exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 754 RSS Feed

Files Date: 2007-01-01 to 2007-01-31

Cisco Security Advisory 20070124-crafted-ip-option
Posted Jan 27, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco routers and switches running Cisco IOS\256 or Cisco IOS XR software may be vulnerable to a remotely exploitable crafted IP option Denial of Service (DoS) attack. Exploitation of the vulnerability may potentially allow for arbitrary code execution. The vulnerability may be exploited after processing an Internet Control Message Protocol (ICMP) packet, Protocol Independent Multicast version 2 (PIMv2) packet, Pragmatic General Multicast (PGM) packet, or URL Rendezvous Directory (URD) packet containing a specific crafted IP option in the packet's IP header. No other IP protocols are affected by this issue.

tags | advisory, denial of service, arbitrary, code execution, protocol
systems | cisco, osx
SHA-256 | ce57524847e83d7482bc8e420b9dbb9e787fa20de112c186a3841b558a674089
Cisco Security Advisory 20070124-IOS-IPv6
Posted Jan 27, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Processing a specially crafted IPv6 Type 0 Routing header can crash a device running Cisco IOS software. This vulnerability does not affect IPv6 Type 2 Routing header which is used in mobile IPv6. IPv6 is not enabled by default in Cisco IOS.

tags | advisory
systems | cisco
SHA-256 | 696980d0085a820ddb8b1c1413f1abf3258d882ba19edba8b76a1042e118b3bb
Cisco Security Advisory 20070124-crafted-tcp
Posted Jan 27, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of Cisco IOS software is vulnerable to a remotely-exploitable memory leak that may lead to a denial of service condition. This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the Cisco IOS device will not trigger this vulnerability.

tags | advisory, denial of service, tcp, protocol, memory leak
systems | cisco
SHA-256 | ab4319057c969bd970a1b91975c755186666cbba2631863f0d27222d5be9eff7
CA Security Advisory 34993
Posted Jan 27, 2007
Authored by Ken Williams, Computer Associates | Site www3.ca.com

CA BrightStor ARCserve Backup for Laptops and Desktops contains multiple overflow conditions that can allow a remote attacker to cause a denial of service, or execute arbitrary code with local SYSTEM privileges on Windows.

tags | advisory, remote, denial of service, overflow, arbitrary, local
systems | windows
advisories | CVE-2007-0449
SHA-256 | 6e6e8672248a7e1c4d803e9bf66b4054b05795508a899203c5e4ade01aafd269
secunia-nctaudio.txt
Posted Jan 27, 2007
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Sienzo Digital Music Mentor, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the NCTAudioFile2.AudioFile ActiveX control when handling the "SetFormatLikeSample()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (about 4124 bytes) as argument to the affected method. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.

tags | advisory, overflow, arbitrary, activex
advisories | CVE-2007-0018
SHA-256 | 4a145b830ea50bf86d15f10c5b8c02dcd4cd063d843372d236584a2c2c9882cc
secunia-nctsoft.txt
Posted Jan 27, 2007
Site secunia.com

Secunia Research has discovered a vulnerability in NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll) when handling the "SetFormatLikeSample()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (about 4124 bytes) as argument to the affected method. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.

tags | advisory, overflow, arbitrary, activex
advisories | CVE-2007-0018
SHA-256 | 361d252a18d1dfb801d29ee39ce252a8f63bbafaf403df2a5e0c96f7d912e12f
SUSE-SA-2007-013.txt
Posted Jan 27, 2007
Site suse.com

SUSE Security Announcement - This update fixes several format string bugs that can be exploited remotely with user-assistance to execute arbitrary code. Since SUSE Linux version 10.1 format string bugs are not exploitable anymore.

tags | advisory, arbitrary
systems | linux, suse
advisories | CVE-2007-0017
SHA-256 | 6b2bdc550586e6a5f63c1230ceb748d9bd167167f804ebd60469a4d9b58e1adc
ProCheckUp Security Advisory 2006.14
Posted Jan 27, 2007
Authored by Adrian Pastor, ProCheckUp

IP Phones based on the Centrality Communications/Aredfox PA168 chipset suffer from a weak session management vulnerability. Exploit included.

tags | exploit
SHA-256 | 1821bfb5f8cd756cd89b28517356ba2347b103a4fe336db4aabb7a4ab85a7751
wbv265-sql.txt
Posted Jan 27, 2007
Authored by Rolf Huisman

Website Baker version 2.6.5 suffers from a SQL injection flaw.

tags | advisory, sql injection
SHA-256 | bccba3281ef63a3c7c7d939ddecd7070e841c63eae45a7416420722bcdf47fa2
Secunia Security Advisory 23475
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a5b9d50edc28b580acef93165a66744916fe7a6f31a5f6c406b3e64f1bbc8f66
Secunia Security Advisory 23493
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Aurora Media Workshop, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | efd98193c67c7156670f5f854731c07ca7e09096900de77d9723d746dd7e0457
Secunia Security Advisory 23511
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various J. Hepple products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 9608ed455b8fa650216146792772624dcaa9db25d1dffba59cf60fea601bb128
Secunia Security Advisory 23530
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in iMesh, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 547af6e111ea97d136ca0c0e7f8e22a9f6dd2c0a459d6cc83284e6efb8478cd4
Secunia Security Advisory 23532
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in two Quikscribe products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 177c00842c4e8b791e78c5687bbbc76ea2fe5ba9da619f51f6eb4bccb6b28799
Secunia Security Advisory 23534
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various R.M. de Boer Software products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 7f104246042fabe9b701c5a83f1068c2f4d022db7e0a292b9c15c39607bc3b6d
Secunia Security Advisory 23535
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in CDBurnerXP Pro, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4e297601def34d17be01e77bf231b65440b5d328be64de82455f6e7637e54885
Secunia Security Advisory 23543
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Sienzo Digital Music Mentor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3fd8d55dd3db53d4f2b55e8b782bea35d2a08590b096c1ef47cf893eaf574626
Secunia Security Advisory 23544
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in MP3 Normalizer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 52945a2ab9224dd27556a19694771bb1bbdae431a0374467d689ca8531803701
Secunia Security Advisory 23546
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Roemer Software products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 68a4e8c950631421655bd282b41152264c2d211522049e2e16e574eff659ccd8
Secunia Security Advisory 23550
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Joshua Software products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6dfd15adf0f65fc4aacada23935c2db07b6d0cabb94aa8c7d98a00ff459ebf64
Secunia Security Advisory 23551
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in two Virtual CD products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2a83a875ce847c9caa02d4bca542b9c7ff3ae43118a9d29ab07acd5c4a211fb2
Secunia Security Advisory 23552
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Cheetah CD Burner and Cheetah DVD Burner, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ae92040f1fb09bb2a6a4ad6cf5db7034132217381d2f9a5fafbe69db49cad4ad
Secunia Security Advisory 23553
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Mystik Media products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 92f53cfce5016d735de797a8f4778f72f41e2c29d2d77a0adc7ba155e8d591ae
Secunia Security Advisory 23554
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Power Audio Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c64eef14989a06d9b9c299ae7ddb0cb7674873df5593190241a6e0f20ab6cfe4
Secunia Security Advisory 23557
Posted Jan 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various DanDans Digital Media products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 58da71727d56903bfcd6754aea9fcf5d2cd60ede3adbc6a6f3175421bb23de0f
Page 5 of 31
Back34567Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close