exploit the possibilities
Showing 1 - 25 of 50 RSS Feed

Files Date: 2005-09-23

Secunia Security Advisory 16713
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 2036cb52c7eb2476f14cae53726f0316
Secunia Security Advisory 16912
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | b3cbb06343104665ca6185d893db1a45
Secunia Security Advisory 16914
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for python2.1. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | af7bfd69b0b632c42bd092faa05f2d02
Secunia Security Advisory 16919
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, redhat
MD5 | 45142b97560fe21fce45f89f5a7eaaaa
Secunia Security Advisory 16920
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes 10 vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
MD5 | 0c9425d2331ba3fc82fd1e224b8ee591
Secunia Security Advisory 16923
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Interchange, which can be exploited by malicious people to conduct SQL injection attacks, or to perform actions with an unknown impact.

tags | advisory, vulnerability, sql injection
MD5 | 9ee01a1f5a7952eca2b7cc46d250223a
Secunia Security Advisory 16664
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in 7-Zip, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | b8db8b1c5e78134dbafd6e8cbd9a8473
Secunia Security Advisory 16910
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for the kernel. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to disclose certain sensitive information, cause a DoS (Denial of Service), and gain escalated privileges.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, fedora
MD5 | 99a88d9ed79c8689418de7f6a5e96a84
Secunia Security Advisory 16911
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Firefox, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability
MD5 | 842673248d03ccbb625d410339288f4e
Secunia Security Advisory 16916
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for kdeedu. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges on a vulnerable system.

tags | advisory, local
systems | linux, debian
MD5 | e0fbfe78e41557f609d1c5930b8d9f4a
Secunia Security Advisory 16917
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Suite, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability
MD5 | 3bb86e0354877fd28338b648ae6a910f
Secunia Security Advisory 16924
Posted Sep 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
MD5 | 7766331f1fc25b58fff7a3b1454fc506
phpmyfuck151.html
Posted Sep 23, 2005
Authored by rgod | Site retrogod.altervista.org

PhpMyFaq version 1.5.1 is susceptible to SQL injection, board takeover, user information disclosure, and remote code execution flaws. Detailed exploitation provided. Earlier versions are also possibly vulnerable.

tags | exploit, remote, code execution, sql injection, info disclosure
MD5 | 7e4688c40fe3f1047e4d60351226021d
scipAG-1746.txt
Posted Sep 23, 2005
Authored by Sven Vetsch | Site disenchant.ch

A cross site scripting vulnerability has been discovered in Microsoft Internet Explorer 6.0. It is possible to use a manipulated embedded content to run arbitrary script code in the security context of the website.

tags | advisory, arbitrary, xss
MD5 | c69efbd911bcf0105aa912236bd25b29
prott_packV01A.zip
Posted Sep 23, 2005
Authored by Piotr Bania | Site pb.specialised.info

Protty is a ring 3 library developed to protect against shellcode execution on Windows NT based systems.

tags | shellcode, code execution, library
systems | windows, nt
MD5 | 833d0d950323ec667b1bfd68c54dad11
Debian Linux Security Advisory 818-1
Posted Sep 23, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 818-1 - It was discovered that langen2kvhtml from the kvoctrain package from the kdeedu suite creates temporary files in an insecure fashion. This leaves them open for symlink attacks.

tags | advisory
systems | linux, debian
advisories | CVE-2005-2101
MD5 | 294efc847a301e09cf61391084fc2ab7
Samhain File Integrity Checker
Posted Sep 23, 2005
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | cda447df6273812e5f7f5b45235975ea
nufw-1.0.13.tar.gz
Posted Sep 23, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: This new release solves a compilation problem that occurs with some recent openldap versions.
tags | tool, remote, firewall
systems | unix
MD5 | 6bcb80f53c0feda212127e2ce572690d
p3scan-2.2.1.tar.gz
Posted Sep 23, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

Changes: Made TOP command processing an option. Fixed ability to not use ripmime library. Various other tweaks.
tags | worm, web, trojan
systems | linux, unix
MD5 | f7fcbc39050c193e5a334a61d38b5d49
aim_jack.tar.gz
Posted Sep 23, 2005
Authored by Craig Heffner

Two tools are included in this tarball. aim-jack, a utility that allows a logged in AIM user to keep anyone else from signing on in another location, and aim_crack, which is a perl script used to conduct dictionary attacks against AIM hashed passwords.

tags | cracker, perl
MD5 | ddaa7bdcb489fbec7d035e6d0d3cd0f6
pwnzilla.txt
Posted Sep 23, 2005
Authored by SkyLined

PwnZilla 5 - Exploit for the IDN host name heap buffer overrun in Mozilla browsers such as Firefox, Mozilla, and Netscape.

tags | exploit, overflow
advisories | CVE-2005-2871
MD5 | eef9337ee7cdaceb446572f6a20a0ea6
mall23.txt
Posted Sep 23, 2005
Authored by SmOk3

Mall23 is vulnerable to a SQL injection attack in AddItem.asp. Versions below 4.11 are susceptible.

tags | exploit, sql injection, asp
MD5 | b5930d3085f3fa34e7ba1f5e486a1080
SSRT5988.txt
Posted Sep 23, 2005
Site hp.com

HP Security Bulletin - Multiple potential Vulnerabilities have been identified in the X11 Pixmap routines used in the HP Tru64 UNIX Motif library (libXpm) and in the X11 Image Viewer (dximageview). Under certain circumstances, remote unauthorized users could cause a Denial of Service (DoS), or execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | unix
advisories | CVE-2004-0914
MD5 | 58e95b15eb60813387d64d94b3883fd8
ip-array-0.05.31.tar.gz
Posted Sep 23, 2005
Authored by AllKind | Site sourceforge.net

IP-Array is a linux firewall script written in bash designed for small to mid sized networks. Includes support for traffic shaping and VPN.

Changes: A few bug fixes and additions.
tags | bash
systems | linux, unix
MD5 | aa23cad42513923a2189875ef88e19b1
mylittle15_16b.txt
Posted Sep 23, 2005
Authored by rgod | Site retrogod.altervista.org

My Little Forum 1.5 SQL injection exploit that retrieves an md5 password hash.

tags | exploit, sql injection
MD5 | c59af767c4a1416bec0a1e0907d82cb4
Page 1 of 2
Back12Next

File Archive:

January 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    8 Files
  • 2
    Jan 2nd
    11 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    2 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    18 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    10 Files
  • 10
    Jan 10th
    13 Files
  • 11
    Jan 11th
    2 Files
  • 12
    Jan 12th
    4 Files
  • 13
    Jan 13th
    21 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    12 Files
  • 16
    Jan 16th
    18 Files
  • 17
    Jan 17th
    11 Files
  • 18
    Jan 18th
    3 Files
  • 19
    Jan 19th
    2 Files
  • 20
    Jan 20th
    9 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close