what you don't know can hurt you
Showing 1 - 25 of 92 RSS Feed

Files Date: 2005-12-07

Secunia Security Advisory 17852
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ejovi Nuwere has reported a vulnerability in MultiTech MultiVoIP Gateway, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 558c65fe777f1da95997953f5288c8e1
Secunia Security Advisory 17863
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IMail Server, which can be exploited by malicious users to cause a DoS (Denial of Service) and to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | d1b6da86b0dc0a5a1c26db7e6221ec98
Secunia Security Advisory 17882
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for inkscape. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to potentially compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, debian
MD5 | 5cce6c491e225e5900b751cc4f8259ac
Secunia Security Advisory 17906
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has discovered a vulnerability in Ideal BB.NET, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 11440608fc74da26754cc4800c362006
Secunia Security Advisory 17908
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in KOffice, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | c53a3cfafe33d76aae25b16e54003abc
Secunia Security Advisory 17912
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Poppler, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | ca6256a9351e3bce02a79ee07f633a7d
Secunia Security Advisory 17916
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in teTeX, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | 86be56b5393e2b8e076decf42e051d3f
Secunia Security Advisory 17920
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in KDE kpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | 1621c6db28b383e5c5acada37279f376
Secunia Security Advisory 17921
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in pdftohtml, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | 5d29459130c896b5da9c197453a3e792
Secunia Security Advisory 17923
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for apache2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | ba669f3767a3def5f0b73f08eea4738b
Secunia Security Advisory 17924
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AIX, which can be exploited by malicious, local users with unknown impact.

tags | advisory, local
systems | aix
MD5 | 97a00274a9dad93e675b619cac38a388
Secunia Security Advisory 17925
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Esser has reported a vulnerability in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system.

tags | advisory, xss
MD5 | 11edf3740772fc4c6c689f6996b00f39
Secunia Security Advisory 17926
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | d213fb3ae833cf8e14eef32884843b43
Secunia Security Advisory 17928
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libc-client. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, redhat
MD5 | 9f88c13847ddc7be11d0971e5f28d5b4
Secunia Security Advisory 17929
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 3938cb53711a60db6c9d944181ef41ed
Secunia Security Advisory 17930
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, imap
systems | linux, redhat
MD5 | ddbe889de9d52cfed2d8ce2f9273d7f7
Secunia Security Advisory 17933
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jesse Burns and Alex Stamos has reported a security issue in SunnComm MediaMax, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | 37e521d10f9970b258464029acb40907
Secunia Security Advisory 17935
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported some vulnerabilities in Magic Forum Personal, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | 6f99dbd539779303bac344374f80a492
Secunia Security Advisory 17937
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported a vulnerability in Magic List Pro, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 06493a3296eaf127a0be3839bfad991b
Secunia Security Advisory 17939
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has discovered two vulnerabilities in CF_Nuke, which can be exploited by malicious people to conduct cross-site scripting attacks and to disclose potentially sensitive information.

tags | advisory, vulnerability, xss
MD5 | d92f027606c06b1b8db04c8089b13212
StJude_LKM-0.23.tar.gz
Posted Dec 7, 2005
Authored by Rodrigo Rubira Branco | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for the 2.2.0 and 2.4.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local and remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: StJude/StMichael now has Rodrigo Rubira Branco as its new maintainer. This release fixes compilation problems with 2.4 kernels and also support the newest StMichael (version 0.12).
tags | remote, kernel, local, root
systems | linux
MD5 | 2fa0b58e0165b503d494cf8138246b8d
MSN_Search_For_WebApp.pdf
Posted Dec 7, 2005
Authored by Shreeraj Shah | Site net-square.com

Whitepaper entitled 'Web Application Footprinting and Assessment with MSN Search Tricks'.

tags | paper, web
MD5 | 9c0a5629cec48fc84ef36e41a9dd9fab
e107v06Vote.txt
Posted Dec 7, 2005
Authored by Marc Ruef | Site scip.ch

e107 version 0.6 is susceptible to a voting manipulation flaw in rate.php.

tags | advisory, php
MD5 | 3bf4b614df99797701eefe418f0d8009
john-1.6.39w-mmx.zip
Posted Dec 7, 2005
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. This is the current development version which offers significant performance improvements over the 1.6 release, but no documentation and charset files are provided, and more testing is needed. NOTE: this is the Win32 port from info-sec.ca.

Changes: Various speed enhancements and bug fixes.
tags | cracker
systems | windows, unix, beos
MD5 | f8fa4c176557def2230c4e740012c7ed
firefox-1.5.txt
Posted Dec 7, 2005
Authored by Ziplock

Firefox 1.5 suffers from a denial of service condition when a large topic gets saved automatically to the history.dat file. This only works on a small amount of the Firefox 1.5 users, and it is not apparent that the problem is a buffer overflow. More information available here.

tags | exploit, denial of service, overflow
MD5 | 9c066c92de070c906d61510c03fcccac
Page 1 of 4
Back1234Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close