exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 138 RSS Feed

Files Date: 2007-01-27 to 2007-01-28

Cisco Security Advisory 20070124-crafted-tcp
Posted Jan 27, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of Cisco IOS software is vulnerable to a remotely-exploitable memory leak that may lead to a denial of service condition. This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the Cisco IOS device will not trigger this vulnerability.

tags | advisory, denial of service, tcp, protocol, memory leak
systems | cisco
SHA-256 | ab4319057c969bd970a1b91975c755186666cbba2631863f0d27222d5be9eff7
CA Security Advisory 34993
Posted Jan 27, 2007
Authored by Ken Williams, Computer Associates | Site www3.ca.com

CA BrightStor ARCserve Backup for Laptops and Desktops contains multiple overflow conditions that can allow a remote attacker to cause a denial of service, or execute arbitrary code with local SYSTEM privileges on Windows.

tags | advisory, remote, denial of service, overflow, arbitrary, local
systems | windows
advisories | CVE-2007-0449
SHA-256 | 6e6e8672248a7e1c4d803e9bf66b4054b05795508a899203c5e4ade01aafd269
secunia-nctaudio.txt
Posted Jan 27, 2007
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Sienzo Digital Music Mentor, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the NCTAudioFile2.AudioFile ActiveX control when handling the "SetFormatLikeSample()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (about 4124 bytes) as argument to the affected method. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.

tags | advisory, overflow, arbitrary, activex
advisories | CVE-2007-0018
SHA-256 | 4a145b830ea50bf86d15f10c5b8c02dcd4cd063d843372d236584a2c2c9882cc
secunia-nctsoft.txt
Posted Jan 27, 2007
Site secunia.com

Secunia Research has discovered a vulnerability in NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll) when handling the "SetFormatLikeSample()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (about 4124 bytes) as argument to the affected method. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.

tags | advisory, overflow, arbitrary, activex
advisories | CVE-2007-0018
SHA-256 | 361d252a18d1dfb801d29ee39ce252a8f63bbafaf403df2a5e0c96f7d912e12f
SUSE-SA-2007-013.txt
Posted Jan 27, 2007
Site suse.com

SUSE Security Announcement - This update fixes several format string bugs that can be exploited remotely with user-assistance to execute arbitrary code. Since SUSE Linux version 10.1 format string bugs are not exploitable anymore.

tags | advisory, arbitrary
systems | linux, suse
advisories | CVE-2007-0017
SHA-256 | 6b2bdc550586e6a5f63c1230ceb748d9bd167167f804ebd60469a4d9b58e1adc
ProCheckUp Security Advisory 2006.14
Posted Jan 27, 2007
Authored by Adrian Pastor, ProCheckUp

IP Phones based on the Centrality Communications/Aredfox PA168 chipset suffer from a weak session management vulnerability. Exploit included.

tags | exploit
SHA-256 | 1821bfb5f8cd756cd89b28517356ba2347b103a4fe336db4aabb7a4ab85a7751
wbv265-sql.txt
Posted Jan 27, 2007
Authored by Rolf Huisman

Website Baker version 2.6.5 suffers from a SQL injection flaw.

tags | advisory, sql injection
SHA-256 | bccba3281ef63a3c7c7d939ddecd7070e841c63eae45a7416420722bcdf47fa2
Secunia Security Advisory 23475
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a5b9d50edc28b580acef93165a66744916fe7a6f31a5f6c406b3e64f1bbc8f66
Secunia Security Advisory 23493
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Aurora Media Workshop, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | efd98193c67c7156670f5f854731c07ca7e09096900de77d9723d746dd7e0457
Secunia Security Advisory 23511
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various J. Hepple products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 9608ed455b8fa650216146792772624dcaa9db25d1dffba59cf60fea601bb128
Secunia Security Advisory 23530
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in iMesh, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 547af6e111ea97d136ca0c0e7f8e22a9f6dd2c0a459d6cc83284e6efb8478cd4
Secunia Security Advisory 23532
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in two Quikscribe products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 177c00842c4e8b791e78c5687bbbc76ea2fe5ba9da619f51f6eb4bccb6b28799
Secunia Security Advisory 23534
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various R.M. de Boer Software products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 7f104246042fabe9b701c5a83f1068c2f4d022db7e0a292b9c15c39607bc3b6d
Secunia Security Advisory 23535
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in CDBurnerXP Pro, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4e297601def34d17be01e77bf231b65440b5d328be64de82455f6e7637e54885
Secunia Security Advisory 23543
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Sienzo Digital Music Mentor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3fd8d55dd3db53d4f2b55e8b782bea35d2a08590b096c1ef47cf893eaf574626
Secunia Security Advisory 23544
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in MP3 Normalizer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 52945a2ab9224dd27556a19694771bb1bbdae431a0374467d689ca8531803701
Secunia Security Advisory 23546
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Roemer Software products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 68a4e8c950631421655bd282b41152264c2d211522049e2e16e574eff659ccd8
Secunia Security Advisory 23550
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Joshua Software products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6dfd15adf0f65fc4aacada23935c2db07b6d0cabb94aa8c7d98a00ff459ebf64
Secunia Security Advisory 23551
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in two Virtual CD products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2a83a875ce847c9caa02d4bca542b9c7ff3ae43118a9d29ab07acd5c4a211fb2
Secunia Security Advisory 23552
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Cheetah CD Burner and Cheetah DVD Burner, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ae92040f1fb09bb2a6a4ad6cf5db7034132217381d2f9a5fafbe69db49cad4ad
Secunia Security Advisory 23553
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Mystik Media products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 92f53cfce5016d735de797a8f4778f72f41e2c29d2d77a0adc7ba155e8d591ae
Secunia Security Advisory 23554
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Power Audio Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c64eef14989a06d9b9c299ae7ddb0cb7674873df5593190241a6e0f20ab6cfe4
Secunia Security Advisory 23557
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various DanDans Digital Media products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 58da71727d56903bfcd6754aea9fcf5d2cd60ede3adbc6a6f3175421bb23de0f
Secunia Security Advisory 23560
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Absolute Software products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6882da3b4c1c1c09e5f0294f6a03ce8b9081498e50317e31d44d5850f04d2c7c
Secunia Security Advisory 23561
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Easy Ringtone Maker, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | b58ea2c6e65611ed8fa3c0d1caeb24ad1c04c6c11684d7ba652538e9a10450f9
Page 3 of 6
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close