what you don't know can hurt you
Showing 1 - 25 of 73 RSS Feed

Files Date: 2005-08-31

obsidisCFP.txt
Posted Aug 31, 2005
Site obsidis.org

Obsidis #1 Call For Papers. Obsidis is a new scientific/underground magazine that focuses on research in ITC security. Please contribute an article if you feel that you have something to add.

tags | paper, conference
MD5 | 33435269d2a171240bf5d29153832d13
Secunia Security Advisory 16638
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, slackware
MD5 | 35e17ceebfbd494e25cee644ccde64af
Secunia Security Advisory 16640
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 343be6182b6772ef329ba0da257d044b
Secunia Security Advisory 16641
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya PDS (Predictive Dialing System), which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | cfe0ae6b8482876eea64af57e2f4f642
Secunia Security Advisory 16642
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in openssl included in some products, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
MD5 | aba2735981e1df8f5717674da7891d37
Secunia Security Advisory 16643
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in gzip included in some products, which potentially can be exploited by malicious people to extract files to arbitrary directories on a user's system.

tags | advisory, arbitrary
MD5 | 8d09cdd20a88b632d301e7bd8c17a820
Xcon2005_Liuxin.pdf
Posted Aug 31, 2005
Authored by LiuXin | Site xcon.xfocus.org

Xcon 2005: Research on Same Source Feature Measuring Technology of Software

MD5 | 2b63fbaa7471f456790427fb1a0b67d0
Xcon2005_ICBM.pdf
Posted Aug 31, 2005
Authored by ICBM | Site xcon.xfocus.org

Xcon 2005: Security in development environment

MD5 | be1d49d72de193f1364a17f022a17d8e
Xcon2005_Shok.pdf
Posted Aug 31, 2005
Authored by Matt Conover | Site xcon.xfocus.org

Xcon 2005: Profiling Malware and Rootkits from Kernel-Mode

tags | kernel
MD5 | 6f7198dc3e956818658e718dd87a0e98
Xcon2005_Baiyuanfan.pdf
Posted Aug 31, 2005
Authored by Baiyuanfan | Site xcon.xfocus.org

Xcon 2005: New thoughts in ring3 nt rootkit

MD5 | 06642f5232618bdad24b9bc7e12f9e1a
Xcon2005_Seak.pdf
Posted Aug 31, 2005
Authored by Seak | Site xcon.xfocus.org

Xcon 2005: New architecture and approach in Network Virus Detection

tags | virus
MD5 | 76a5fcabeaca9b1f135d685c6e331f33
Xcon2005_Tombkeeper.pdf
Posted Aug 31, 2005
Authored by TombKeeper | Site xcon.xfocus.org

Xcon 2005: I want to see farther

MD5 | fc4b1009eb823ecbb781f5971129f9a6
Xcon2005_SoBeIt.pdf
Posted Aug 31, 2005
Authored by SoBeIt | Site xcon.xfocus.org

Xcon 2005: Windows Kernel Pool Overflow Exploitation

tags | overflow, kernel
systems | windows
MD5 | 53d20b78f7d8a387181838d0dfb975fc
Xcon2005_San.pdf
Posted Aug 31, 2005
Authored by san | Site xcon.xfocus.org

Xcon 2005: Hacking Windows CE

systems | windows, ce
MD5 | 0882af59c4c0328fea721ed7e740ca9c
Xcon2005_Marc_Schoenefeld.pdf
Posted Aug 31, 2005
Authored by Marc Schoenefeld | Site xcon.xfocus.org

Xcon 2005: Java & Secure Programming

tags | java
MD5 | 88ffcf7b528ea654c44bb935b657e5fd
Xcon2005_Funnywei.pdf
Posted Aug 31, 2005
Authored by Funnywei | Site xcon.xfocus.org

Xcon 2005: Structural Signature and Signature's Structure

MD5 | abd2d9855674ca2c8fbcec762eddb404
Xcon2005_Sowhat.pdf
Posted Aug 31, 2005
Authored by Sowhat | Site xcon.xfocus.org

Xcon 2005: Talking About 0day

MD5 | b858179d3c3e3bb49aa6d9a592b5dd01
Xcon2005_CoolQ.pdf
Posted Aug 31, 2005
Authored by CoolQ | Site xcon.xfocus.org

Xcon 2005: Advanced trojans in Grub

tags | trojan
MD5 | 1641a80c8e392fad75dd36a94e3bf62e
Xcon2005_Cawan.pdf
Posted Aug 31, 2005
Authored by Cawan | Site xcon.xfocus.org

Xcon 2005: Reconfigurable Synchronization Technique

MD5 | 1d24d9caa469a5278ee399851dec7ec1
Xcon2005_Drew_Copley.pdf
Posted Aug 31, 2005
Authored by Drew Copley | Site xcon.xfocus.org

Xcon 2005: Anti-Virus Heuristics

tags | virus
MD5 | 876578c45a04b0e37786ad662f6a5a3d
hesk-bypass.txt
Posted Aug 31, 2005
Authored by s2b

Helpdesk software Hesk 0.92 suffers from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | b6928293cc4366ec87ea0c2828f1e565
Secunia Security Advisory 16618
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, suse
MD5 | 39bbb13e7b266322bfa98fe2f9138826
Secunia Security Advisory 16619
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued updates for php4 and php5. These fix some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | b6abe5db28a3d9394a6f463605714a3b
Secunia Security Advisory 16621
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious administrative users to conduct script insertion attacks, or by malicious people to bypass certain security restrictions or compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 848bd5ad6d8e8a3cbe779524020a7ae3
Secunia Security Advisory 16626
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for lm_sensors. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | c0e6f276edd4a24ddc789ff534afe277
Page 1 of 3
Back123Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close