what you don't know can hurt you
Showing 1 - 25 of 27 RSS Feed

Files Date: 2005-10-13

Secunia Security Advisory 17122
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for w3c-libwww. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | df988b310e646b7514238ab01ae5835c
guestbookInject.txt
Posted Oct 13, 2005
Authored by BiPi_HaCk | Site NightmareTeAmZ.altervista.org

@lex Guestbook version 3.3 is susceptible to cross site scripting and injection attacks.

tags | exploit, xss
MD5 | 744ee8df690bb847b77706b27f0845b1
kerio-fwdrv-dos-adv.txt
Posted Oct 13, 2005
Authored by Piotr Bania | Site pb.specialised.info

Kerio Personal Firewall 4 (4.2.0) and Kerio Server Firewall version 1.1.1 are susceptible to a local denial of service vulnerability. Earlier versions are also presumed susceptible.

tags | advisory, denial of service, local
MD5 | 4f7d8aae72f064dc58964a67f39f251d
Debian Linux Security Advisory 865-1
Posted Oct 13, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 865-1 - Javier Fernandez-Sanguino Pena discovered that several scripts of the hylafax suite, a flexible client/server fax software, create temporary files and directories in an insecure fashion, leaving them vulnerable to symlink exploits.

tags | advisory
systems | linux, debian
advisories | CVE-2005-3069
MD5 | bd9774f15cc04cb1ccd51339b97c2e33
Debian Linux Security Advisory 864-1
Posted Oct 13, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 864-1 - Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed.

tags | advisory, ruby
systems | linux, debian
advisories | CVE-2005-2337
MD5 | 4be4e7e0348db4dd404bf820e7497a4f
Secunia Security Advisory 16851
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in AhnLab V3 Antivirus, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4b008e6baec8499aca5e5acf87936cb1
Secunia Security Advisory 17126
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - fRoGGz has discovered a weakness in avast! Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality.

tags | advisory, virus
MD5 | 9d12b93e9568b003c4e4638c06cf79c1
Secunia Security Advisory 17170
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Brightmail AntiSpam, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 6b5a6feb8cf9b96c87684591942fc7a7
Secunia Security Advisory 17181
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VERITAS NetBackup, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | d99e1d806af56b713780923ccdefa0d3
Secunia Security Advisory 17186
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - fRoGGz has discovered a weakness in AVG Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality.

tags | advisory, virus
MD5 | 23b29af649244ebe94500584942f6eb5
Secunia Security Advisory 17188
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - fRoGGz has reported a weakness in Kaspersky Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality.

tags | advisory, virus
MD5 | 66f3ee6c56d40aa138ad6b8ae8a07aa5
suckit2priv.tar.gz
Posted Oct 13, 2005
Authored by sd | Site sd.g-art.nl

SucKIT Rootkit v2.0-devel-rc2. Easy-to-use, Linux-i386 kernel-based rootkit. The code stays in memory through /dev/kmem trick, without help of LKM support nor System.map or such things. Everything is done on the fly. It can hide PIDs, files, tcp/udp/raw sockets and sniff TTYs.

tags | tool, kernel, udp, tcp, rootkit
systems | linux, unix
MD5 | 3bb82c1fddcc47456efee6f3687e4f51
antispyd-0.0.4.tar.gz
Posted Oct 13, 2005
Authored by janium | Site antispyd.sourceforge.net

Antispyd is an HTTP/HTTPS threat filtering proxy server. The main characteristic of this project is the modularity of its conception. The program is organized around an HTTP/HTTPS gateway service and a set of filters that can be enabled or disabled, and are all configurable with a single configuration file. Current filters are: URL filtering, content filtering, content-type filtering, cookie removal, pop-up removal, shell code attack blocking, Web traffic anonymizing, and a signature-based filtering engine. All filtering is done on the fly, without blocking downloads in any case. It uses only POSIX primitives and is built with autotools, and was created with security in mind.

tags | web, shell
systems | unix, osx
MD5 | f53ef8852f2f896304d6a14eab7d9113
WifiScanner-1.0.0.tar.gz
Posted Oct 13, 2005
Authored by Jerome Poggi | Site wifiscanner.sourceforge.net

WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.

Changes: Public Release.
tags | tool, wireless
systems | linux
MD5 | 4fb7fc124e7445568d1c65a4030031be
orinoco-leakage.txt
Posted Oct 13, 2005
Authored by Meder Kydyraliev | Site o0o.nu

The Linux orinoco driver included in kernel versions less than 2.6.13.4 pads Ethernet frames with uninitialized data, thus allowing remote attackers to obtain parts of memory which may contain sensitive information.

tags | advisory, remote, kernel
systems | linux
MD5 | c84258a815ae4479a0ea7cfa744dfb05
secunia-netmail-3.52C
Posted Oct 13, 2005
Authored by Secunia Research | Site secunia.com

Secunia research has discovered a vulnerability in Novell NetMail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 263a60103b4e01258895d858943ff40d
phpWebSite-0.10.1.txt
Posted Oct 13, 2005
Authored by Kevin Wilcox | Site phpwebsite.appstate.edu

phpWebSite versions less than and equal to 0.10.1 suffer from an SQL injection vulnerability in index.php.

tags | advisory, php, sql injection
MD5 | 558873d73750b923f31dc4bdddf30fd4
symantec-veritas.txt
Posted Oct 13, 2005
Authored by Symantec | Site symantec.com

Symantec Security Advisory - SYM05-018 - The remote exploitation of a format string overflow vulnerability in the Java user-interface authentication service, bpjava-msvc, running on VERITAS NetBackup servers and agents, could potentially allow remote attackers to execute arbitrary code on a targeted system with elevated privileges.

tags | advisory, java, remote, overflow, arbitrary
MD5 | 481ce3c53c4d30c5028feaa6f68c0dfd
Zero Day Initiative Advisory 05-01
Posted Oct 13, 2005
Authored by ZDI, Tipping Point | Site zerodayinitiative.com

ZDI-05-001: VERITAS NetBackup Remote Code Execution - This vulnerability allows remote attackers to execute arbitrary code on vulnerable NetBackup installations.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2005-2715
MD5 | 7a21d85b3b485baad912cd5d2d238a79
sec-1-GFI-MailSecurity.txt
Posted Oct 13, 2005
Authored by Gary O'Leary-Steele | Site sec-1.com

Sec-1 has identified an exploitable Buffer Overflow within the HTTP management interface of GFI MailSecurity 8.1. By sending large strings within several areas of the HTTP request (such as a large 'Host' or 'Accept' header) critical portions of memory are overwritten. Verification of this vulnerability can be achieved through the use of a HTTP fuzzer, such as @stake webproxy. Successful exploitation could allow an attacker to gain administrative control of the targeted host.

tags | advisory, web, overflow, fuzzer
MD5 | e7e879d96868a5f38533947ffba9af3d
Ubuntu Security Notice 202-1
Posted Oct 13, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-202-1 - Chris Evans discovered a buffer overflow in the RTF import module of KOffice. By tricking a user into opening a specially-crafted RTF file, an attacker could exploit this to execute arbitrary code with the privileges of the AbiWord user.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2005-2971
MD5 | a1ebc4042b66f29356adabbc80bcb5d6
Gentoo Linux Security Advisory 200510-11
Posted Oct 13, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200510-11 - Applications setting the SSL_OP_MSIE_SSLV2_RSA_PADDING option (or the SSL_OP_ALL option, that implies it) can be forced by a third-party to fallback to the less secure SSL 2.0 protocol, even if both parties support the more secure SSL 3.0 or TLS 1.0 protocols. Versions less than 0.9.8-r1 are affected.

tags | advisory, protocol
systems | linux, gentoo
advisories | CVE-2005-2969
MD5 | 23d500c36157990515aa297cf891def7
Secunia Security Advisory 17147
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, ruby
systems | linux, redhat
MD5 | c029c54b36ae1bff4790055b7af895ed
Secunia Security Advisory 17162
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
MD5 | ea77597267dd8db141b13888043da980
Secunia Security Advisory 17169
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun Microsystems has acknowledged a vulnerability in Solaris, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | solaris
MD5 | 2994cd5b2ac98eb9f0ba8a4e1e99ca94
Page 1 of 2
Back12Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    29 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close