Exploit the possiblities
Showing 26 - 50 of 988 RSS Feed

Files Date: 2008-02-01 to 2008-02-29

Secunia Security Advisory 29130
Posted Feb 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apple Mac OS X, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | apple, osx
MD5 | 4fabc95c5cb5a72ebcc751b5bed6a459
Secunia Security Advisory 29131
Posted Feb 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in D-Link MPEG4 SHM (Audio) Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 9b2d3f6ba8ddea7924ec9942fae8d408
Secunia Security Advisory 29133
Posted Feb 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mozilla Thunderbird, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | a983d3edb90cd552f8b8c88c568d51c9
Secunia Security Advisory 29137
Posted Feb 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in NetWin WebMail, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 1c3c064fbb2770f0b6758f2a20220d0b
Secunia Security Advisory 29140
Posted Feb 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in various Symantec products, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 74e70324e20800d81676213db50b9752
Secunia Security Advisory 29141
Posted Feb 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update in xine-lib. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | da88f637da2a72c8bed141a5d1851eae
Secunia Security Advisory 29145
Posted Feb 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in RTSP MPEG4 SP Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 07ca193f68153bd4d7255159f427a87d
Nmap Scanning Utility 4.53
Posted Feb 27, 2008
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Improved Windows executable installer by making uninstall work better on systems which changed the default install path. Multiple new other additions and bug fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 0d86c1c4fa55e936d0b7c8051f7036e9
Secunia Security Advisory 29082
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Cisco IP Phone 7921, which potentially can be exploited by malicious people to disclose sensitive information.

tags | advisory
systems | cisco
MD5 | 3c7c7f50be95e656aaaab7e7f74fae0a
Secunia Security Advisory 29146
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in 4XEM VatDecoder, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | c9e9ac98af84f05ebbc06869ce519d64
Core Security Technologies Advisory 2008.0130
Posted Feb 27, 2008
Authored by Core Security Technologies, Felipe Manzano, Anibal Sacco | Site coresecurity.com

Core Security Technologies Advisory - The VideoLAN (VLC) media player package is vulnerable to an arbitrary memory corruption vulnerability, which can be exploited by malicious remote attackers to compromise a user's system. VLC versions 0.8.6d and below and Miro Player versions 1.1 and below are vulnerable. Proof of concept code included.

tags | exploit, remote, arbitrary, proof of concept
advisories | CVE-2008-0984
MD5 | f24730594bd1527fb6468a67590f93bf
officescaz.zip
Posted Feb 27, 2008
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploits for Trend Micro OfficeScan Corporate Edition versions 8.0 Patch 2 and below and versions 7.3 Patch 3 and below which suffer from buffer overflow and dead process vulnerabilities. To use the exploits, nc SERVER 8080 -v -v here.

tags | exploit, overflow, vulnerability, proof of concept
MD5 | 7033f1fd4968dd98d7eb37813ca6ad2b
officescaz.txt
Posted Feb 27, 2008
Authored by Luigi Auriemma | Site aluigi.org

Trend Micro OfficeScan Corporate Edition versions 8.0 Patch 2 and below and versions 7.3 Patch 3 and below suffer from buffer overflow and dead process vulnerabilities.

tags | advisory, overflow, vulnerability
MD5 | c82af56fdd5d57edf3fd9c330f3f503e
Secunia Security Advisory 28910
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered some vulnerabilities in InterVideo WinDVD Media Center, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 8f0824d1e1f6e23b675e84e4e2a5d6f6
Secunia Security Advisory 29128
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hanno Boeck has discovered two vulnerabilities in Serendipity, which can be exploited by malicious users to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
MD5 | 6bdec746359fb8d10a1ecda87562d168
Debian Linux Security Advisory 1510-1
Posted Feb 27, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1510-1 - Chris Evans discovered a buffer overflow in the color space handling code of the Ghostscript PostScript/PDF interpreter, which might result in the execution of arbitrary code if a user is tricked into processing a malformed file.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2008-0411
MD5 | 494c001d4244d76d9882a2ef7cc2fcc3
ekoparty4-cfp.txt
Posted Feb 27, 2008
Site ekoparty.com.ar

The Ekoparty 4th edition Information and Insecurity Conference Call For Papers has been announced. It will take place in Buenos Aires, Argentina from October 2nd through October 3rd, 2008.

tags | paper, conference
MD5 | fd60481236058f3ffe319135566bf3ff
authentix-xss.txt
Posted Feb 27, 2008
Authored by Chris Castaldo, William Hicks

The AuthentiX administration page suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | ed02c1dde9d866834a78ff9c804d195c
2008_symarkpb.pdf
Posted Feb 27, 2008
Authored by Greg Sinclair, Michael Ligh | Site symark.com

Symark PowerBroker Security Advisory - A vulnerability has been identified in Symark's PowerBroker suite that allows an attacker with local access to gain root access. Versions up to and including 5.0.1 are vulnerable.

tags | advisory, local, root
MD5 | 35be0bd2cbb4b0b7fba154ae9bfa29e8
eazyportal-sql.txt
Posted Feb 27, 2008
Authored by Ironfist | Site ironwarez.info

EazyPortal versions 1.0 and below cookie-related remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 13e541481db75adc5d988fdfac0c56a7
mambosimple-sql.txt
Posted Feb 27, 2008
Authored by it's my | Site antichat.ru

Mambo Simpleboard Forum component version 1.0.3 Stable suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 9f276da2b96a8c5a6c1318ca0ba8c36d
pixy_3_03.zip
Posted Feb 27, 2008
Site seclab.tuwien.ac.at

Pixy is an open source vulnerability scanner that audits PHP applications for SQL injection and cross site scripting vulnerabilities. It is written in Java and also performs automatic resolution of file inclusions.

tags | tool, java, scanner, php, vulnerability, xss, sql injection, file inclusion
systems | unix
MD5 | 0c02c99ba1e094ce6265a16b696170e1
SandMan-1.0.080226.zip
Posted Feb 27, 2008
Authored by Matthieu Suiche | Site sandman.msuiche.net

SandMan is a framework providing a C library and a python portage to make readable and writable the Windows hibernation file.

tags | tool, python, forensics
systems | windows
MD5 | d651dcd9ae06c15c07f64118b01f1da4
Secunia Security Advisory 25400
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for diatheke. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | c64d8b1c9cb3e438071949b3eb4cb15d
Secunia Security Advisory 29102
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - xcorpitx has reported a vulnerability in Porar Webboard, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 6d828f77d0066d1d5f4befe796520ad8
Page 2 of 40
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close