exploit the possibilities
Showing 1 - 25 of 73 RSS Feed

Files Date: 2005-08-31

obsidisCFP.txt
Posted Aug 31, 2005
Site obsidis.org

Obsidis #1 Call For Papers. Obsidis is a new scientific/underground magazine that focuses on research in ITC security. Please contribute an article if you feel that you have something to add.

tags | paper, conference
SHA-256 | 27997f174273d5192756d2a53272d10d0ef4af7c9d4a3f75b253e8900397d724
Secunia Security Advisory 16638
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, slackware
SHA-256 | 0cbdef8071c3808430ee0dc93b6be87dd4c2c32732464d562cb61d31dd664c16
Secunia Security Advisory 16640
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | c67776773ee5155334525756a0bd90482c8d265b23485de1b8d36cbcb9917007
Secunia Security Advisory 16641
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya PDS (Predictive Dialing System), which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 9c31b7a629dcc476b7cd5be0f22e90eb182f6399d27352a14ab849e6e0186c81
Secunia Security Advisory 16642
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in openssl included in some products, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | cc4e557d995e2691b6ce338fe5450eed194838332b1bc814b6602eccaebf35ff
Secunia Security Advisory 16643
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in gzip included in some products, which potentially can be exploited by malicious people to extract files to arbitrary directories on a user's system.

tags | advisory, arbitrary
SHA-256 | f3c0c73406b39d1cd96749eab7f6908169125b2d1cce16e1ecad996690435aa1
Xcon2005_Liuxin.pdf
Posted Aug 31, 2005
Authored by LiuXin | Site xcon.xfocus.org

Xcon 2005: Research on Same Source Feature Measuring Technology of Software

SHA-256 | ecc8660c93c2e4c28023a871eed92a3fcae596c38b1fdc637a4405a90417300f
Xcon2005_ICBM.pdf
Posted Aug 31, 2005
Authored by ICBM | Site xcon.xfocus.org

Xcon 2005: Security in development environment

SHA-256 | ada975a45131d41540dbee4e5a081c01c8e6f6a5bc963b2035b134a6ac3b7f82
Xcon2005_Shok.pdf
Posted Aug 31, 2005
Authored by Matt Conover | Site xcon.xfocus.org

Xcon 2005: Profiling Malware and Rootkits from Kernel-Mode

tags | kernel
SHA-256 | f35044fbda6b53c3159c28d612cabdbcf4ab5bf98de1368f2d90bf6256db271e
Xcon2005_Baiyuanfan.pdf
Posted Aug 31, 2005
Authored by Baiyuanfan | Site xcon.xfocus.org

Xcon 2005: New thoughts in ring3 nt rootkit

SHA-256 | d0dc6ba9e5e2a145d29838a6a02926fda4ac8adb83af61bd3c4f840f4af2a2f0
Xcon2005_Seak.pdf
Posted Aug 31, 2005
Authored by Seak | Site xcon.xfocus.org

Xcon 2005: New architecture and approach in Network Virus Detection

tags | virus
SHA-256 | cdd1681d944eb8cec64eb1adac29df6247f521b7c6d350d79d1fe380205c85f0
Xcon2005_Tombkeeper.pdf
Posted Aug 31, 2005
Authored by TombKeeper | Site xcon.xfocus.org

Xcon 2005: I want to see farther

SHA-256 | b915fe90362db76cec184c3a1d6e71e00a87d32076bff84f7c84c37374aff602
Xcon2005_SoBeIt.pdf
Posted Aug 31, 2005
Authored by SoBeIt | Site xcon.xfocus.org

Xcon 2005: Windows Kernel Pool Overflow Exploitation

tags | overflow, kernel
systems | windows
SHA-256 | c7ba43a585d9880a05a3ab27f0be73b6725629e574a219b07e112b67dc36bfad
Xcon2005_San.pdf
Posted Aug 31, 2005
Authored by san | Site xcon.xfocus.org

Xcon 2005: Hacking Windows CE

systems | windows
SHA-256 | 590f520dff1623d1a11b0e8d49ad52cb7733604cf0dae833442b8908ea8a6183
Xcon2005_Marc_Schoenefeld.pdf
Posted Aug 31, 2005
Authored by Marc Schoenefeld | Site xcon.xfocus.org

Xcon 2005: Java & Secure Programming

tags | java
SHA-256 | d6b3ac72fd172c204d6d57072918910fec85af743030e6cc24440b1c52cf37dd
Xcon2005_Funnywei.pdf
Posted Aug 31, 2005
Authored by Funnywei | Site xcon.xfocus.org

Xcon 2005: Structural Signature and Signature's Structure

SHA-256 | 9ec4308f69278371a19a8fd3ad829146dc1f6e9bc11d2c805f3853f54a516609
Xcon2005_Sowhat.pdf
Posted Aug 31, 2005
Authored by Sowhat | Site xcon.xfocus.org

Xcon 2005: Talking About 0day

SHA-256 | e4d859a8ae5ae21d8225ae5961d59c20dbcc3a791da1b98ee61f8c0a40955b69
Xcon2005_CoolQ.pdf
Posted Aug 31, 2005
Authored by CoolQ | Site xcon.xfocus.org

Xcon 2005: Advanced trojans in Grub

tags | trojan
SHA-256 | 9d66bf700c197ee8747ecbb8dfaa34a5442d6818524958c82f1113b916ec28ba
Xcon2005_Cawan.pdf
Posted Aug 31, 2005
Authored by Cawan | Site xcon.xfocus.org

Xcon 2005: Reconfigurable Synchronization Technique

SHA-256 | d37c98176daf5cff75d8b5aca1d5000624f20a50609b605b80e35356b1932238
Xcon2005_Drew_Copley.pdf
Posted Aug 31, 2005
Authored by Drew Copley | Site xcon.xfocus.org

Xcon 2005: Anti-Virus Heuristics

tags | virus
SHA-256 | 2ecef563b1af1bdb7220834ff9434253e41dce6fe29512d70e68840d9ba22576
hesk-bypass.txt
Posted Aug 31, 2005
Authored by s2b

Helpdesk software Hesk 0.92 suffers from an authentication bypass vulnerability.

tags | advisory, bypass
SHA-256 | 015c0e8f5ed0a8fa2fd0ec87e5cbbbdaf6a4f79f1c25055bdd117bebf497361a
Secunia Security Advisory 16618
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | 8415252bddb3e5edfdf491d95f0118cd12aaae38e06711a6ca2427c5c0de486f
Secunia Security Advisory 16619
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued updates for php4 and php5. These fix some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 3c84d665a11b945112c49ef4be2a683d31e42513981290f5d569486717df05f8
Secunia Security Advisory 16621
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious administrative users to conduct script insertion attacks, or by malicious people to bypass certain security restrictions or compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 7e171c4f78c5fa7d4566e6eabc3845ba2d1c1c80fb2034683a11a8d8db0735fc
Secunia Security Advisory 16626
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for lm_sensors. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | d4bb10811b2b1b91bd4f7146b3d800a8f52d8c5aa0084f278417957f8821fc90
Page 1 of 3
Back123Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close