, etc.

tags | tool, remote, rootkit
systems | unix
SHA-256 | 2e1e678ec44e8a8dd04699775555f44b001eb535aa98bfd66e2d7b932893bd3c
softbizjr-sql.txt
Posted Oct 10, 2007
Authored by IRCRASH | Site ircrash.com

Softbiz Jobs and Recruitment suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c6a8e37dc44aa1cdbdd413eee8a4a70f56d3f461f01852e7f284fc0c4b7999ab
cybercrime-electoral-system.pdf
Posted Oct 10, 2007
Authored by Oliver Friedrichs | Site symantec.com

Whitepaper titled Cybercrime and the Electoral System.

tags | paper
SHA-256 | fc2dcd7e071c499f8ddbca1dd9d1ee53828e4e34f0ef7d23ffac7d92a00c8545
bthomehub.txt
Posted Oct 10, 2007
Authored by PAgVac

It appears that the BT Home Hub is susceptible to some critical vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 7a1d22a3d50174df5079afb9fddeb87643baa008c3b4fdb1c002960066a85ff9
la-rfi.txt
Posted Oct 10, 2007
Authored by S.W.A.T. | Site xmors.com

LiveAlbum version 0.9.0 suffers from a remote file inclusion vulnerability in common.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | b12c73953607f6967e6727aa5bebca1908e2e6c12b7e17f316e3ed6a4133c7eb
xkiosk-rfi.txt
Posted Oct 10, 2007
Authored by BorN To K!LL

xKiosk version 3.0.1i suffers from a remote file inclusion vulnerability in xkurl.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | c730a769e6aa6577ada32ef88a2a8cac8f405f557f8c88eaaaff6a0170245c91
msfp-exec.txt
Posted Oct 10, 2007
Authored by shinnai | Site shinnai.altervista.org

Microsoft Visual Basic FoxPro version 6.0 arbitrary command execution exploit that makes use of FPOLE.OCX.

tags | exploit, arbitrary
SHA-256 | c0ea521d876f6724d876a0c9da5db0d05cdf7b1f76a041b0ad90aad87ae16b24
Secunia Security Advisory 27141
Posted Oct 10, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for xen. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | b8e74e6667a6c2c90933a8f18cb944b738fc3a2e90b44877f90ebc106a484797
HP Security Bulletin 2007-14.45
Posted Oct 10, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP System Management

tags | advisory, vulnerability
SHA-256 | b4662f90fe505cc23cfc9512d04b2471c895345ca85c6dda5cc611ec63c35275
HP Security Bulletin 2007-14.45
Posted Oct 10, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP System Management

tags | advisory, vulnerability
SHA-256 | 85c6d732941b75ce3540fc77989458c55a5aec7d70cbd58a4d86918246d13137
Page 1 of 3
Back123Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    20 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close