exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 57 RSS Feed

Files Date: 2007-03-06

iDEFENSE Security Advisory 2007-03-02.t
Posted Mar 6, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 03.02.07 - Remote exploitation of a denial of service (DoS) vulnerability in Kaspersky Lab's Antivirus could allow an attacker to conduct a DoS attack on a targeted host. The antivirus engine is vulnerable to a DoS condition when processing an executable packed with UPX compression. Malformed compressed data causes the decompression routine to enter an infinite loop. Specifically, a negative data offset results in the same compressed data chunk being processed endlessly. iDefense has confirmed the existence of this vulnerability in Kaspersky Labs Antivirus Engine version 6.0.1.411 for Windows and 5.5-10 for Linux. Previous versions may also be affected. Any products that use the scanning engine are also affected, which includes the Kaspersky e-mail gateway scanner.

tags | advisory, remote, denial of service
systems | linux, windows
SHA-256 | 5e275b972a87d0c7aeeabf2ce2da830267094953cd811b1a7e697e79f8be856c
woltlab236-xss.txt
Posted Mar 6, 2007
Authored by Samenspender

Woltlab version 2.3.6 appears susceptible to cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 11a1e44675916282f1ffcdaf859755752fde518f59512989e0f4c48dab8fa0b3
Zero Day Initiative Advisory 07-08
Posted Mar 6, 2007
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache Tomcat JK Web Server Connector. Authentication is not required to exploit this vulnerability. Tomcat JK Web Server Connector version 1.2.19 and 1.2.20 are affected. Tomcat 4.1.34 and 5.5.20 are affected.

tags | advisory, remote, web, arbitrary
advisories | CVE-2007-0774
SHA-256 | 90ac43490f4525e25bb3660c57860eb488ad69e34585be64b3e14e78e15b8b87
maildisable-v4.pl.txt
Posted Mar 6, 2007
Authored by mu-b

Mail Enable Professional/Enterprise version 2.32 through 2.34 (Win32) remote exploit. Binds a shell to port 1337.

tags | exploit, remote, shell
systems | windows
SHA-256 | d6aed800fc5e11948e268ef3396c66fbfe126cef44542ce029e6669cd269b2d2
dbimage-rfi.txt
Posted Mar 6, 2007
Authored by Hasadya Raed

DBImageGallery version 1.2.2 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | f8a6169314cf886704e5d46dd4aef43ea1962caa9351b89f763508083c20388a
spaw-rfi.txt
Posted Mar 6, 2007
Authored by Hasadya Raed

SPAW Editor PHP Edition versions 1.2.3 and 1.2.4 suffer from a remote file inclusion vulnerability.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 4dd387f5ffaec616da03e2089b6c4486e7ce512fa512a0dd05f393dd9a6b58b4
knorrede-sql.txt
Posted Mar 6, 2007
Authored by Sebastian Bauer | Site blog.gjl-network.net

Knorr.de suffers from SQL injection vulnerabilities that allow for login bypass.

tags | exploit, vulnerability, sql injection
SHA-256 | d25aed4ce39fceef244cae04079f443cd907ded0e24c91d6a97e2f80db85b25f
vbul365-rssxss.txt
Posted Mar 6, 2007
Authored by meto5757

vBulletin version 3.6.5 suffers from a cross site scripting flaw in its RSS feed functionality.

tags | exploit, xss
SHA-256 | c6cc1fe24c95c249c717bdd415beea89cc8f598c702ed7297a4e2af04fd83ada
Ubuntu Security Notice 428-2
Posted Mar 6, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 428-2 - USN-428-1 fixed vulnerabilities in Firefox 1.5. However, changes to library paths caused applications depending on libnss3 to fail to start up. This update fixes the problem.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 42cd23bd84427f82a2192eb1748bf1b8f5290b5b59539086412aa6673395abdd
Gentoo Linux Security Advisory 200703-6
Posted Mar 6, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200703-06 - An integer overflow flaw has been found in the pixmap handling of Qt, making the AMD64 x86 emulation Qt library vulnerable as well. Versions less than 10.0 are affected.

tags | advisory, overflow, x86
systems | linux, gentoo
advisories | CVE-2006-4811
SHA-256 | 8b0c658d7aaa2eedf0059bd0e56e1a17aa0c1d4c59dae8d8119e8b51bc667e4b
Gentoo Linux Security Advisory 200703-5
Posted Mar 6, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200703-05 - Several vulnerabilities ranging from code execution with elevated privileges to information leaks affect the Mozilla Suite. Versions less than or equal to 1.7.13 are affected.

tags | advisory, vulnerability, code execution
systems | linux, gentoo
SHA-256 | b43d91fab139a2a88f8e69efe7525babed92ba1e001af5241abde5a612c65c18
Gentoo Linux Security Advisory 200703-4
Posted Mar 6, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200703-04 - Tom Ferris reported a heap-based buffer overflow involving wide SVG stroke widths that affects Mozilla Firefox 2 only. Various researchers reported some errors in the JavaScript engine potentially leading to memory corruption. Mozilla Firefox also contains minor vulnerabilities involving cache collision and unsafe pop-up restrictions, filtering or CSS rendering under certain conditions. Versions less than 2.0.0.2 are affected.

tags | advisory, overflow, javascript, vulnerability
systems | linux, gentoo
advisories | CVE-2006-6077, CVE-2007-0775, CVE-2007-0776, CVE-2007-0777, CVE-2007-0778, CVE-2007-0779, CVE-2007-0780, CVE-2007-0800, CVE-2007-0801, CVE-2007-0981, CVE-2007-0995
SHA-256 | f824210be570f79159b5e50e532fc69afe69865942bf86c2b96a7c39aeeceee8
Gentoo Linux Security Advisory 200703-3
Posted Mar 6, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200703-03 - An anonymous researcher discovered a file descriptor leak error in the processing of CAB archives and a lack of validation of the id parameter string used to create local files when parsing MIME headers. Versions less than 0.90 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2007-0897, CVE-2007-0898
SHA-256 | ee2f7987c5622a444e724df0a1937039cce5cef60caad53d51b3cff4af7e1eb5
Gentoo Linux Security Advisory 200703-2
Posted Mar 6, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200703-02 - SpamAssassin does not correctly handle very long URIs when scanning emails. Versions less than 3.1.8 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-0451
SHA-256 | ef4e276f8c7ffb074f754c18437dfb161e077e39cd5e2dcda1e8c1b73651c094
Gentoo Linux Security Advisory 200703-1
Posted Mar 6, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200703-01 - The Snort DCE/RPC preprocessor does not properly reassemble certain types of fragmented SMB and DCE/RPC packets. Versions less than 2.6.1.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2006-5276
SHA-256 | 99507aca92ca229eb2729ba7030aca79d9b1f335fbe3a25202f659984e2d7a69
built2go-xss.txt
Posted Mar 6, 2007
Authored by the_Edit0r

Built2Go version 1.0 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6ec0f67f8f996935163b2e66e6eaafc77817049f3d5ba360122f52422a0a206a
awebnews-rfi.txt
Posted Mar 6, 2007
Authored by ThE dE@Th

aWebNews version 1.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 21cf3c73efad19114dca97b59c0731ff14670ba31868c2b13f6300d208e75ddc
Clam AntiVirus Toolkit 0.90.1
Posted Mar 6, 2007
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various bug fixes and enhancements.
tags | virus
systems | unix
SHA-256 | 08a0255b4f6bdc4312eea6c118e79ecf684aed10640b45037d9dc5890c7687be
zzuf-0.8.1.tar.gz
Posted Mar 6, 2007
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

tags | fuzzer
SHA-256 | a16cbe19ea03b93a174d731bf1aba5205e2f4480a7118129eda6b0cb7c7b39bb
SIPcrack-0.2.tar.gz
Posted Mar 6, 2007
Authored by Martin J. Muench | Site codito.de

SIPcrack is a SIP protocol login cracker. It contains 2 programs, SIPdump to sniff SIP logins over the network and SIPcrack to bruteforce the passwords of the sniffed logins.

Changes: Added support for different methods, proxy-authorization, qop, cnonce, etc.
tags | cracker, protocol
SHA-256 | fb62d98c201b4fba469621bb55d9b2fbc6978f6b3a39048f7ed39f50ff3afc05
nmap_update.sh.txt
Posted Mar 6, 2007
Authored by Kris Katterjohn

Simple script that updates Nmap's data files and sticks them in a given directory or cwd.

tags | tool, nmap
systems | unix
SHA-256 | 888a480574d678d09e7f5762eda112ca471b4b9afe20e5cbd7ed82e66808de5f
Advisory4-20022007.txt
Posted Mar 6, 2007
Authored by ciri

WordPress versions 2.1.0 and below suffer from cross site request forgery with cross site scripting vulnerabilities. Oh, the madness.

tags | exploit, vulnerability, xss, csrf
SHA-256 | f4eda6cdc00d698f5247183a33eee544a1b137e2366e811d36479867f926bd74
serendipity-sql.txt
Posted Mar 6, 2007
Authored by Samenspender

Serendipity version 1.1.1 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | c74dd442aaac7c6daa7faf6d317215be052ad477e91b4db04866b8a7580b457f
wbnews-rfi.txt
Posted Mar 6, 2007
Authored by ThE dE@Th

WB News suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | bfa5175c6aad1aa9f9342d0c2219df9a5cc56b471c4de2b619f33895a735c34c
angellms71-sql.txt
Posted Mar 6, 2007
Authored by Guns

Angel LMS version 7.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c27594fcc35b3cf24a6d9e52bf0c74e8c65a6eea3a58eb662db1517786b82bed
Page 1 of 3
Back123Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close