Exploit the possiblities
Showing 1 - 25 of 43 RSS Feed

Files Date: 2008-04-18

Secunia Security Advisory 29816
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Xpdf, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | a8fec30f6f8869676703ec93988a2cce
Secunia Security Advisory 29836
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Poppler, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | ce186e771651ddf873dd7a43418eb2df
tcpdump-3.9.8.tar.gz
Posted Apr 18, 2008
Site tcpdump.org

Tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities. Requires Libpcap.

Changes: Various updates.
tags | tool, sniffer
MD5 | c491a78c52fe73f1f7271aa5d8c6ab2e
GNU SIP Witch Telephony Server
Posted Apr 18, 2008
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

tags | telephony, protocol
MD5 | 51e2a2968890a6ce438751e372e434bc
filezilla-disclose.txt
Posted Apr 18, 2008
Authored by Carl Hardwick

Filezilla versions 3.0.9.2 and below allow local users access to all saved passwords due to the fact that they are stored in plain text in sitemanager.xml.

tags | advisory, local, info disclosure
MD5 | c22854541cbb97ff330a427d51f9210e
Secunia Security Advisory 29857
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | d78cea02775e027bd8018c1800a43950
Secunia Security Advisory 29878
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VLC, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | e6004bcb4191f3e7355ea2e8828fc94c
Secunia Security Advisory 29786
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 59a648c7b3a4514396b88505204358a0
Secunia Security Advisory 29875
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Exponent CMS, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | ebe52978518a88d943339554b2392d16
ibmdb2-exec.txt
Posted Apr 18, 2008
Authored by Martin Rakhmanov | Site appsecinc.com

Team SHATTER Security Advisory - IBM DB2 UDB suffers from an arbitrary code execution vulnerability in the ADMIN_SP_C/ADMIN_SP_C2 procedures.

tags | advisory, arbitrary, code execution
MD5 | de94e730f8daddae561a8998a10bbfd2
ibmdb2-overwrite.txt
Posted Apr 18, 2008
Authored by Cesar Cerrudo | Site appsecinc.com

Team SHATTER Security Advisory - IBM DB2 UDB suffers from an arbitrary file overwrite vulnerability in the SYSPROC.NNSTAT procedure.

tags | advisory, arbitrary
MD5 | c624ca8b2e7f283918eac4c013a73fbc
jar-dos.txt
Posted Apr 18, 2008
Authored by Ariel Sanchez | Site appsecinc.com

Team SHATTER Security Advisory - DB2 has multiple vulnerabilities which can lead to Denial of Service (DoS) attacks against the instance. When RECOVERJAR and REMOVE_JAR procedures are called with a specially crafted parameter the DB2 instance crashes. Any DB2 database user can exploit these vulnerabilities since PUBLIC permissions are granted to both procedures by default. The RECOVERJAR and REMOVE_JAR procedures are installed by default.

tags | advisory, denial of service, vulnerability
MD5 | 08128a2265c7f303e00858a4bffc90af
torrent-pwnage.txt
Posted Apr 18, 2008
Authored by Michael Brooks

uTorrent, Azurues, and TorrentFlux all suffer from cross site request forgery vulnerabilities in their WebUI functionality.

tags | exploit, vulnerability, csrf
MD5 | bae863718ec3caa3897a89b8ff265df2
fifthave-sql.txt
Posted Apr 18, 2008
Authored by The-0utl4w | Site aria-security.net

5th Avenue Shopping Cart suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | 98652c830b5eb269ba066d5b9beede65
Mandriva Linux Security Advisory 2008-089
Posted Apr 18, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Kees Cook of Ubuntu security found a flaw in how poppler prior to version 0.6 displayed malformed fonts embedded in PDF files. An attacker could create a malicious PDF file that would cause applications using poppler to crash, or possibly execute arbitrary code when opened.

tags | advisory, arbitrary
systems | linux, ubuntu, mandriva
advisories | CVE-2008-1693
MD5 | e99a3c71b13af72c3e05bd7db5c591d8
Mandriva Linux Security Advisory 2008-088
Posted Apr 18, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple vulnerabilities were discovered in ClamAV and corrected with the 0.93 release. These flaws include various overflows and arbitrary file overwrite vulnerabilities.

tags | advisory, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2007-6595, CVE-2008-0314, CVE-2008-0318, CVE-2008-0728, CVE-2008-1100, CVE-2008-1387, CVE-2008-1833, CVE-2008-1835, CVE-2008-1836, CVE-2008-1837
MD5 | c37bb73fa57c0909526e0c5b2021053b
RFIDIOt-Windows-0.1s.zip
Posted Apr 18, 2008
Authored by Adam Laurie | Site rfidiot.org

RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r). This is the Windows version.

Changes: Multiple bug fixes and a few additions.
tags | tool, python, wireless
systems | windows
MD5 | 520d182efdaa3ab5d39da0c3edb79051
RFIDIOt-0.1s.tgz
Posted Apr 18, 2008
Authored by Adam Laurie | Site rfidiot.org

RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).

Changes: Multiple bug fixes and a few additions.
tags | tool, python, wireless
MD5 | 52a220220f699296d1c7cd90ea70ace6
grape-rfi.txt
Posted Apr 18, 2008
Authored by MajnOoNxHaCkEr | Site 4rxh.com

Grape Statistics version 0.2a suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | b34b93b57d23f692fc30ba85e811c7e6
divx66.py.txt
Posted Apr 18, 2008
Authored by Mati Aharoni | Site offensive-security.com

DivX Player version 6.6.0 .SRT file handling SEH buffer overflow exploit.

tags | exploit, overflow
MD5 | d2684863a02bc465f44ff0eb972aecd9
wikepage-xss.txt
Posted Apr 18, 2008
Authored by Attila Gerendi

Wikepage Wiki version 2007-2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7049845824040de42e181b4fe65528b0
lightnhard-multi.txt
Posted Apr 18, 2008
Authored by Attila Gerendi

LightNEasy version 1.2.2 suffers from cross site scripting, directory traversal, and arbitrary file creation vulnerabilities.

tags | exploit, arbitrary, vulnerability, xss
MD5 | 99a44b61dfac128a58014fe0de832e24
Gentoo Linux Security Advisory 200804-22
Posted Apr 18, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200804-22 - Amit Klein of Trusteer reported that insufficient randomness is used to calculate the TRXID values and the UDP source port numbers. Versions less than 3.1.5 are affected.

tags | advisory, udp
systems | linux, gentoo
advisories | CVE-2008-1637
MD5 | d95dde0c7ec1fd6b71cb4a5e6db0d8cf
Gentoo Linux Security Advisory 200804-21
Posted Apr 18, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200804-21 - Multiple vulnerabilities have been identified, the worst of which allow arbitrary code execution on a user's system via a malicious Flash file. Versions less than 9.0.124.0 are affected.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2007-0071, CVE-2007-5275, CVE-2007-6019, CVE-2007-6243, CVE-2007-6637, CVE-2008-1654, CVE-2008-1655
MD5 | 2dc27ccfa962c9b4f161f8cf46ac4706
Gentoo Linux Security Advisory 200804-20
Posted Apr 18, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200804-20 - Multiple vulnerabilities have been identified in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE). Versions less than 1.6.0.05 are affected.

tags | advisory, java, vulnerability
systems | linux, gentoo
advisories | CVE-2007-2435, CVE-2007-2788, CVE-2007-2789, CVE-2007-3655, CVE-2007-5232, CVE-2007-5237, CVE-2007-5238, CVE-2007-5239, CVE-2007-5240, CVE-2007-5273, CVE-2007-5274, CVE-2007-5689, CVE-2008-0628, CVE-2008-0657, CVE-2008-1185, CVE-2008-1186, CVE-2008-1187, CVE-2008-1188
MD5 | 01e6a6b4b0d7ecdd0ebf50e52afe05db
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close