accept no compromises
Showing 1 - 25 of 59 RSS Feed

Files Date: 2005-10-12

CDObo.txt
Posted Oct 12, 2005
Authored by Gary O'Leary-Steele | Site sec-1.com

Sec-1 has identified an exploitable Buffer Overflow within Collaboration Data Objects (Cdosys.dll and Cdoex.dll). The vulnerability exists when event sinks are used within Microsoft Exchange 2000 or Microsoft Mail services to parse e-mail content. Several Content Security packages were identified to be vulnerable/exploitable.

tags | advisory, overflow
advisories | CVE-2005-1987
MD5 | 90980caac6ac6153635ef2b9c186b012
Secunia Security Advisory 15925
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia research has discovered a vulnerability in Novell NetMail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 7d1ffa47d7c01a297a562db76f3df11d
Secunia Security Advisory 17136
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gary O'leary-Steele has reported a vulnerability in GFI MailSecurity, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerability system.

tags | advisory, denial of service
MD5 | f6ad1e835ab0357ae8ff4cfefdba82bc
Secunia Security Advisory 17153
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, redhat
MD5 | b050e61c7498e21c17083d64d36af56d
Secunia Security Advisory 17154
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued updates for util-linux and mount. These fix a security issue, which potentially can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, redhat
MD5 | 8d13f7e48565d1137c2fdf8828090d5a
Secunia Security Advisory 17156
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for sqwebmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | c35e8cfbf8b9bbc8ee936038a329c7e8
Secunia Security Advisory 17158
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in WebGUI, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 2e64ec220f2b8a380d88351a7b009f89
Secunia Security Advisory 17159
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rjonesx has discovered a vulnerability in Xeobook, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | c37cf94423076643b31493e3891b29cb
Secunia Security Advisory 17171
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for koffice-libs/kword. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, ubuntu
MD5 | a57503ed43d5a818e3acbe12abe12b3f
Secunia Security Advisory 17174
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered some vulnerabilities and a security issue in versatileBulletinBoard, which can be exploited by malicious people to disclose system information, and conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | 46d9262370a136eaed56cf859e301bed
Secunia Security Advisory 17175
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - trueend5 has discovered a vulnerability in ZeroBlog, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 29bc9724fd6689bb9a76f588359a304b
Secunia Security Advisory 17177
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for squid. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, mandriva
MD5 | b138b5738a8322842e250f2fc42c8972
Secunia Security Advisory 17178
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, mandriva
MD5 | 3f75a776f4f47f805b4018dcfcc1f396
Secunia Security Advisory 17179
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, mandriva
MD5 | d0b468327ed405b51b0f0b244bf0ba0a
authfail-1.1.4.tgz
Posted Oct 12, 2005
Authored by Bartek Krajnik | Site bmk.bz

authfail is a tool for adding IP addresses to an ACL when entities from those addresses attempt to log into a system, but cause authentication failures in auth.log. It reads data from auth.log in real time and adds the IP into netfilter with a DROP/REJECT policy.

Changes: Added whois functionality.
tags | tool, firewall
systems | linux
MD5 | 0c453e357b6877e2d0094e142257449d
arpalert-0.4.11.tar.gz
Posted Oct 12, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Now uses privilege separation and a chroot. Ported to various BSDs.
tags | local
systems | unix
MD5 | b9c13dc2cd240922895370e5212c8d70
caigw.c
Posted Oct 12, 2005
Authored by erikam

Computer Associates iGateway debug mode remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | d0cb97a5f1697e872f78704181815177
r57phpbb_admin2exec.pl.txt
Posted Oct 12, 2005
Authored by 1dt.w0lf | Site rst.void.ru

Remote phpBB 2.0.13 command execution exploit that makes use of admin_styles.php.

tags | exploit, remote, php
MD5 | 4f327a00d59422d8bc4cc1bfcd7dfe7d
Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt
Posted Oct 12, 2005
Authored by Tony Chor

IE Security - Past, Present and Future. Tony Chor outlines the threats to secure browsing, discuss Microsoft's response with Internet Explorer for Windows XP SP2, and details the implementation of safety features in the upcoming Internet Explorer 7.0, such as the Phishing Filter and Protected Mode (the feature formerly known as Low Rights IE).

systems | windows, xp
MD5 | 8f19551be380c374c1c18f9f5e5b13a2
TT-Roelof-Temmingh-State-of-the-art.ppt
Posted Oct 12, 2005
Authored by Roelof Temmingh

Assessing Server Security - State of the Art. The talk takes into consideration the progress that has been made in web server security over the last few years, and the progress that has been made in attacking web servers over the same time. The paper visits the new vulnerabilities introduced by web applications and discuss the thinking applied to discover such vulnerabilities. It finally describes the state of the art of web server scanning technology.

tags | web, vulnerability
MD5 | 230a5f551f758a401bbb1186a0dce00d
TT-San-Hacking-Windows-CE.ppt
Posted Oct 12, 2005
Authored by San (XFocus)

Hacking Windows CE - This paper shows a buffer overflow exploitation example in Windows CE. It covers knowledge about the ARM architecture, memory management and the features of processes and threads of Windows CE. It also shows how to write a shellcode in Windows CE including knowledge about decoding shellcode of Windows CE.

tags | overflow, shellcode
systems | windows, ce
MD5 | 6c73f84fe23ec9bb3d1ac4c919629d96
iDEFENSE Security Advisory 2005-10-11.2
Posted Oct 12, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.11.05-2 - Remote exploitation of a denial of service vulnerability within various versions of Microsoft Corp.'s Windows operating system allows attackers to cause the msdtc.exe process to crash. The vulnerability specifically exists because of a flaw in processing responses from foreign servers. iDEFENSE has confirmed the existence and exploitability of this vulnerability in Microsoft Windows 2000 SP4. All versions of Microsoft Windows with the vulnerable service running are suspected vulnerable.

tags | advisory, remote, denial of service
systems | windows, 2k
advisories | CVE-2005-1979
MD5 | a40b796bdb5fb37b0aaf8103f2bd6071
iDEFENSE Security Advisory 2005-10-11.1
Posted Oct 12, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.11.05-1 - Remote exploitation of a denial of service vulnerability within various versions of Microsoft Corp.'s Windows operating system allows attackers to flood systems with connection attempts from legitimate MSDTC servers. The vulnerability specifically exists because of the functionality in the TIP protocol that allows a remote IP address and port number to be specified for a connection. iDEFENSE has confirmed the existence and exploitability of this vulnerability in Microsoft Windows 2000 SP4. All versions of Microsoft Windows with the vulnerable service running are suspected vulnerable.

tags | advisory, remote, denial of service, protocol
systems | windows, 2k
advisories | CVE-2005-1980
MD5 | caa6f9f53d69598281c3ccf4b50fbfdd
zeroblogXSS.txt
Posted Oct 12, 2005
Authored by trueend5

ZeroBlog versions 1.2a and 1.1f are susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | 310506e2c4c8dc2a6a65be08c81c4dd1
phpshopSQL.txt
Posted Oct 12, 2005
Authored by BiPi_HaCk | Site NightmareTeAmZ.altervista.org

PhpShop is susceptible to SQL injection attacks. Details provided.

tags | exploit, sql injection
MD5 | 354f8e200e81b9f9f25cf8e0df0764a2
Page 1 of 3
Back123Next

File Archive:

August 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    30 Files
  • 3
    Aug 3rd
    20 Files
  • 4
    Aug 4th
    17 Files
  • 5
    Aug 5th
    4 Files
  • 6
    Aug 6th
    2 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    18 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    24 Files
  • 11
    Aug 11th
    10 Files
  • 12
    Aug 12th
    3 Files
  • 13
    Aug 13th
    3 Files
  • 14
    Aug 14th
    10 Files
  • 15
    Aug 15th
    16 Files
  • 16
    Aug 16th
    18 Files
  • 17
    Aug 17th
    15 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close