exploit the possibilities
Showing 1 - 25 of 67 RSS Feed

Files Date: 2005-11-03

Secunia Security Advisory 17359
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tatercrispies has reported a vulnerability in vBulletin, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | 5d1205d64baaa26ebc9f1e059b466c3d
Secunia Security Advisory 17410
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Linux_Drox has discovered a vulnerability in phpWebThings, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | deccc0c67a4142d7417096e5b3c49123
Secunia Security Advisory 17416
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Maciejak has discovered a vulnerability in Apache Tomcat, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | eee919582ca5243434281ca667e9efce
Secunia Security Advisory 17419
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported two vulnerabilities in Asus VideoSecurity Online, where one has an unknown impact, and the other can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
MD5 | 50a05f462f8e2f9db7cfed3436859f1c
Secunia Security Advisory 17421
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in NeroNET, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | d8b350a20026fb9ce1af9155c6b481b0
Secunia Security Advisory 15500
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Ipswitch WhatsUp Small Business 2004, which can be exploited by malicious people to gain knowledge of sensitive information.

tags | advisory
MD5 | bfed200d9715f337e605302caa4a4525
Secunia Security Advisory 17406
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco WLAN (Wireless LAN) Controllers, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | cisco
MD5 | 8d62ff6e3e73a9572dd975d04fb72260
Secunia Security Advisory 17407
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SCO has issued an update for Squid. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 486addf71fe7c2e0b86c75905dc89f2c
Secunia Security Advisory 17412
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BiPi_HaCk has reported some vulnerabilities in PHP Handicapper, which can be exploited by malicious people to conduct cross-site scripting, HTTP response splitting, and SQL injection attacks.

tags | advisory, web, php, vulnerability, xss, sql injection
MD5 | 81a825d7a50853833a9200994806e553
Secunia Security Advisory 17413
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco IOS, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | cisco
MD5 | 8379cfbe996b2c2eda13587c9fd6de9b
Secunia Security Advisory 17414
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SCO has issued an update for htdig. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | eea27684aaf3852c5f2788c2eafb02ef
Secunia Security Advisory 17415
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SCO has issued an update for docview (htdig). This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | cb79547a027968dc066673c4aab59c93
Secunia Security Advisory 17426
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for libgda. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
MD5 | 429decd1ad7344f95e106784edbd04e9
Secunia Security Advisory 17427
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued updates for qdbm / imagemagick / gdal. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | b5724bbb9819d4ddcfd67c5bbc85da4a
nufw-1.0.15.tar.gz
Posted Nov 3, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Code cleaning and minor bug fix.
tags | tool, remote, firewall
systems | unix
MD5 | 30c95b5fda9443efdbe96c6ae3fba3d3
engine_pkcs11-0.1.2.tar.gz
Posted Nov 3, 2005
Site opensc-project.org

Engine_pkcs11 is an implementation of an engine for OpenSSL. It can be loaded using code, config file, or command line and will pass any function call by openssl to a PKCS#11 module. Engine_pkcs11 is meant to be used with smart cards and software for using smart cards in PKCS#11 format, such as OpenSC. Originally this engine was a part of OpenSC, until OpenSC was split into several small projects for improved flexibility.

tags | encryption
MD5 | 5be3d186a486e5696f1508f539567851
pam_p11-0.1.2.tar.gz
Posted Nov 3, 2005
Site opensc-project.org

Pam_p11 is a pluggable authentication module (PAM) package for using cryptographic tokens such as smart cards and USB crypto tokens for authentication. Pam_p11 is very simple, as it has no config file, no options other than the PKCS#11 module file, and does not know about certificate chains, certificate authorities, revocation lists, or OCSP. There is one module that uses the $HOME/.eid/authorized_certificates file (like the old pam_opensc did) and one module that uses the $HOME/.ssh/authorized_keys file (like ssh does).

tags | crypto
systems | linux
MD5 | de550f9d7cf921a7b8e35901e6bbfa25
libp11-0.2.0.tar.gz
Posted Nov 3, 2005
Site opensc-project.org

Libp11 is a library that implements a small layer on top of the PKCS#11 API to make using PKCS#11 implementations easier.

tags | library
MD5 | 549803a368aa2b457ebcf9d5c7d36dfd
php-handicapper.txt
Posted Nov 3, 2005
Authored by BiPi_HaCk | Site NightmareTeAmZ.altervista.org

PHP HANDICAPPER is susceptible to cross site scripting, SQL injection, and other flaws. Details provided.

tags | exploit, php, xss, sql injection
MD5 | ba4d54f1820d49ee349f292dfaa05af1
cirt-40-advisory.pdf
Posted Nov 3, 2005
Authored by Dennis Rand | Site cirt.dk

Whatsup Small Business 2004 is susceptible to a directory traversal attack. Exploitation details provided.

tags | exploit
MD5 | fad3cd98d759016e604f2963e8e51661
SCOSA-2005.46.txt
Posted Nov 3, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - Cross-site scripting vulnerability in docview (htdig) under OpenServer 5.0.7 and OpenServer 6.0.0 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.

tags | advisory, remote, web, arbitrary, xss
advisories | CVE-2005-0085
MD5 | 9212a33ccabfb3eeaa527133fb092386
SCOSA-2005.45.txt
Posted Nov 3, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - Cross-site scripting vulnerability in docview (htdig) under UnixWare 7.1.3 and UnixWare 7.1.4 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.

tags | advisory, remote, web, arbitrary, xss
systems | unixware
advisories | CVE-2005-0085
MD5 | 830d6a475dfaf83134d280b5481e4aca
bcarrydos.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for a denial of service flaw in Battle Carry versions .005 and below.

tags | exploit, denial of service, proof of concept
MD5 | 39dec2b6011875f864315f8ad113b0e4
bcarrydos.txt
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

A denial of service flaw exists in Battle Carry versions .005 and below. A packet bigger than 8192 bytes causes a socket error in the Python code used to handle the server which immediately terminates the socket and interrupts the listening on the UDP port where has been received the packet.

tags | advisory, denial of service, udp, python
MD5 | 29723d64729b422386cd1984aaac1c1f
flatfragz.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for FlatFrag versions 0.3 and below which suffer from a null pointer crash and buffer overflow bugs.

tags | exploit, overflow, proof of concept
MD5 | 60c1835fd969eb9fa52eb2805e9e30b0
Page 1 of 3
Back123Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    31 Files
  • 8
    Apr 8th
    18 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close