what you don't know can hurt you
Showing 1 - 25 of 79 RSS Feed

Files Date: 2005-11-08

truecrypt-4.0-source-code.tar.gz
Posted Nov 8, 2005
Site truecrypt.org

TrueCrypt is on-the-fly disk encryption software that can create a virtual encrypted disk within a file and mount it as a real disk. It can also encrypt an entire hard disk partition, or a storage device such as USB memory stick. It supports plausible deniability.

tags | encryption
MD5 | d9f462c61bc74face7cd96e07ad0d218
atutor151pl2.txt
Posted Nov 8, 2005
Authored by rgod | Site retrogod.altervista.org

ATutor versions less than or equal to 1.5.1pl2 SQL Injection and Remote commands execution exploit.

tags | exploit, remote, sql injection
MD5 | f6e0ae302cbd497b731ce3dc9d4a61f5
usn-215-1.txt
Posted Nov 8, 2005
Authored by Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-215-1 - Thomas Wolff and Miloslav Trmac discovered a race condition in the fetchmailconf program. The output configuration file was initially created with insecure permissions, and secure permissions were applied after writing the configuration into the file. During this time, the file was world readable on a standard system (unless the user manually tightened his umask setting), which could expose email passwords to local users.

tags | advisory, local
systems | linux, ubuntu
MD5 | 80dce1e1b7f774b7bdfe686f170e2add
herodot.tar.bz2
Posted Nov 8, 2005
Authored by Piotr Sobolewski | Site rozrywka.jawsieci.pl

Herodot is a tool that parses the timeline of filesystem activity created by mactime and adds human readable descriptions to it. It also understands that later changes of some mac tags hide earlier changes.

systems | unix
MD5 | 3456b5dfdf6409b057b005d8b0a06232
tkadv2005-11-001.txt
Posted Nov 8, 2005
Authored by Tobias Klein | Site trapkit.de

PHPlist Version 2.10.1 and prior contain multiple Cross Site Scripting and SQL Injection vulnerabilities. Furthermore it is possible to access and read arbitrary system files through a vulnerability in PHPlist. Detailed exploitation provided.

tags | advisory, arbitrary, vulnerability, xss, sql injection
MD5 | 59e645e83f95b3ba8f551e8503ef9628
adv8.txt
Posted Nov 8, 2005
Authored by suresec advisories | Site suresec.org

Suresec Security Advisory - #00008 - The Mac OS X kernel has several information leaks.

tags | advisory, kernel
systems | apple, osx
MD5 | a9e4362c90e7c47fe5d46febac5c5b80
zone.labs-fw.txt
Posted Nov 8, 2005
Authored by Debasis Mohanty | Site hackingspirits.com

Zone Alarm products with Advance Program Control or OS Firewall Technology enabled, detects and blocks almost all APIs which are commonly used by malicious programs to send data via http by piggybacking over other trusted programs. However, it is still possible for a malicious programs to make outbound connections to the evil site by piggybacking over trusted Internet browser using "HTML Modal Dialog" in conjunction with simple JavaScript. POC code provided.

tags | advisory, web, javascript
MD5 | fd1ebbab40430943178e3241e7a03352
usn-214-1.txt
Posted Nov 8, 2005
Authored by Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-214-1 - Chris Evans discovered several buffer overflows in the libungif library. By tricking an user (or automated system) into processing a specially crafted GIF image, this could be exploited to execute arbitrary code with the privileges of the application using libungif.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
MD5 | a0e36157d85068cc6f93a1fd918e2dbe
issue_22_2005.pdf
Posted Nov 8, 2005
Authored by astalavista | Site astalavista.com

Astalavista Security Newsletter - Issue 22 - Featured articles include - Things to consider when developing your early-stage security policy ; and Antivirus software - so what?! as well as an interview with Daniel Brandt, Google-Watch.org.

MD5 | 54e290beb5624eab6704856aba2a4b92
issue_21_2005.pdf
Posted Nov 8, 2005
Authored by astalavista | Site astalavista.com

Astalavista Security Newsletter - Issue 21 - Featured articles include - What else should I worry about besides the encryption length of our VPN solution? ; and Tips for enhancing your online privacy as well as an interview with Johannes B. Ullrich, CTO of the Sans Internet Storm Center, and the main developer behind the Dshield.org project

MD5 | bb7b96bdea16a6d0a91985c35e9011d3
Debian Linux Security Advisory 888-1
Posted Nov 8, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 888-1 - Yutaka Oiwa discovered a vulnerability in the Open Secure Socket Layer (OpenSSL) library that can allow an attacker to perform active protocol-version rollback attacks that could lead to the use of the weaker SSL 2.0 protocol even though both ends support SSL 3.0 or TLS 1.0.

tags | advisory, protocol
systems | linux, debian
MD5 | a329a8426b85c32d47fd647eedee6c34
Debian Linux Security Advisory 887-1
Posted Nov 8, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 887-1 - Several vulnerabilities have been discovered in Clam AntiVirus, the antivirus scanner for Unix, designed for integration with mail servers to perform attachment scanning

tags | advisory, vulnerability
systems | linux, unix, debian
advisories | CVE-2005-3239, CVE-2005-3303, CVE-2005-3500, CVE-2005-3501
MD5 | 9dfecf4fecaa0d810ec0782de599e079
Debian Linux Security Advisory 886-1
Posted Nov 8, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 886-1 - Several vulnerabilities have been discovered in chmlib, a library for dealing with CHM format files.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2005-2659, CVE-2005-2930, CVE-2005-3318
MD5 | 032e35ceab8efb7c673bb2264070b623
Debian Linux Security Advisory 885-1
Posted Nov 8, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 885-1 - Several vulnerabilities have been discovered in OpenVPN, a free virtual private network daemon.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2005-3393
MD5 | 0e4461aeb2887d67aaf69b665bb6527d
Debian Linux Security Advisory 809-3
Posted Nov 8, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 809 - Kosa Attila discovered that the security update DSA 809-2 contained a regression in the packages for the old stable distribution (woody).

tags | advisory
systems | linux, debian
MD5 | b0129bd1f651e2bb7858790535c0e0a3
oste1.0.txt
Posted Nov 8, 2005
Authored by khc

The OSTE toplist script v1.0 is vulnerable to remote code execution.

tags | exploit, remote, code execution
MD5 | 0e7c053243418a09d49fcafa1f9e835b
guestbook-2.2.txt
Posted Nov 8, 2005
Authored by bhs_team | Site Babol-Hackers.com

Guestbook v2.2 is vulnerable to a classic SQL admin bypass vulnerability.

tags | exploit, bypass
MD5 | 2e4a2d709870136d7d20ecd20e2c59bc
Secunia Security Advisory 17476
Posted Nov 8, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in phplist, which can be exploited by malicious users to conduct SQL injection attacks and disclose sensitive information, and by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and disclose sensitive information.

tags | advisory, vulnerability, xss, sql injection
MD5 | e632d78774c32fc2ae501cc0d4ef2543
Secunia Security Advisory 17479
Posted Nov 8, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Christopher Kunz has reported some vulnerabilities in PHPKIT, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks, disclose sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability, xss
MD5 | 9e2cb3838f3bd21a533551d8a78a2a9d
Secunia Security Advisory 17493
Posted Nov 8, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - khc has reported a vulnerability in OSTE, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 58b02e7e4f54878fff25669e8d38590b
SEC-20051107-1.txt
Posted Nov 8, 2005
Authored by Bernhard Mueller | Site sec-consult.com

SEC-CONSULT Security Advisory 20051107-1 - SEC Consult has found that parameters to ActionDefineFunction (ACTIONRECORD 0x9b) in the Macromedia Flash Plugin are not properly sanitized. Loading a specially crafted SWF leads to an improper memory access condition which can be used to crash flash player or may be exploited as a vector for code execution. This issue is similar to CVE-2005-2628 (as reported by eEye Digital Security on November 4, 2005) but affects a different function. Versions affected: flash.ocx 7.0.19.0 and earlier, libflashplayer.so before 7.0.25.0.

tags | exploit, code execution
MD5 | 264599e1850c14e2756e29db80b22319
SEC-20051107-0.txt
Posted Nov 8, 2005
Authored by Bernhard Mueller | Site sec-consult.com

SEC-CONSULT Security Advisory 20051107-0 - toendaCMS allows for theft of CMS usernames and passwords (XML database mode), session theft (XML database mode), directory traversal attacks (XML database mode), and arbitrary file uploads. Versions below 0.6.2 are affected.

tags | exploit, arbitrary, file upload
MD5 | 6844189f4d71a6ff5a7e18d4ca8b49b4
Debian Linux Security Advisory 884-1
Posted Nov 8, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 884-1 - Mike O'Connor discovered that the default installation of Horde3 on Debian includes an administrator account without a password. Already configured installations will not be altered by this update.

tags | advisory
systems | linux, debian
advisories | CVE-2005-3344
MD5 | 302af99bb7f7233fa69bc89a3ae18866
fileZillaDoS.txt
Posted Nov 8, 2005
Authored by Inge Henriksen

FileZilla Server Terminal version 0.9.4d appears to suffer from a buffer overflow vulnerability when being passed 900-3000 characters to the USER directive.

tags | advisory, overflow
MD5 | 4fa3a086c1be7cde857a8808b72f65c9
namesXSS.txt
Posted Nov 8, 2005
Authored by reuben.31

names.co.uk, an English registrar and web hosting company, has an cross site scripting vulnerability allowing injection of arbitrary Javascript.

tags | exploit, web, arbitrary, javascript, xss
MD5 | 8a4a5966f0874e223608846ea8dcc14a
Page 1 of 4
Back1234Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close