Twenty Year Anniversary
Showing 1 - 25 of 87 RSS Feed

Files Date: 2007-12-12

Secunia Security Advisory 28030
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for e2fsprogs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
MD5 | 66d2039639e42dc7cfc6efaaeae6a15c
Secunia Security Advisory 27871
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Symantec Mail Security, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 8d1f89ed7811e23baa117ff508d27679
Secunia Security Advisory 28046
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the mod_imagemap module for Apache, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 964b58fd20cf66e9e54ab375191ca601
Secunia Security Advisory 28068
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has issued an update for Adobe Flash Player. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of sensitive information or compromise a user's system.

tags | advisory, vulnerability
MD5 | 6395f44f6249dde65cf8d18f6c1cef38
Secunia Security Advisory 28073
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the mod_imap module for Apache, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | ce27aeaa3a203c4b2dca6a243f789fdb
iDEFENSE Security Advisory 2007-12-11.2
Posted Dec 12, 2007
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 12.11.07 - Remote exploitation of a stack buffer overflow vulnerability in Microsoft Corp.'s DirectShow could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability exists in the DirectShow SAMI parser, which is implemented in quartz.dll. When the SAMI parser copies parameters into a stack buffer, it does not properly check the length of the parameter. As such, parsing a specially crafted SAMI file can cause a stack-based buffer overflow. This allows an attacker to execute arbitrary code. iDefense has confirmed Microsoft DirectX 7.x and Microsoft DirectX 8.x are vulnerable. Microsoft DirectX 9.0c or newer is not vulnerable.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2007-3901
MD5 | e693d3582cbe875a9d4d0f14be2e879c
iDEFENSE Security Advisory 2007-12-11.1
Posted Dec 12, 2007
Authored by iDefense Labs, Peter Vreugdenhil | Site idefense.com

iDefense Security Advisory 12.11.07 - Remote exploitation of a heap corruption vulnerability in Microsoft Corp.'s Internet Explorer web browser allows attackers to execute arbitrary code in the context of the current user. The vulnerability lies in the JavaScript setExpression method, which is implemented in mshtml.dll. When malformed parameters are supplied, memory can be corrupted in a way that results in Internet Explorer accessing a previously deleted object. By creating a specially crafted web page, it is possible for an attacker to control the contents of the memory pointed to by the released object. This allows an attacker to execute arbitrary code. As of April 5th, 2007, iDefense testing shows that Internet Explorer 6.0 and Internet Explorer 7.0 with all available security patches are vulnerable. Older versions of Internet Explorer may also be vulnerable.

tags | advisory, remote, web, arbitrary, javascript
advisories | CVE-2007-3902
MD5 | 9c4c580a8e36817b3afe5e7aa86438ed
openstego-0.1.1.zip
Posted Dec 12, 2007
Authored by Samir Vaidya | Site sourceforge.net

OpenStego is a command line tool for image based steganography. It supports embedding of messages or files in 24bpp images.

tags | encryption, steganography
MD5 | c7e95145039f2fd6cdffa1b32a757763
hpopen-overflow.txt
Posted Dec 12, 2007
Authored by Mati Aharoni | Site offensive-security.com

HP OpenView Network Node Manager version 07.50 CGI remote buffer overflow exploit that spawns a shell on tcp/4444.

tags | exploit, remote, overflow, shell, cgi, tcp
MD5 | b951951b30d381eef1be4d2ef5fcb558
viart-rfi.txt
Posted Dec 12, 2007
Authored by RoMaNcYxHaCkEr

ViArt CMS version 3.3.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 9d1b60b4b11d87b8ca3f41b9ff7e7d59
fastpub-rfi.txt
Posted Dec 12, 2007
Authored by RoMaNcYxHaCkEr

Fastpublish CMS version 1.9999 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 906b08f5d6c0ad9d7e1b09adab9a22b9
xnu-superblob-dos.c
Posted Dec 12, 2007
Authored by mu-b

Apple Mac OS X xnu versions 1228.0 and below local kernel denial of service proof of concept exploit.

tags | exploit, denial of service, kernel, local, proof of concept
systems | apple, osx
MD5 | 10a647463477175d18b997a41f947014
aanvalBasic-3.3-stable.tar.gz
Posted Dec 12, 2007
Site aanval.com

Aanval Basic is the light-weight alternative to the full Aanval Snort and Syslog. Aanval is the leading web-based snort and syslog interface for correlation, management and reporting. Capable of handling more than 1+ Billion events, Aanval has been protecting Domestic and Foreign Governments, Fortune 50 Enterprises, Global Financial Institutions and local Small Businesses since 2003.

tags | tool, web, local, sniffer
MD5 | 0f963cbf65655c655a4da41870d5650c
liveSnort-1.0-stable.tar.gz
Posted Dec 12, 2007
Authored by Remote Assessment | Site aanval.com

liveSnort is a simple, yet useful live Snort monitoring web-application that takes advantage of AJAX/Web 2.0 technology to make the task of monitoring and viewing the most recent Snort events easier.

tags | tool, web, sniffer
MD5 | 0173424aa299b2701d9e4ed32714c0fd
msoffice-signature.txt
Posted Dec 12, 2007
Authored by Henrich C. Poehls, Dong Tran, Finn Petersen, Frederic Pscheid

Microsoft Office 2007's digital signature protection does not protect meta-data.

tags | advisory
MD5 | 4344e3549407ac807bc6531c29a6bf52
SUSE-SA-2007-068.txt
Posted Dec 12, 2007
Site suse.com

SUSE Security Announcement - The Samba suite is an open-source implementation of the SMB protocol. This update of samba fixes a buffer overflow in function send_mailslot() that allows remote attackers to overwrite the stack with 0 (via memset(3)) by sending specially crafted SAMLOGON packets.

tags | advisory, remote, overflow, protocol
systems | linux, suse
advisories | CVE-2007-6015
MD5 | 82308caf56f9dc3eeeb3831af2756513
Debian Linux Security Advisory 1428-2
Posted Dec 12, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1428-2 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

tags | advisory, remote, denial of service, arbitrary, kernel, local, vulnerability
systems | linux, debian
advisories | CVE-2007-3104, CVE-2007-4997, CVE-2007-5500, CVE-2007-5904
MD5 | fefafb29d006c19f1561977674396f15
Secunia Security Advisory 27894
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
MD5 | d69f5340bce4f8f4835c9127d9ff16c4
Secunia Security Advisory 27993
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, slackware
MD5 | 587b8c6b9eb082b42037be30eda21bd1
Secunia Security Advisory 27999
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | e87b97683a97d3f7089939c77a0d4bd1
Secunia Security Advisory 28019
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dave Lewis has reported a vulnerability in Websense Enterprise and Websense Web Security Suite, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, xss
MD5 | 803d29181426e914062e948338cabdb9
Secunia Security Advisory 28044
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM AIX, which have unknown impacts.

tags | advisory, vulnerability
systems | aix
MD5 | 3f341c5952ce1998e43b9e848d5519e5
Secunia Security Advisory 28052
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Red Hat Enterprise Linux, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, redhat
MD5 | 72a44ed29fee0ed9607509b9a1a4b1a5
Secunia Security Advisory 28033
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, debian
MD5 | be3b577bcd234c99793c20d7474de745
Zero Day Initiative Advisory 07-076
Posted Dec 12, 2007
Authored by Tipping Point, Tenable Network Security | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows with the Message Queuing Service enabled. Authentication is not required to exploit this vulnerability. The specific flaw exists in the RPC interface defined on port 2103 with UUID fdb3a030-065f-11d1-bb9b-00a024ea5525. During the processing of opnum 0x06 the service copies user-supplied information into a fixed length stack buffer. Sending at least 300 bytes will trigger a stack based buffer overflow due to a vulnerable wcscat() call. Exploitation of this issue can result in arbitrary code execution. Affected versions are Windows 2000 SP4 and Windows XP SP2.

tags | advisory, remote, overflow, arbitrary, code execution
systems | windows, 2k, xp
advisories | CVE-2007-3039
MD5 | 1bd474b25aceb117a8378f9633f4f4c3
Page 1 of 4
Back1234Next

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    11 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close