exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files Date: 2008-01-02

Secunia Security Advisory 28268
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for exiftags. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | d410741f86c0278a940c7e52568f056eba88046b1d7f813b553f780b2bece055
Secunia Security Advisory 28266
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for libexif. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | d39fad8df852d60f200305569caad46437b3b5f8bc50b65bb41b4b939fe5410c
Secunia Security Advisory 28221
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for inotify-tools. This fixes a vulnerability, which can potentially be exploited by malicious users to compromise an application using the library.

tags | advisory
systems | linux, debian
SHA-256 | d2fc691b0710d47d55a379e32ebccc02ffccf5b4a9b6f7fa8e56f7032da60f62
Mandriva Linux Security Advisory 2008-1
Posted Jan 2, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A number of vulnerabilities in the Wireshark program were found that could cause crashes, excessive looping, or arbitrary code execution.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2007-6111, CVE-2007-6112, CVE-2007-6113, CVE-2007-6114, CVE-2007-6115, CVE-2007-6116, CVE-2007-6117, CVE-2007-6118, CVE-2007-6119, CVE-2007-6120, CVE-2007-6121, CVE-2007-6438, CVE-2007-6439, CVE-2007-6441, CVE-2007-6450, CVE-2007-6451
SHA-256 | c69c6d3dfddc1a86b8846802535f1dd1e77e053ec148560e109f53603a8a2dc2
Secunia Security Advisory 28267
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for exiv2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | a1c6776e75e387f456dadd240e9c28cf23cbc36c68730de48489e2d91da3d72c
Secunia Security Advisory 28288
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 35270cda06cb217a78e91c601dfe1cd4388be65a39e63c9da8152a62c181b293
AST-2008-001.txt
Posted Jan 2, 2008
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - The handling of the BYE with Also transfer method was broken during the development of Asterisk 1.4. If a transfer attempt is made using this method the system will immediately crash upon handling the BYE message due to trying to copy data into a NULL pointer.

tags | advisory
SHA-256 | 20c92e563a5e81918a24b9db84f689f656287c30c74250a54b4c5f8c1b9ed24d
gswsshit.zip
Posted Jan 2, 2008
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept code that demonstrates format string and buffer overflow vulnerabilities in Georgia SoftWorks SSH2 Server versions 7.01.0003 and below.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | 789af7610281337d3380a3bc5106aa197f67b20614e4fd62f5bcd8491d8b6388
gswsshit.txt
Posted Jan 2, 2008
Authored by Luigi Auriemma | Site aluigi.org

Georgia SoftWorks SSH2 Server versions 7.01.0003 and below are vulnerable to format string and buffer overflow vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 9bc627a765585240639ddac60046d1c9debb996c1a46fe0bd10acb38328c4bf8
whitedunboffs.zip
Posted Jan 2, 2008
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept code that demonstrates buffer overflow and format string vulnerabilities in White Dune versions 0.29beta791 and below.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | ef2f770fdbb5234db58b1ca5affe9bda2a11f9d7700a145da047d4482c9c265b
whitedunboffs.txt
Posted Jan 2, 2008
Authored by Luigi Auriemma | Site aluigi.org

White Dune versions 0.29beta791 and below suffer from buffer overflow and format string vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 3180aa0d4eb9dc5c37120d5e23c070a067c55ef57d95decab94c4ee69dc8f907
phpbb2022-xss.txt
Posted Jan 2, 2008
Authored by Alfredo Panzera | Site opencosmo.com

phpBB version 2.0.22 suffers from a cross site scripting vulnerability in admin_groups.php.

tags | exploit, php, xss
SHA-256 | ce131f837eaf0c1dd3077b0a794eecbb03f9fe0e9a2f3ff83cd395ed0125ad13
Secunia Security Advisory 27954
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and two weaknesses have been reported in Atlassian JIRA Enterprise Edition, which can be exploited by malicious users to bypass certain security restrictions and malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, xss
SHA-256 | 47a6173f3906eaf57856fe221278f3ca75a3f9aa7d767abc8b24b1803622ce9f
Secunia Security Advisory 28278
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for clamav. This fixes some vulnerabilities, where one vulnerability has an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | d06336a70fe0fcd75823e57bae9335e8fed4dd48e3ee0f5c8a914494d72d5e0e
Secunia Security Advisory 28289
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for emul-linux-x86-gtklibs. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, x86
systems | linux, gentoo
SHA-256 | 5771214df1f67e548f14b4af4e655f679ca667eb3e4f36a06709d425b89b309e
ircdexp.tgz
Posted Jan 2, 2008

ircd hybrid 6 exploit. inviter side.

tags | exploit
SHA-256 | 5cfb98fc0e693d67317d1e29b46d5d6db00e1b41eb3be165313e5659a8b063ba
OpenStego Free Steganography Solution 0.3.0
Posted Jan 2, 2008
Authored by Samir Vaidya | Site sourceforge.net

OpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images.

Changes: Support added for password based encryption.
tags | java, encryption, steganography
SHA-256 | d88b4091cd3a7882adc21503bb2bee03549a711555edd39fc0d926fb5142351c
synscan-5.0.tar.gz
Posted Jan 2, 2008
Authored by mu-b, John Anderson | Site digit-labs.org

SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 9bdddf9e48546043929eba3971edc11896b208e153617cd8f66f0af0cd74afa9
tork-0.26.tar.gz
Posted Jan 2, 2008
Authored by robhogan | Site tork.sf.net

TorK is a Tor Controller for KDE. It allows you to configure, run, and update Tor. It also allows you to view the Tor network and choose how you would like to interact with the it.

Changes: Minor features added along with various bug fixes.
tags | tool, peer2peer
SHA-256 | 984a734e3d06c30ce745d1f3d50e657de2e86dd94a491208d5a93dcfcff39c1c
ttyrpld-2.50.tar.bz2
Posted Jan 2, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Changed the packet format to be compatible between 32-bit and 64-bit. Added rplcvt utility. Explicit blacklists added.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 9448dfd204026491d4a5fee13a6207a0bc8ebe407c267ad56062d7faa7f0e498
Secunia Security Advisory 28269
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has acknowledged some vulnerabilities mt-daapd, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 2833baed0733e1aa7bf9b384bd5eda9046e78cc881b35c4dada2e408c88f40ae
flash-xss.txt
Posted Jan 2, 2008
Authored by Rich Cannings

Critical vulnerabilities exist in a large number of widely used web authoring tools that automatically generate Shockwave Flash (SWF) files, such as Adobe Dreamweaver, Adobe Acrobat Connect (formerly Macromedia Breeze), InfoSoft FusionCharts, and Techsmith Camtasia. The flaws render websites that host these generated SWF files vulnerable to cross site scripting.

tags | advisory, web, vulnerability, xss
SHA-256 | 4701b835838774bc219626ee779836622a348a4894cc73c6fb116b3cdc74a426
BTScan.tgz
Posted Jan 2, 2008
Authored by Jerome Athias | Site securinfos.info

BTScan is a bluetooth scanner for Windows. It scans for the accessible bluetooth devices, retrieves the list of available services on these devices, and allow file uploads via bluetooth.

tags | tool, file upload, wireless
systems | windows
SHA-256 | a3d23cec0cde56fb35df911c10b0ea27986a486ebdeae3a5af3d752f72d91746
modxcms-lfi.txt
Posted Jan 2, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

MODx CMS version 0.9.6.1 suffers from source code disclosure and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | c440e94489ff15d699e5155e57866f30e019a3d0179536770763e8ee1f4a74d6
Secunia Security Advisory 28293
Posted Jan 2, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ilmila has discovered a vulnerability in Plone, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | c60b4e03e0f41e3ee6778530bc1a63f7d6559000300a2bcc34bf4663ef53fd96
Page 1 of 2
Back12Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close