exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2007-04-23 to 2007-04-24

Secunia Security Advisory 24963
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has acknowledged a vulnerability in courier-imap, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, imap
systems | linux, gentoo
SHA-256 | f45259c47d5367e0a620e37099d5aa378aabec20040d256f947b75d0e52dd596
Secunia Security Advisory 24958
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in WEBinsta FM Manager, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.

tags | advisory
SHA-256 | a7b2e07757073159d340c7d0096fb73e4e98f310d9af46f4b8c13401fda73f8d
Secunia Security Advisory 24961
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3proxy, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | f03199cc3db5ae902c96d7115694a14e29b85d884a0c9f9fa4b3d4ac40b3cda9
Secunia Security Advisory 24964
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for aircrack-ng. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
SHA-256 | c1c283fcd07a8259c2603ad12fc608f57a8ada56c2282e13f1b5b3f4afa278d0
Secunia Security Advisory 24973
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6e394f65bf273c0de387c42cf7bdab97b05df9de7870dede6ffb6975e9672f90
Secunia Security Advisory 24974
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, debian
SHA-256 | 85f661900da408437517569f55f7018743379caba2c92199a2a266dee49cf1e1
Secunia Security Advisory 24981
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in PhotoFiltre Studio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4dabed05ef92113ad3b787295859cdca6977039278317c694c2da9a58926d94b
Secunia Security Advisory 24986
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in ZomeAlarm products, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
SHA-256 | f14b4fe7b83c41da402240ceb4827c6975ee0321867f6408afc9bd6622b767c2
Secunia Security Advisory 24987
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS / IR, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 5b2826d34e476ea7eaf04ae352f745fc934f5346cc5f597659adfeb14253e9b1
Secunia Security Advisory 24994
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in ACDSee products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f9c9d7d4c7dbed1a7338916d8d60e5fe7ff3d216e8d654054f3552f4d301b72b
Secunia Security Advisory 24995
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to manipulate data, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to manipulate data, conduct cross-site scripting attacks, cause a DoS, and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, xss
systems | linux, suse
SHA-256 | 6b981c18cb8d3392793460523c88ef2080a4dae238f9f9a5702df0f8d156d53a
Secunia Security Advisory 24996
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued an update for freetype and clamav. This fixes some vulnerabilities, where one has unknown impacts, and others can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 2bf3dc05a24ca2e657e3969cfd75dd0a12dda6eb0702029df4fae1f871ff31ac
Secunia Security Advisory 25001
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for 3proxy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
SHA-256 | 26cf37fa8b8ec643d342c39a7b99f7168c3012bfd9d4ab3e72d96b1c92848dd9
Secunia Security Advisory 25003
Posted Apr 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in NeatUpload, which can be exploited by malicious people to gain knowledge of potentially sensitive information.

tags | advisory
SHA-256 | 6aa9d4cd0d1b458e772318ad1ce2afdae79217c4d4462bf4c28a52f4075433e3
synscan-5.0b2.tar.gz
Posted Apr 23, 2007
Authored by mu-b, John Anderson | Site digit-labs.org

SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 47dc879fed164cbb41bec07d33de62faf97d964d92278bce0fa318c910ca12ac
gsasl-0.2.16.tar.gz
Posted Apr 23, 2007
Authored by Simon Josefsson

GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.

Changes: See the changelog.
tags | imap, library
SHA-256 | 47dc89ff255055fae7b212c7f568126ab456bce2ad6e4ce02db71b40ab6c626a
lomac-v1.1.2.tar.gz
Posted Apr 23, 2007
Authored by Tim Fraser | Site alum.wpi.edu

LOMAC is a dynamically-loadable security module for Free UNIX kernels that uses Low Water-Mark Mandatory Access Control (MAC) to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised network server daemons. The LOMAC loadable kernel module can be used to harden Linux systems without any changes to existing kernels, applications, or configuration files. Due to its simplicity, LOMAC itself requires no configuration, regardless of the users and applications present on the system.

Changes: Please see changelog.
tags | remote, kernel, trojan
systems | linux, unix
SHA-256 | 7d9fd8c887cfcaee957b0a74460ed59a171f5ee5a1b22718c47e72a0f4b192a0
cm4p-rfi.txt
Posted Apr 23, 2007
Authored by Silitoad | Site silitoad.org

cm4p version 0.6.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 750747d3a9b619127bff1b9d62ad0b017b28084b2be074c64ad867cd167cbf10
metabb-rfi.txt
Posted Apr 23, 2007
Authored by Silitoad | Site silitoad.org

MetaBB version 6 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2fc8ad97bffc99161d1f4d7636cd8b3f442587f0e214860bcc97d8b702a5a2b8
amsn_dos.txt
Posted Apr 23, 2007
Authored by noptrix | Site corehack.org

amsn versions 0.96 and below suffer from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | a11b18835803069e532da4cdb7e5014f4cf6c28610825a6f5a4e1d25507641c0
openssh-disclose.txt
Posted Apr 23, 2007
Authored by Rembrandt

System account enumeration is possible when OpenSSH versions 4.6 and below have ChallengeResponseAuthentication enabled (S/KEY).

tags | advisory, info disclosure
SHA-256 | 1ff367e663ad5227576fda522c34ea8d41163498f44a0745cfb6727e9de28a90
rezervi27-rfi.txt
Posted Apr 23, 2007
Authored by Arham Muhammad

Rezervi Availability version 2.7 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 5401fd091e537799a388f37a68ea842b522c70e155bcd5f41f0df93bd7dd9676
nipper-0.9.3.tgz
Posted Apr 23, 2007
Authored by Ian Ventura-Whiting | Site sourceforge.net

nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing.

Changes: Maintenance release.
systems | cisco, juniper
SHA-256 | 8a276ed572ba90cc7ab49ab643f18c51290a4bc9979a5b90a9ddceef5007e7a1
iDEFENSE Security Advisory 2007-04-20.1
Posted Apr 23, 2007
Authored by iDefense Labs, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 04.20.07 - Local exploitation of multiple design error vulnerabilities within multiple Check Point Zone Alarm products could allow an attacker to gain elevated privileges. iDefense has confirmed the existence of these vulnerabilities within version 5.0.63.0 of srescan.sys as installed with Check Point Zone Labs Zone Alarm Free. All other products within the Zone Alarm product line are suspected to be vulnerable. Previous versions are also suspected to be vulnerable.

tags | advisory, local, vulnerability
SHA-256 | 83b862129517b60146e0d9b85f3dc72dbcc63462a1d0dc679845a5fee0f1a5c2
digioz-rfi.txt
Posted Apr 23, 2007
Authored by Arham Muhammad

DigiOz Guestbook version 1.7.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 279931bf1efcfc114f7654b849131329da7ce741c7fbb388c5eec1dc29c08861
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close