Twenty Year Anniversary
Showing 1 - 25 of 79 RSS Feed

Files Date: 2005-07-01

pla-1.01.tar.gz
Posted Jul 1, 2005
Authored by Kris Philipsen | Site pixla.sourceforge.net

PIX Logging Architecture is a project allowing for correlation of Cisco PIX Firewall traffic, IDS, and informational logs. It parses Cisco PIX logs from syslog files, then pushes the parsed data to a database. It contains a Web-based front end for displaying and searching the Cisco PIX Firewall logs.

tags | web
systems | cisco
MD5 | 05544e760c175441ffa10714dfbd8f5a
ZH2005-14SA.txt
Posted Jul 1, 2005
Authored by Giovanni Delvecchio | Site zone-h.org

Multiple problems exist on support.msn.com, permitting to a possible attacker to conduct phishing attacks against a user.

tags | exploit
MD5 | b5c67526c566a57939a7b3f9d1a5185b
osTicket131.txt
Posted Jul 1, 2005
Authored by Foster, edisan | Site ghc.ru

osTicket versions 1.3.1beta and below suffer from SQL injection and file inclusion flaws.

tags | advisory, sql injection, file inclusion
MD5 | 0f67a7443a5da2709b87e37450f7a846
Mail-SpamAssassin-3.0.4.tar.gz
Posted Jul 1, 2005
Site spamassassin.apache.org

SpamAssassin is a mail filter to identify spam. Using its rule base, it uses a wide range of heuristic tests on mail headers and body text to identify spam, also known as unsolicited commercial email.

Changes: Various updates.
systems | unix
MD5 | 51926fe5aabaf57eed2c09061fe8fb02
Debian Linux Security Advisory 736-1
Posted Jul 1, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 736-1 - A vulnerability was recently found in the way that SpamAssassin parses certain email headers. This vulnerability could cause SpamAssassin to consume a large number of CPU cycles when processing messages containing these headers, leading to a potential denial of service (DOS) attack.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2005-1266
MD5 | 8d0feb6a44fffa1a898ae7d87d11b2b7
Debian Linux Security Advisory 735-1
Posted Jul 1, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 735-1 - A local user who has been granted permission to run commands via sudo could run arbitrary commands as a privileged user due to a flaw in sudo's pathname validation.

tags | advisory, arbitrary, local
systems | linux, debian
advisories | CVE-2005-1993
MD5 | 40c269e712729e8348fdeecc605f78da
phpxmlrpc11.txt
Posted Jul 1, 2005
Authored by James Bercegay | Site gulftech.org

PHPXMLRPC is vulnerable to a very high risk remote PHP code execution vulnerability that may allow for an attacker to compromise a vulnerable webserver. The vulnerability is the result of unsanitized data being passed directly into an eval() call in the parseRequest() function of the XMLRPC server. Versions 1.1 and below are affected.

tags | advisory, remote, php, code execution
MD5 | f927502156d44cd19a3043ae87cfc345
pear130.txt
Posted Jul 1, 2005
Authored by James Bercegay | Site gulftech.org

PEAR XML_RPC is vulnerable to a very high risk PHP code injection vulnerability due to unsanitized data being passed into an eval() call. Versions 1.3.0 and below are affected.

tags | exploit, php
MD5 | 4f028a69b6014e640b03edd28e8da86d
Secunia Security Advisory 15840
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lachlan. H has discovered some weaknesses in Golden FTP Server Pro, which can be exploited by malicious users to gain knowledge of various information.

tags | advisory
MD5 | 6ada4cbdf41e2ba0d57c0b6a7d518a24
Secunia Security Advisory 15874
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | netbsd
MD5 | b38283ecee0aebc51099a163331deeaa
Secunia Security Advisory 15883
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James Bercegay has reported a vulnerability in phpAdsNew, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 9ac9b8cd350e005c8b8e5b8385749405
Secunia Security Advisory 15884
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpPgAds, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 3f62e848f900322e6ffbc74f255dd38d
Secunia Security Advisory 15885
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tri Huynh has discovered two vulnerabilities in Prevx Pro 2005, which can be exploit to bypass security features provided by the product.

tags | advisory, vulnerability
MD5 | b488b243ae066d62228583ec92c0d295
Secunia Security Advisory 15891
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SEC Consult has reported a vulnerability in Microsoft Internet Explorer, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 60ed09601591959db3c98d23b51d50e1
Secunia Security Advisory 15894
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in SSH Tectia Server and SSH Secure Shell for Windows Servers, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, shell, local
systems | windows
MD5 | 9f6951d4e4511c2b98d54da72ebc6b76
Secunia Security Advisory 15895
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Nucleus, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 056e525dcae8c275ff08e1bfd13d4e65
0506-exploits.tgz
Posted Jul 1, 2005
Authored by Todd J.

Packet Storm new exploits for June, 2005.

tags | exploit
MD5 | 6a33061f5d9ec915bb5a28d98edb37f1
netbsd-2005-001.txt
Posted Jul 1, 2005
Site netbsd.org

NetBSD Security Advisory 2005-001 - The Pentium CPU shares caches between HyperThreads. This permits a local process to gain a side-channel against cryptographic processes running on the other HyperThread. Testing for cached data can be accomplished by timing reads. Under some circumstances, this permits the spying process to extract bits of the key. This has been demonstrated against OpenSSL.

tags | advisory, local
systems | netbsd
MD5 | 0b7d686df11dc8fabc0eddfddfd7f9ec
NTFSinfo.txt
Posted Jul 1, 2005
Authored by Matthew Murphy

An error in Microsoft Windows NTFS driver code causes the file system to incorrectly assign disk blocks to files before they have been initialized. Following a recovery from a system shutdown, uninitialized data may be visible in files from previously allocated disk blocks.

tags | advisory
systems | windows
MD5 | 79c040f93de735457827f1ffee7aafbe
Debian Linux Security Advisory 733-1
Posted Jul 1, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 733-1 - Justin Rye discovered that crip, a terminal-based ripper, encoder and tagger tool, utilizes temporary files in an insecure fashion in its helper scripts.

tags | advisory
systems | linux, debian
advisories | CVE-2005-0393
MD5 | 0fff2d105c320180022ccae5e1ba99a8
FreeBSD-SA-05-15.tcp.txt
Posted Jul 1, 2005
Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-05:15 - Two problems have been discovered in the FreeBSD TCP stack. First, when a TCP packets containing a timestamp is received, inadequate checking of sequence numbers is performed, allowing an attacker to artificially increase the internal "recent" timestamp for a connection. Second, a TCP packet with the SYN flag set is accepted for established connections, allowing an attacker to overwrite certain TCP options.

tags | advisory, tcp
systems | freebsd
MD5 | a2e2310698e536c356b1f92c78772dc8
FreeBSD-SA-05-14.bzip2.txt
Posted Jul 1, 2005
Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-05:14 - Two problems have been discovered relating to the extraction of bzip2-compressed files. First, a carefully constructed invalid bzip2 archive can cause bzip2 to enter an infinite loop. Second, when creating a new file, bzip2 closes the file before setting its permissions.

tags | advisory
systems | freebsd
MD5 | 5db0df715ad1618105ef79a7b25521e2
FreeBSD-SA-05-13.ipfw.txt
Posted Jul 1, 2005
Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-05:13 - The ipfw tables lookup code caches the result of the last query. The kernel may process multiple packets concurrently, performing several concurrent table lookups. Due to an insufficient locking, a cached result can become corrupted that could cause some addresses to be incorrectly matched against a lookup table.

tags | advisory, kernel
systems | freebsd
advisories | CVE-2005-2019
MD5 | 11ef04975edaf951379bd3f0312f2061
DRUPAL-SA-2005-003.txt
Posted Jul 1, 2005
Authored by Uwe Hermann | Site drupal.org

A flaw has been discovered in the third-party XML-RPC library included with Drupal. An attacker could execute arbitrary PHP code on a target site.

tags | advisory, arbitrary, php
MD5 | b89ee85cbcbfc655d22d82f97b68a289
DRUPAL-SA-2005-002.txt
Posted Jul 1, 2005
Authored by Uwe Hermann | Site drupal.org

Kuba Zygmunt discovered a flaw in the input validation routines of Drupal's filter mechanism. An attacker could execute arbitrary PHP code on a target site when public comments or postings are allowed.

tags | advisory, arbitrary, php
MD5 | 403e726f5adb10f2049d93abc4ca009e
Page 1 of 4
Back1234Next

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    4 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close