exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 51 RSS Feed

Files Date: 2007-10-29

realplayer-heap.txt
Posted Oct 29, 2007
Authored by John Heasman | Site ngssoftware.com

All versions of RealPlayer 10 and some builds of RealPlayer 10.5 suffer from a heap overflow in the ID3 tag parsing code.

tags | advisory, overflow
SHA-256 | 46421bbdec94678eace2f1448aa87b7317888d18e61f1d242f583bc1db79e149
Debian Linux Security Advisory 1388-3
Posted Oct 29, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1388-3 - The patch used to correct the DHCP server buffer overflow in DSA-1388-1 was incomplete and did not adequately resolve the problem. This update to the previous advisory makes available updated packages based on a newer version of the patch.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2007-5365
SHA-256 | aa575a2ef5aed2ab88c2ec89366c596430eecb1fb84615f855448062aeb85f21
SE-2007-01.txt
Posted Oct 29, 2007
Authored by Stefan Esser | Site sektioneins.de

TikiWiki versions 1.9.8.1 and below suffer from a remote PHP code evaluation vulnerability.

tags | advisory, remote, php
advisories | CVE-2007-5682
SHA-256 | 1e448247e42b5213f25a1930d3dc3f1fbd07ce7769c7aa65080d354bf82a5b72
Secunia Security Advisory 27435
Posted Oct 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Django, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 239531467915702198504158e73a5888cdba35a74b67ca748f5f24b2bb72a569
Secunia Security Advisory 27403
Posted Oct 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct phishing attacks, manipulate certain data, and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | c0102b05fd0443b258507f466521284e422cb330cfbf597967c54ad4f676e86e
oracle-dbms.txt
Posted Oct 29, 2007
Authored by Esteban Martinez Fayo | Site appsecinc.com

Team SHATTER Security Alert - Oracle Database Server provides the SYS.DBMS_AQADM_SYS package that is used internally by the SYS.DBMS_AQADM package to provide procedures to manage Oracle Streams Advanced Queuing (AQ) configuration and administration information. This package contains the procedure DBLINK_INFO which is vulnerable to buffer overflow attacks. Affected versions include Oracle Database Server versions 9iR1, 9iR2 (9.2.0.7 and previous patchsets) and 10gR1.

tags | advisory, overflow
SHA-256 | 58d76e3a0aef0c6352b4c4758f736521b656d25dc7b79ead00dce2d59a6de04b
oracle-mdsys.txt
Posted Oct 29, 2007
Authored by Esteban Martinez Fayo | Site appsecinc.com

Team SHATTER Security Alert - Oracle Database Server provides the MDSYS.SDO_CS package that contains subprograms for working with coordinate systems. This package contains the function TRANSFORM which is vulnerable to buffer overflow attacks. Affected versions include Oracle Database Server versions 8iR3, 9iR1, 9iR2 (9.2.0.6 and previous patchsets) and 10gR1 (10.1.0.4 and previous patchsets).

tags | advisory, overflow
SHA-256 | c1a8396a98fadf1347f49ba35e4dac43085a4c2e84bd788266f80b864f34c281
omnistar-xss.txt
Posted Oct 29, 2007
Authored by DoZ | Site hackerscenter.com

Omnistar Live suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 67292beadd7560c2dab90692f7e2f9806dcc6e9822d9df3c8059a1ba90df0c36
agtc-addadmin.txt
Posted Oct 29, 2007
Authored by Guns | Site 0x90.com.ar

AGTC-Membership system version 1.1a remote add administrator exploit.

tags | exploit, remote, add administrator
SHA-256 | 0b9b008502ba04e1769466e8168120c061c7f4b6e6b26aa36cebd8b6fcf37de5
gomplayer-overflow.txt
Posted Oct 29, 2007
Authored by rgod | Site retrogod.altervista.org

GOM Player version 2.1.6.3499 remote overflow exploit that makes use of GomWeb3.dll version 1.0.0.12. Spawns calc.exe.

tags | exploit, remote, overflow
SHA-256 | 906d927f7281a8d6b9f463de5a38983fe8e053fcbf3c0fe5cc7a02137c97ef19
kodak-exec.txt
Posted Oct 29, 2007
Authored by Woo-Chi

Kodak Image Viewer code execution exploit that takes advantage of the MS07-055 TIFF vulnerability. Spawns calc.exe.

tags | exploit, code execution
SHA-256 | ac113a9757fdb12baa7a63fe821b53472c829b45ebe854614e258959e2d484e4
sony-overflow.txt
Posted Oct 29, 2007
Authored by TaMBaRuS

Sony CONNECT Player M3U playlist processing stack buffer overflow local exploit.

tags | exploit, overflow, local
SHA-256 | 19b107d7edc7d67b224ebaa14f6fd2ba851bdbb98711f2d2ce4880a13495b6e4
oracle_database_vault_en.pdf
Posted Oct 29, 2007
Authored by Joxean Koret

Slides from the presentation Oracle Database Vault: Design Failures.

tags | paper
SHA-256 | aa413dac2420e9793150ea25140ef356d8f3b5c166c5a82b88e5082a51840006
viruses_next_generation-ITUNDERGROUND.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Next Generation Viruses.

SHA-256 | 6cfbaacb1ce17979d011060139f0ba7bfe18bf60ee51ae17acf2c0723f1c8117
Shadow_Software_Attacks.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Shadow Software Attacks.

SHA-256 | 9d3f365a840d4fe79ac57428f939eee876ade4b85c65af44212870259fb87bd6
Antiphish-ITUNDERGROUND.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello, Engin Kirda, Christopher Kruegel

Slides from a lecture given by the Technical University of Vienna Politecnico di Milano regarding AntiPhish: An Anti-Phishing Browser Plug-in based Solution.

SHA-256 | 11fdb1fd6cf3504814e13cee83b573ad2c17c0fd9b5ca17d7c6ea7217edc9c3e
writing-behind-a-buffer.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Writing Behind A Buffer.

SHA-256 | 67417f7ee79d3f522c2a4e3d577097a0fbf2a4fb4b71b2b080564f565d937cd5
saxon-sql.txt
Posted Oct 29, 2007
Authored by Jesper Jurcenoks | Site netvigilance.com

SAXON version 5.4 is susceptible to a SQL injection vulnerability.

tags | exploit, sql injection
advisories | CVE-2007-4863
SHA-256 | 23411f8d6a90e9b31e57ceffd7996d568c7aa8f2fdbeaa3bac734ad639ddb4e4
saxon-xss.txt
Posted Oct 29, 2007
Authored by Jesper Jurcenoks | Site netvigilance.com

SAXON version 5.4 is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2007-4862
SHA-256 | 1d43a200a24c368debf8a8e4ecee5ed36919c93f61f189dd6150d359436d3501
webroot-dns.txt
Posted Oct 29, 2007
Authored by Andrej Komarov | Site itdefence.ru

Webroot Desktop Firewall versions 5.5.10.20 and below suffer from a DNS recursion vulnerability.

tags | advisory
SHA-256 | 7499ce19071c898db4710e4a745d9d4bd46c353b60d884a7b6f1e0746d168c5b
Secunia Security Advisory 27420
Posted Oct 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Joey Hess has reported a security issue in vobcopy, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | b73a33229ad873d14944c1485b66cc3d03ac62ac3e6fd46a5b1a4d5adf851dd4
Secunia Security Advisory 27424
Posted Oct 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OpenLDAP, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 425bef9722424c9c57b0d7b7d10ebae7ea0ba5559ab26af6f05a25863be54609
secunia-tivoli.txt
Posted Oct 29, 2007
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered some vulnerabilities in IBM Tivoli Storage Manager Client, which can be exploited by malicious people to conduct script insertion attacks. Certain input passed in HTTP requests to the CAD service is not properly sanitized before being logged. This can be exploited to insert arbitrary HTML and script code into dsmerror.log, which is executed in a user's browser session in context of the affected site when e.g. viewing the log file via the web-based interface using the "FILE" functionality of the CAD service.

tags | advisory, web, arbitrary, vulnerability
advisories | CVE-2007-4348
SHA-256 | 277de8c11d9582d8e9b98a606bb24ac192a34dc0c97ab2267b159f9843c34e82
smartshop-xss.txt
Posted Oct 29, 2007
Authored by DoZ | Site hackerscenter.com

Smart-Shop Shopping Cart is susceptible to cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6dab28de6ebe8e2ea6aa36fc03a5207632099c3f00fc85f513eb04fb2a85d6ef
preventcsrf.txt
Posted Oct 29, 2007
Authored by Nexus | Site playhack.net

Whitepaper discussing the prevention of cross site request forgery attacks.

tags | paper, web, csrf
SHA-256 | f175ac2a874a9f1415a57c6ed31b6044ef783497e4f88ea01d77445b1856299e
Page 1 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close