exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 32 RSS Feed

Files Date: 2007-10-30 to 2007-10-31

Secunia Security Advisory 27438
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Liferea, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
SHA-256 | c45892a67321ca0fda774d36067af6f0cb866bd402a336be15ad352fe5a3e46e
Secunia Security Advisory 26905
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in the IMail Client, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | d90e0e574f1a26be3de62b51e0f769d4c64bb9d1af1fedcdc6742e17f0092a08
Secunia Security Advisory 27384
Posted Oct 30, 2007
Authored by Secunia, Fatih Ozavci | Site secunia.com

Secunia Security Advisory - Fatih Ozavci and Caglar Cakici have reported some vulnerabilities in RSA KEON Registration Authority, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 2a78f18e1de140d32f2b878fcd997505ecb3af1c092a4cb6fb1ded04361aeb3f
Secunia Security Advisory 27395
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
SHA-256 | 59cf61227907084b9441ce6c855e66bd4b2943ed71f734804249efc09efe4488
Secunia Security Advisory 27399
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, and by malicious people to conduct cross-site scripting attacks and compromise a user's system.

tags | advisory, local, vulnerability, xss
systems | linux, suse
SHA-256 | b6434f871c6a2219d2951540714048beb09bc9730d855a6a46b86799d663141d
Secunia Security Advisory 27407
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has discovered a vulnerability in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4ffdc6a0e0547f79cf7ed236db00d31cfd0133303f8b86e54be47dfa0606ab08
Secunia Security Advisory 27416
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Fire X2100 M2 and X2200 M2, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 9e7baccbff28851235fa660fa87fd238e4ddfdcb29d390915d4ff6d23e9e9c40
Secunia Security Advisory 27418
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in GOM Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 8423a7a19569b1ffe40ceb834dbee3d6fabd64c8f95fa87430594e264faf6622
Secunia Security Advisory 27430
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 0x90 has reported a vulnerability in PHP-AGTC membership system, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, php
SHA-256 | 21b91a27815844d3d76a7fd6f5de522fc4783137e182523d9ce916b6907650c9
Secunia Security Advisory 27432
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ruby. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof, ruby
systems | linux, fedora
SHA-256 | 3bc780fe13bbae50641cf16a68252ab25f805b94d581587923450571713074c0
Secunia Security Advisory 27442
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NuFW, which can potentially be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 311797dcc1a2321a331c97b115c483e1b46a201031f2fadbdd8fa0887d05eef7
Secunia Security Advisory 27444
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jesper Jurcenoks has reported a vulnerability in Saxon (Simple Accessible XHTML Online News), which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 58d9ac2c4ea831a1380bf106265aefa0c24d1c4664708592c7b2b52a8c804246
Secunia Security Advisory 27449
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Doz has reported a vulnerability in Omnistar Live, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ac8dd398572a06ad549da76faba15cf491aaf4443ce441d53e0b075e7bebcd41
Secunia Security Advisory 27453
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for tar. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | 43648bbbdda724f8f4b1b0da779bf253441f25f296c85ac33fdd5d061575f63f
Secunia Security Advisory 27460
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for python. This fixes a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, python
systems | linux, fedora
SHA-256 | bf10d0dedf92ffcabf7ace280342704e48cd85db9ae0c200ed1cf019edbf6171
secunia-ipswitch.txt
Posted Oct 30, 2007
Site secunia.com

Secunia Research has discovered a vulnerability in the IMail Client, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the IMail Client when processing emails containing multipart MIME data. Affected is the IMail Client 9.22 included with IPSwitch IMail Server 2006.22.

tags | advisory
advisories | CVE-2007-4345
SHA-256 | a883096d6b3c74da6e4fbec481cd79cdd49036efedecd5279487175af089a661
django-csrf.txt
Posted Oct 30, 2007
Authored by J. Carlos Nieto

Django version 0.96 suffers from a cross site request forgery vulnerability in the administrative panel.

tags | exploit, csrf
SHA-256 | 76aece109583ecf3ddabcd474683db807e3c19d93d2f8bafa67029a1044e275d
airkiosk-xss.txt
Posted Oct 30, 2007
Authored by Skien

Sutra's Airkiosk is susceptible to a cross site scripting vulnerability due to using an old formlib.pl.

tags | advisory, xss
SHA-256 | 241e37d44a0cb51ab483952e36bd9ea68450306c1e47ba68b4410ce6f5bb6baf
RFIDIOt-0.1q.tgz
Posted Oct 30, 2007
Authored by Adam Laurie | Site rfidiot.org

RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).

Changes: Fixed ASN1 field length calculation in mrpkey.py, various additions.
tags | tool, python, wireless
SHA-256 | ba40fde5749fc637da21e003561ecc2060901717bc903c641f4e2013e374cbee
profile-upload.txt
Posted Oct 30, 2007
Authored by r00t

ProfileCMS version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | c296f1459616acc9f2cf7271d8b4871aa941fd5223357aa0c0128269884d2c64
msrs-rfi.txt
Posted Oct 30, 2007
Authored by r00t

MySpace Resource Script (MSRC) version 1.21 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 3a6be3baad413c82853a1e0a61150eacf286e74290b5c99729e01567d5923433
NGS00419.txt
Posted Oct 30, 2007
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - It is possible to cause the Java Virtual Machine to overwrite an arbitrary memory location with an arbitrary value (repeatedly and in a stable manner) when parsing a malformed TrueType font. JDK and JRE versions 5.0 Update 9 and below as well as SDK and JRE versions 1.4.2_14 and below are affected.

tags | advisory, java, arbitrary
SHA-256 | 0f0ebea1254e1ec07669df846e6a69c1b0b5d28d5ec47a79fc20ee4ef9e02c1b
NGS00443.txt
Posted Oct 30, 2007
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - JDK and JRE versions 6 Update 1 and below, 5.0 Update 11 and below, and SDK and JRE versions 1.4.2_14 and below contain a vulnerability that allows an untrusted applet to violate the network access restrictions placed on it by the Java sandbox.

tags | advisory, java
SHA-256 | 9a7c6871dff0c09ab04b8fb752675bf310bc954b330129c49fbe3633fb2bc29c
vfd-zlib.txt
Posted Oct 30, 2007
Authored by Stefan Kanthak

It appears that Virtual Floppy Drive is susceptible to an old zlib vulnerability associated with version 1.2.2.

tags | advisory
advisories | CVE-2005-2096
SHA-256 | 3daf388470e7d15edc4431b7389876a80edcbb536864ae8adc82a4c291b0bb1d
Secunia Security Advisory 27413
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GoLd_M has discovered a vulnerability in Sige, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.

tags | advisory
SHA-256 | 36abdb73ddca33f65d93609dc17f3fe034c8a875860c05824112334e130945a6
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close