what you don't know can hurt you
Showing 26 - 50 of 53 RSS Feed

Files Date: 2007-04-19 to 2007-04-20

HP Security Bulletin 2007-13.4
Posted Apr 19, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified on the Secure Sockets Layer (SSL) and BIND running on the HP Tru64 UNIX Operating System that may allow a remote attacker to execute arbitrary code or cause a Denial of Service (DoS).

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | unix
advisories | CVE-2006-4339, CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2007-0493, CVE-2007-0494
MD5 | aca30274a0222d588d8c6901112ef997
ietool-dos.txt
Posted Apr 19, 2007
Authored by sapheal

The Netsprint Toolbar version 1.1 suffers from a denial of service vulnerability.

tags | advisory, denial of service
MD5 | a41fce87276355eef152df7d0b58757d
Gentoo Linux Security Advisory 200704-15
Posted Apr 19, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200704-15 - The driver does not properly process Channel Switch Announcement Information Elements, allowing for an abnormal channel change. The ieee80211_input() function does not properly handle AUTH frames and the driver sends unencrypted packets before WPA authentication succeeds. Versions less than 0.9.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-7178, CVE-2007-7179, CVE-2007-7180
MD5 | 127ed596013007509cc3053231c1f37e
Gentoo Linux Security Advisory 200704-14
Posted Apr 19, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200704-14 - The Coverity Scan project has discovered a memory leak within the handling of certain malformed Diameter format values inside an EAP-TTLS tunnel. Versions less than 1.1.6 are affected.

tags | advisory, memory leak
systems | linux, gentoo
advisories | CVE-2007-2028
MD5 | 8596a06cdbf5c0c48a23fb0f0ab0577f
Gentoo Linux Security Advisory 200704-13
Posted Apr 19, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200704-13 - Conor Edberg discovered an error in the way file processes a specific regular expression. Versions 4.20 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-2026
MD5 | 3692c7508110928086101ca43096b6ed
ie7-dos.txt
Posted Apr 19, 2007
Authored by Jesus Oquendo | Site infiltrated.net

Microsoft Internet Explorer version 7.0.5730.11 is susceptible to a denial of service condition via a malicious script tag.

tags | exploit, denial of service
MD5 | debe65364765dcd26c13cb64e6144921
webmethods-glue.txt
Posted Apr 19, 2007
Authored by Jeremy Epstein | Site webmethods.com

webMethods Security Advisory - The Glue console versions 4.x, 5.x, and 6.x are susceptible to a directory traversal vulnerability.

tags | advisory
MD5 | 844b3c0d6236147f7e3b7477783b3f21
mlf17-rfi.txt
Posted Apr 19, 2007
Authored by the_Edit0r | Site xmors-security.com

My Little Forum version 1.7 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 85a2efd64bed61f0e43fcc7b55f85525
mlw-xss.txt
Posted Apr 19, 2007
Authored by the_Edit0r | Site xmors-security.com

My Little Weblog suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 110bac1b77ad3513cbc5ea644144f4eb
gizzar-rfi.txt
Posted Apr 19, 2007
Authored by BorN To K!LL

Gizzar is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 61c8c4167a0a9e6097fe92e892cde428
SYMSA-2007-003.txt
Posted Apr 19, 2007
Authored by Brian Reilly | Site symantec.com

Symantec Vulnerability Research SYMSA-2007-003 - Macrovision InstallAnywhere packages include an XML project configuration file named InstallScript.iap_xml. This file controls the behavior of the installation process, including verification of a password and/or serial number (if applicable). Upon starting an installer, a directory is created in temporary disk space. This directory contains multiple files, including a ZIP archive that contains the XML project file. A LaunchAnywhere executable is also created during the installation process and is used to launch the actual Java application installer. It is possible to bypass serial number and password controls by creating a copy of this temporary directory, extracting a copy of the XML project file from the ZIP archive, deleting the relevant serial number or password verification sections from the XML project file, replacing the modifiedXML project file in the ZIP archive, and then manually starting the installation process via the included LaunchAnywhere executable.

tags | advisory, java
advisories | CVE-2007-1009
MD5 | 35052e0bca8a0f09eec13aa887d65791
041607.html
Posted Apr 19, 2007
Authored by Rohit Sethi | Site webappsec.org

The Web Application Security Consortium is proud to present 'The Importance of Application Classification in Secure Application Development'.

tags | paper, web
MD5 | 067f062ee0605f2c9e32f8a6614d533c
Secunia Security Advisory 24867
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in ProFTPD, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | f4eff58573dcaa012f23e189d770f4f5
Secunia Security Advisory 24887
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has discovered some vulnerabilities in the vWar module for PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks and cross-site scripting attacks.

tags | advisory, php, vulnerability, xss, sql injection
MD5 | 5b0f841e632590910b69622773f854c0
Secunia Security Advisory 24893
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in McAfee e-Business Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 79ca0e592b68c9f8f2a3f1eeaafd734a
Secunia Security Advisory 24908
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dj7xpl has discovered a vulnerability in Anthologia, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.

tags | advisory
MD5 | f31cb2db3a6386b8a121e7521fb47552
Secunia Security Advisory 24914
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in McAfee VirusScan Enterprise, which can be exploited by malicious people to cause a DoS or to potentially compromise a vulnerable system.

tags | advisory
MD5 | dcafad0ad0ca60152e5a56fd7c14eab0
Secunia Security Advisory 24917
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for freeradius. This fixes a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, gentoo
MD5 | bff5af11fcc7491a8937570cb28eed61
Secunia Security Advisory 24918
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has acknowledged a security issue in file, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, gentoo
MD5 | f17ccc4ce0314bc58e538f04e046c24d
Secunia Security Advisory 24927
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Frank Dick has reported a vulnerability in Sun Solaris and Java Web Console, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, java, web
systems | solaris
MD5 | 467c81a03bbc999037a729c2700e8771
Secunia Security Advisory 24929
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in various Oracle products. Some of these vulnerabilities have unknown impacts, while others can be exploited to bypass certain security restrictions, cause a DoS (Denial of Service), conduct cross-site scripting and SQL injection attacks, or potentially compromise a vulnerable system..

tags | advisory, denial of service, vulnerability, xss, sql injection
MD5 | 017d3f021ebef93c834ee213d0fd502d
Secunia Security Advisory 24930
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged some vulnerabilities in HP Tru64 Unix.

tags | advisory, vulnerability
systems | unix
MD5 | 06c2cd76edae4729bf7043fd93145e8e
Secunia Security Advisory 24931
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for madwifi-ng. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | 514f849118625e9f619d5f01a4cc6562
Secunia Security Advisory 24933
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Patrick Webster has reported a vulnerability in webMethods Glue, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | b92e817fffd01fb446c8b70d1f8e0ccf
Secunia Security Advisory 24939
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gammarays has discovered a vulnerability in ShoutPro, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | a044781e09ceb85636cad5e9290a29fd
Page 2 of 3
Back123Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    22 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    2 Files
  • 23
    Jun 23rd
    1 Files
  • 24
    Jun 24th
    23 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close