exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2005-10-28

pmacct-0.9.3.tar.gz
Posted Oct 28, 2005
Authored by Paolo Lucente | Site ba.cnr.it

pmacct is a small set of passive network monitoring tools to measure, account and aggregate IPv4 and IPv6 traffic; aggregation revolves around the key concept of primitives (VLAN id, source and destination MAC addresses, hosts, networks, AS numbers, ports, IP protocol and ToS/DSCP field are supported) which may be arbitrarily combined to build custom aggregation methods; support for historical data breakdown, triggers and packet tagging, filtering and sampling. Aggregates can be stored into memory tables, SQL databases (MySQL or PostgreSQL) or simply printed to stdout. Data is collected from the network either using libpcap (and optionally promiscuous mode) or reading NetFlow v1/v5/v7/v8/v9 and sFlow v2/v4/v5 datagrams, both unicast and multicast.

tags | protocol
systems | unix
SHA-256 | 2d0a42c3dc4eb96a5f1c38d4885f8d99d208cf2903f356e82949043a561b08c3
Mandriva Linux Security Advisory 2005.199
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Pnmtopng in netpbm 10.2X, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.

tags | advisory, arbitrary
systems | linux, mandriva
SHA-256 | 02b77f231a4547d4cbd7baabcbf8a8eb45098ac3221b2977ac3a25705be2bf62
Mandriva Linux Security Advisory 2005.198
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Masanari Yamamoto discovered that Uim uses environment variables incorrectly. This bug causes a privilege escalation if setuid/setgid applications are linked to libuim.

tags | advisory
systems | linux, mandriva
SHA-256 | 8c54df2a715f661caec9166cb73782bec960b5f50dd64209d2ef84787582283f
Mandriva Linux Security Advisory 2005.197
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Unzip 5.51 and earlier does not properly warn the user when extracting setuid or setgid files, which may allow local users to gain privileges.

tags | advisory, local
systems | linux, mandriva
SHA-256 | b52e864e0b3825cf9032f29b687d551b09b3cf11647c7b5c609ff2ffb54ad475
Mandriva Linux Security Advisory 2005.196
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The perl Compress::Zlib module contains an internal copy of the zlib library that was vulnerable to CVE-2005-1849 and CVE-2005-2096. This library was updated with version 1.35 of Compress::Zlib.

tags | advisory, perl
systems | linux, mandriva
SHA-256 | 4d7b096104dbb89d2c9d4e1836e61fd97106906b067a5ffc5446ac51be563ca3
Mandriva Linux Security Advisory 2005.195
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The rfc1738_do_escape function in ftp.c for Squid 2.5.STABLE11 and earlier allows remote FTP servers to cause a denial of service (segmentation fault) via certain "odd" responses.

tags | advisory, remote, denial of service
systems | linux, mandriva
SHA-256 | 9bdd1a55a31bb29773dcff05bfca825ac17b69bca1805cd95774a3cc8002f343
Mandriva Linux Security Advisory 2005.194
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - "infamous41md" discovered a buffer overflow in uw-imap, the University of Washington's IMAP Server that allows attackers to execute arbitrary code.

tags | advisory, overflow, arbitrary, imap
systems | linux, mandriva
SHA-256 | a1eba0e377465c857c654fda0209e62501b0830b4d513f960c87948f3aedd254
Mandriva Linux Security Advisory 2005.193
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Ethereal 0.10.13 is now available fixing a number of security vulnerabilities in various dissectors.

tags | advisory, vulnerability
systems | linux, mandriva
SHA-256 | 2949672151c40706db69b317bd5560841e9bca725afe2a92ebe1741eee6a1826
Mandriva Linux Security Advisory 2005.186
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Ulf Harnhammar discovered a remote buffer overflow in lynx versions 2.8.2 through 2.8.5.

tags | advisory, remote, overflow
systems | linux, mandriva
SHA-256 | 9096ee2561547d48a7c2b2508bb19b5f4973f207aad33445e6c7d603140eeda0
Secunia Security Advisory 16915
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in ATutor, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 810d0d0ea0d53e0fcf0a8e735d48cd00c9cc948925c69d237f99fa85f023a2f1
Secunia Security Advisory 17294
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Scott Cromar has reported a vulnerability in BMC Control-M/Agent, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | dc695226b05205b7c9bfed52cbb4caa34961f610575d2dc2a71ef02901bd7101
Secunia Security Advisory 17296
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bhfh01 has reported a vulnerability in the Search Enhanced module for PHP-Nuke, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, php, xss
SHA-256 | fe0e90324cf0296b0ef008a08a5da6517babb66ae8c91ce267e1871375eb9c95
Secunia Security Advisory 17326
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for perl-Compress-Zlib. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, perl, vulnerability
systems | linux, mandriva
SHA-256 | c00b24241863ead7604b2ddf4019c1ea19a1080f4593a96ab831ac3a332f7178
Secunia Security Advisory 17333
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in phpESP, which potentially can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 86105fa7aa0f28188b93d4b6ac4092bb722a6dee22a3f096d7c510ebeb4b555e
Secunia Security Advisory 17334
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a security issue in Solaris, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | solaris
SHA-256 | 7af93e0321f927ed258cd0195b3ec55a1933ebb5f219b221104fbfcd61f3a06a
Secunia Security Advisory 17336
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for php-imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, php, imap
systems | linux, mandriva
SHA-256 | d55a080b7d0110bd8a4f90b313238432a2f7b472d0f4d49b033c914ee04f563e
Secunia Security Advisory 17338
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, mandriva
SHA-256 | 4c9d5c04e8938fbc8abf1847287a3b1f04f5e30a63cac7dd2f9f0bd24ef078b4
Secunia Security Advisory 17340
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | ef48a44313b0f2d6a83d3e6d5c9ad057bd31ad973e9d572938e3a2aa4852b0b0
Secunia Security Advisory 17342
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for unzip. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, mandriva
SHA-256 | 929fe440da76a1787af5912a8a17f8acdcb90dd4ee9894115bdf0640ee12847e
Secunia Security Advisory 17343
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for net-snmp. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 0784df86cbd4c8103a3eb09a8ce7292f44475118f6495510b3fb8c2992ed6b41
Secunia Security Advisory 17344
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, debian
SHA-256 | 779de0855c5c0010a64d0f2a06ab6d9bb15b340351624c76b127f67407a34d6c
Secunia Security Advisory 17345
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, mandriva
SHA-256 | 723f02577f4f20ee0e0523dee344cbbc07ab658b05e6004ad4ea15dda7db1a11
Secunia Security Advisory 17346
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for pam. This fixes a security issue, which potentially can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
SHA-256 | 61e1624e6ea934640c06151868837506946f135432162be1c8252a40df344f39
Secunia Security Advisory 17347
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - [R] has reported two vulnerabilities in the Database module for Woltlab Burning Board, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | c5e4c99f85e412b52bcf8af1ca03ec52bd7e47a8d2b926a9bde55e4d67a135ec
Secunia Security Advisory 17348
Posted Oct 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for apache-mod_auth_shadow. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, mandriva
SHA-256 | d3167f8ee8ca284be2579495ade2440dd6f7ee0a215c5ff30e469fa002c518c9
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close