exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files Date: 2007-08-21 to 2007-08-22

Secunia Security Advisory 26533
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - imei addmimistrator has reported some vulnerabilities in OlateDownload, which can be exploited by malicious people to bypass certain security restrictions, conduct SQL injection attacks, and compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | f9a093561ec980206bf1ed3c832e0986c64cf037864331797a889023888b4f64
Secunia Security Advisory 26535
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for libvorbis. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
SHA-256 | e54ac4f47aa0dcf817c87a68bdeafe11af7429d6fa555dfb64d1691ed67a5498
Secunia Security Advisory 26537
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for rsync. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, mandriva
SHA-256 | e1b8bb39920b7c3abc9b9b9e3c622ff5b1009ab269913da7aab7b119d39c846f
Secunia Security Advisory 26546
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in NuFW, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 6d87649c7fe6fe4160f8010408e0a61b7a4a424d4baa8fce73a4dc49215c2e2d
cisco-stateful-dos.txt
Posted Aug 21, 2007
Authored by Radu State

The Cisco 7940 phone is susceptible to a denial of service vulnerability when sent ten specially crafted SIP messages. Demonstration exploit included.

tags | exploit, denial of service
systems | cisco
SHA-256 | b5c33d9a6426c46d3becf4aa32e3e428f63412cdcf1674b31961ebc4b12302cc
cisco-dos.txt
Posted Aug 21, 2007
Authored by Radu State

The Cisco 7940 is susceptible to a denial of service vulnerability when sent three specially crafted SIP messages. Demonstration exploit included.

tags | exploit, denial of service
systems | cisco
SHA-256 | 134337ca6ad629cf4af363ffced7f718f0a59e26375e2aa87831e28d21612a40
gurur-sql.txt
Posted Aug 21, 2007
Authored by dumenci

Gurur Portal suffers from a remote SQL injection vulnerability in uyeler2.php.

tags | exploit, remote, php, sql injection
SHA-256 | da49ea184d0b8a4fbd6ce789f711b6b55a60369b0018e569f309cd8a9f0d9812
Tenshi Log Monitoring Program
Posted Aug 21, 2007
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Fixed some rpm spec issues. Added support for queue escalation.
tags | system logging
systems | unix
SHA-256 | f8cc4600a25fc085cd5e3b9af07afd6c0b4607569dde134226e4dd928228c171
firesoft-rfi.txt
Posted Aug 21, 2007
Authored by DarKdewiL

Firesoft suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | d5c622c72a31f395a717f60a418ad016e57df411caef4d32213579b4b02862ff
dalai-rfi.txt
Posted Aug 21, 2007
Authored by DarKdewiL

Dalai Forum suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 1cf145147fc494de7f02b8fce8cb2ceb259871a5a6b2bb59fc30989a953b4adb
SYMSA-2007-007.txt
Posted Aug 21, 2007
Authored by J.R. Wikes | Site symantec.com

Symantec Vulnerability Research SYMSA-2007-007 - Treo Smartphones running the Palm OS are vulnerable to a remote Denial of Service attack while connected to data networks allowing inbound ICMP traffic. It is possible for an attacker to launch this attack from the Internet by sending specially crafted ICMP requests at the targeted phone's assigned IP address.

tags | advisory, remote, denial of service
advisories | CVE-2007-4213
SHA-256 | 43c6aae1db1e2b458881e9ff013987fdfd71e20f13d98837f99cbbcd4c55aae4
Secunia Security Advisory 26497
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gregory Shikhman has reported a security issue in the nvidia-drivers package, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | a5a6af083545933b06fc1dfa9af30cc5bc764c6e5c27f35c5967baaadddd9958
Secunia Security Advisory 26501
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Yahoo! Messenger, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system.

tags | advisory, denial of service
SHA-256 | c65266393181f5c38cf3914e03df862902e92dd550e0d7bfad11c1131354fb2f
Secunia Security Advisory 26504
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Torrent Trader, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | f4a41f9a3e2978a5ee56bdc3d5ee5413759af49e4f2b241f909e232a4da2d525
Secunia Security Advisory 26506
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in the Unreal Engine, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 4e79d099cdc40caacc32093acc0bb6e028f706968cc73471cb368bec747dc545
Secunia Security Advisory 26507
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in Toribash, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | b373efff8064ec460cfe7c6f900bd48edbf8dae6a810c9b2b8db94f4f4cd96fb
Secunia Security Advisory 26509
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
systems | linux, gentoo
SHA-256 | 6a3b5f1441da51bda753c80bdb016796c477dcb53dc8460aad6f20a6b4bfe3dd
Secunia Security Advisory 26510
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in the Drupal Project and Project issue tracking modules, which can be exploited by malicious users to disclose sensitive information and bypass certain access restrictions.

tags | advisory
SHA-256 | bdfc3045e881c8f8a08381b653f0b5910cb0278789a3ab3612c557794cc173de
Secunia Security Advisory 26512
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for mod_jk. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, gentoo
SHA-256 | c507aaea5846ee0fb6928e03cc57db1f854cade0a791fa94b1d69d07fa10de17
Secunia Security Advisory 26519
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - eliteb0y has discovered a vulnerability in Mercury Mail Transport System, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 619816ac934732df2f15c28d7d1be7437385d625e086a36357a0d6be88f850c9
Secunia Security Advisory 26521
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for tcpdump. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, slackware
SHA-256 | 085e47d54f6ff2b0bf1be913a64791b50c73c3f1f0701fc5b60519a878586be4
Secunia Security Advisory 26526
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in rFactor, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 89bb28764dc5f1d1959eba45dd03d6a98567f1238297059ae09bdb2c9cb64e1a
Secunia Security Advisory 26532
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Lhaz, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6f18d88e15dc786e676b07d384367d3896f51910d0315cb540b140d8fbc123f7
Secunia Security Advisory 26536
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nikolaus Schulz has reported a security issue in id3lib, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | cc3533439c1e14868a9401b6df2e2f4e9865f2b28a83a6edf21355bc9e2cad34
Secunia Security Advisory 26540
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sudo, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
SHA-256 | c03f799c731ed94a603aae798a9158f79cc9a64e383dca2a90c7c86171f8370e
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close