exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2007-07-23 to 2007-07-24

Debian Linux Security Advisory 1337-1
Posted Jul 23, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1337-1 - Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. These vulnerabilities range from cross site scripting to arbitrary code execution flaws.

tags | advisory, remote, arbitrary, vulnerability, code execution, xss
systems | linux, debian
advisories | CVE-2007-3089, CVE-2007-3285, CVE-2007-3656, CVE-2007-3734, CVE-2007-3735, CVE-2007-3736, CVE-2007-3737, CVE-2007-3738
SHA-256 | caf99c2e0f0035b962c0967f4694b48897b5d59cdcb1f4b99a052dd8022a5767
Debian Linux Security Advisory 1336-1
Posted Jul 23, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1336-1 - Several remote vulnerabilities have been discovered in Mozilla Firefox. These vulnerabilities range from cross site scripting to integer overflows.

tags | advisory, remote, overflow, vulnerability, xss
systems | linux, debian
advisories | CVE-2007-1282, CVE-2007-0994, CVE-2007-0995, CVE-2007-0996, CVE-2007-0981, CVE-2007-0008, CVE-2007-0009, CVE-2007-0775, CVE-2007-0778, CVE-2007-0045, CVE-2006-6077
SHA-256 | a98c39a362439e5b88e741c42cab3df3a56653b20b92b9b497c954513ffad1b0
alstrasoft-multi.txt
Posted Jul 23, 2007
Authored by Lostmon | Site lostmon.blogspot.com

A number of cross site scripting and SQL injection vulnerabilities affect various products from AlstraSoft including Video Share Enterprise, Text Ads Enterprise, SMS Text Messaging Enterprise, Affiliate Network Pro, Article Manager Pro, and AskMe Pro.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | dc6daac339055624b32c31104884c5c2c701f74e23323cec7c2aa98c2ad180d5
areca-overflow.txt
Posted Jul 23, 2007
Authored by Sebastian Wolfgarten | Site devtarget.org

Areca CLI versions 1.72.250 and below suffer from a local buffer overflow vulnerability that may allow for privilege escalation.

tags | advisory, overflow, local
SHA-256 | bdaa852f62e1e41dbf2bb98e4db5dcf22f214b67757301867c6797af6b442b7e
SA-20070722-0.txt
Posted Jul 23, 2007
Authored by Johannes Greil | Site sec-consult.com

SEC Consult Security Advisory - SEC Consult has discovered an arbitrary code execution flaw in Joomla! version 1.5 beta 2.

tags | exploit, arbitrary, code execution
SHA-256 | 27257772ee84bdb082f3c8d0b36b605e8ca0215067cd5b2505a0b873391955c4
CVE-2007-3383.txt
Posted Jul 23, 2007
Authored by Tomasz Kuczynski | Site tomcat.apache.org

Tomcat versions 4.0.0 to 4.0.6 and 4.1.0 to 4.1.36 suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 18d606dd2290c995c57c23bf0c1b1e49d55196f30e1dcbb36548399e8febeefe
major_rls51.txt
Posted Jul 23, 2007
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Virtual Hosting Control System (VHCS) versions 2.4.7.1 and below suffer from a session fixation issue.

tags | exploit
SHA-256 | 73d3d879de481d6b2736a1fc68f718a21c7b938d9b0d1272f5755e5075d90cdb
propertypro-sql.txt
Posted Jul 23, 2007
Authored by The-0utl4w | Site aria-security.net

Property Pro suffers from an administrative bypass vulnerability via SQL injection.

tags | exploit, sql injection, bypass
SHA-256 | 779ad3a56635f2d4d2e966165dc86526d25215f6cc7a00d3b05b8a9dc67d0825
CVE-2007-3816.txt
Posted Jul 23, 2007
Authored by Aditya K Sood | Site secniche.org

JWIG might allow context-dependent attackers to cause a denial of service via loops of references to external templates.

tags | advisory, denial of service
advisories | CVE-2007-3816
SHA-256 | 0ead7d2c9293234988840ac672454f04d0bb39727a583dc26868cfb6d076d5a3
Mandriva Linux Security Advisory 2007.147
Posted Jul 23, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A number of vulnerabilities were discovered in how ImageMagick handles DCM and XWD image files. If a user were tricked into processing a specially crafted image file with an application that uses ImageMagick, an attacker could cause a heap-based buffer overflow and possibly execute arbitrary code with the user's privileges.

tags | advisory, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2007-1667, CVE-2007-1797
SHA-256 | e750eae12797936836380b41923827acf218aeba3377097f5eef5a05078aed28
sitesi-xss.txt
Posted Jul 23, 2007
Authored by GeFORC3

Alisveris Sitesi Scripti is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fe5598ae4c7e1e728a6ef6c778b90ca22e403789cf80ec04e00243c80b14a3fb
sitesi-sql.txt
Posted Jul 23, 2007
Authored by GeFORC3

Alisveris Sitesi Scripti is susceptible to SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 91773935b56311b961c16d900c31380d317f7aa87b5a1840e1771a2c6b5798d3
cvmatik11-xss.txt
Posted Jul 23, 2007
Authored by GeFORC3

ASP Cvmatik version 1.1 suffers from cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, asp
SHA-256 | 046015a060a100f20f08cc83fe5c1753cd84ad4592cb57dda34a6580e4a1dd6d
doraemlak-xsssql.txt
Posted Jul 23, 2007
Authored by GeFORC3

Dora Emlak script version 1.0 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 900fcefdb8c6bd87de201935f7285646334d2ba1c9939a15f5d61da16c5b7210
jblog-xss.txt
Posted Jul 23, 2007
Authored by S4mi

JBlog version 1.0 suffers from cross site scripting and administrator creation vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | cfdf8ce1ce00f4156d16f9e3161f158e96cf6d4e416c43c84f586b71535bdc7d
usebb-xss.txt
Posted Jul 23, 2007
Authored by S4mi

UseBB version 1.0.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dbaf1c0d8b52049db5b6d7a9f5abb0dad3175710b729683d2781a076d9494251
n.runs-SA-2007.019.txt
Posted Jul 23, 2007
Authored by Sergio Alvarez | Site nruns.com

Panda Antivirus suffers from a buffer overflow vulnerability when parsing .EXE files.

tags | advisory, overflow
SHA-256 | bdb5975a56bd792f35a90bd24991fc728d68034244db73c1937a0b59bd80e004
n.runs-SA-2007.018.txt
Posted Jul 23, 2007
Authored by Sergio Alvarez | Site nruns.com

ESET NOD32 Antivirus suffers from a divide by zero vulnerability when parsing ASPACK and FSG packed files.

tags | advisory
SHA-256 | 343a656eaaefb99ba095c462d08364f3d556324a3321bb3bf32ce70fdd02939d
n.runs-SA-2007.017.txt
Posted Jul 23, 2007
Authored by Sergio Alvarez | Site nruns.com

ESET NOD32 Antivirus suffers from an integer overflow vulnerability when handling ASPACK packed files.

tags | advisory, overflow
SHA-256 | 33554f046759e59c122079d582ab1f11cf561a5181b4ba4108fded5f2b995c13
n.runs-SA-2007.016.txt
Posted Jul 23, 2007
Authored by Sergio Alvarez | Site nruns.com

ESET NOD32 Antivirus suffers from a heap corruption vulnerability during the parsing of .CAB files.

tags | advisory
SHA-256 | 8dae8f5f74c1a686972ac290694b45ebd96e122d26950d506a99ac0cfc1ccb98
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close