exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2007-01-07 to 2007-01-08

Secunia Security Advisory 23575
Posted Jan 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kaspersky Antivirus, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | fe8c2a038afb4ef1a82867dc28136394097f32206cdfed436a7aa0d880be082e
Secunia Security Advisory 23622
Posted Jan 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Eudora WorldMail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | ad1a4d925a7bb86e9587aea69596c97f3c6f654a1da81558a3456d12d0d258a4
iDEFENSE Security Advisory 2007-01-05.2
Posted Jan 7, 2007
Authored by iDefense Labs, Christoph Diehl | Site idefense.com

iDefense Security Advisory 01.05.07 - Remote exploitation of a heap overflow in Opera Software ASA's Opera Web browser could allow an attacker to execute arbitrary code in the security context of the current user. The vulnerability specifically exists due to Opera improperly processing a JPEG DHT marker. The DHT marker is used to define a Huffman Table which is used for decoding the image data. An invalid number of index bytes in the DHT marker will trigger a heap overflow with partially user controlled data. iDefense has confirmed the existence of this vulnerability in Opera version 9.02 on both Windows and Linux. Previous versions may also be affected.

tags | advisory, remote, web, overflow, arbitrary
systems | linux, windows
SHA-256 | 6c351dd5914ce569d5878f873352109dbf8f71015507f1fc7195ecfe13fb77be
iDEFENSE Security Advisory 2007-01-05.1
Posted Jan 7, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 01.05.07 - Remote exploitation of a typecasting bug in Opera Software ASA's Opera Web browser could allow an attacker to execute arbitrary code on the affected host. A flaw exists within Opera's Javascript SVG implementation. When processing a createSVGTransformFromMatrix request Opera does not properly validate the type of object passed to the function. Passing an incorrect object to this function can result in it using a pointer that is user controlled when it attempts to make the virtual function call. iDefense has confirmed the existence of this vulnerability in Opera version 9.02 on both Windows and Linux. Previous versions may also be affected.

tags | advisory, remote, web, arbitrary, javascript
systems | linux, windows
SHA-256 | 056332b96e15c13f08ae5f65ebe9a023720d8595be75f1bb87014b7c59716623
edittag12-xss.txt
Posted Jan 7, 2007
Authored by Nima Ghotbi

EditTag version 1.2 is susceptible to local file inclusion and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 611985018b2e0090d997a65ae70399d12fdbc96f0a27b35288fc86b413167681
kolayindir-sql.txt
Posted Jan 7, 2007
Authored by ShaFuck31

Kolayindir Download is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | cf57a84db59f7caabefec5b300776472093fbac1649c688075a231d6015af9a2
riblog-xss.txt
Posted Jan 7, 2007
Authored by ShaFuck31

RI Blog version 1.3 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | a52ed8301133ee2ea69c5e0f7f10a249d98fe8d91ebe3eb70cdeebdda300b37b
veredirect.txt
Posted Jan 7, 2007
Authored by Aditya Sood

Verisign's Weblogs service is susceptible to redirection attacks.

tags | advisory
SHA-256 | 327970bf9ff7ce5c46213c09508e96385df5dc272c5d9d0c87ecd9b889d9e56a
Hardened-PHP Project Security Advisory 2007-02.141
Posted Jan 7, 2007
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to SQL injection and arbitrary PHP code execution vulnerabilities.

tags | advisory, arbitrary, php, vulnerability, code execution, sql injection
SHA-256 | 6ae242405ad8f267856415ba69fbe2d72b0564bc948f563c7faddf7468dc8a27
Hardened-PHP Project Security Advisory 2007-01.140
Posted Jan 7, 2007
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to a cross site scripting vulnerability.

tags | advisory, php, xss
SHA-256 | 2e3cbc0dfeeffe8d32e3e64641b81da4f32b8024d0bbc6b54762599b015b0f9a
DRUPAL-SA-2007-002.txt
Posted Jan 7, 2007
Authored by Uwe Hermann | Site drupal.org

Drupal security advisory - The way page caching was implemented allows a denial of service attack. An attacker has to have the ability to post content on the site. He or she would then be able to poison the page cache, so that it returns cached 404 page not found errors for existing pages. If the page cache is not enabled, your site is not vulnerable. The vulnerability only affects sites running on top of MySQL.

tags | advisory, denial of service
SHA-256 | 586514a30d2638ed99461f42690efaf3b811a03e2eafffba2aa3d38eb5218f2e
DRUPAL-SA-2007-001.txt
Posted Jan 7, 2007
Authored by Uwe Hermann | Site drupal.org

Drupal security advisory - A few arguments passed via URLs are not properly sanitized before display. When an attacker is able to entice an administrator to follow a specially crafted link, arbitrary HTML and script code can be injected and executed in the victim's session. Such an attack may lead to administrator access if certain conditions are met.

tags | advisory, arbitrary
SHA-256 | d4f4f67373a26f8122e427f493188ae9edcd921450b63a220e9b9cedb0051f07
coppermine-php.txt
Posted Jan 7, 2007
Authored by DarkFig

Coppermine Photo Gallery versions 1.4.10 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 65b174348d0e69181017fad62d2dd2609111f2c11a1049d1c610d15a085015d9
ios-mdb.txt
Posted Jan 7, 2007
Site aria-security.com

Intranet Open Source suffers from a remote password database disclosure vulnerability.

tags | exploit, remote
SHA-256 | 969163db779ff2ab8971e6581b1ffab00066fbe385e8382da5538c00723d28ba
qbytes.txt
Posted Jan 7, 2007
Authored by slythers

Qbytes, or Quantique Bytes, is a library that can be used for easy recomputation and error detection when performing a cryptographic attack.

tags | library
SHA-256 | f51fb543bdffb855e84cc71c3678a67bfd6e6491c3eb668c4b19596ee4a2a96f
uberupload.txt
Posted Jan 7, 2007
Authored by Null | Site gammahack.com

Uber Uploader 4.2 suffers from a code execution flaw via uploading a malicious PHP file.

tags | exploit, php, code execution
SHA-256 | 7007aa102fa82c7ba4d121b0cf960425ea3dd27cd7486300d810ac8186070a6f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close