Exploit the possiblities
Showing 1 - 25 of 58 RSS Feed

Files Date: 2006-02-02

CAID33581.txt
Posted Feb 2, 2006
Authored by Ken Williams | Site supportconnect.ca.com

The following two security vulnerability issues have been identified in the CA Message Queuing (CAM / CAFT) software: CAM is vulnerable to a Denial of Service (DoS) attack when a specially crafted message is received on TCP port 4105. CAM is vulnerable to a Denial of Service (DoS) through the spoofing of CAM control messages.

tags | advisory, denial of service, spoof, tcp
advisories | CVE-2006-0529, CVE-2006-0530
MD5 | 530d396e910f76e817041d822631f2b5
Bypass.pdf
Posted Feb 2, 2006
Authored by Mert SARICA

Trend Micro ServerProtect version 5.58 can be easily circumvented via the mechanism that limits how many files to scan.

tags | advisory
MD5 | 02f396549e367d3a97fae05d5f1e0d6d
Mandriva Linux Security Advisory 2006.028
Posted Feb 2, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple response splitting vulnerabilities in PHP allow remote attackers to inject arbitrary HTTP headers via unknown attack vectors, possibly involving a crafted Set-Cookie header, related to the session extension (aka ext/session) and the header function. Multiple cross-site scripting (XSS) vulnerabilities in PHP allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in certain error conditions.

tags | advisory, remote, web, arbitrary, php, vulnerability, xss
systems | linux, mandriva
advisories | CVE-2006-0207, CVE-2006-0208
MD5 | 9ec058a64a1ce89469bbaf30fbf96254
Technical Cyber Security Alert 2006-32A
Posted Feb 2, 2006
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA06-032A - America Online has released Winamp 5.13 to correct a buffer overflow vulnerability. By convincing a user to open a specially crafted playlist file, a remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the user. Winamp may open a playlist file without any user interaction as the result of viewing a web page or other HTML document.

tags | advisory, remote, web, overflow, arbitrary
advisories | CVE-2006-0476
MD5 | 9ac370b0e6dbfd8423eda3fe243b723a
FreeBSD-SA-06-08.sack.txt
Posted Feb 2, 2006
Authored by Scott Wood | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-06:08.sack - SACK (Selective Acknowledgment) is an extension to the TCP/IP protocol that allows hosts to acknowledge the receipt of some, but not all, of the packets sent, thereby reducing the cost of retransmissions. When insufficient memory is available to handle an incoming selective acknowledgment, the TCP/IP stack may enter an infinite loop.

tags | advisory, tcp, protocol
systems | freebsd
advisories | CVE-2006-0433
MD5 | 6b1c54981d986ac912087927224ba779
ashnews083.txt
Posted Feb 2, 2006
Authored by zeus | Site Security-mx.org

AshWebStudio in Ashnews version 0.83 is susceptible to cross site scripting attacks and remote file inclusion flaws.

tags | exploit, remote, xss, file inclusion
MD5 | ebc33ad5714ff56b5a195a5b8f8276ea
iDEFENSE Security Advisory 2006-02-01.2
Posted Feb 2, 2006
Authored by iDefense Labs, b0f, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 02.01.06 - It has been found that a specially crafted m3u or pls file can overwrite a stack based buffer allowing for remote code execution. This vulnerability is specific to the 5.11 version of Winamp and does not affect previous versions.

tags | advisory, remote, code execution
advisories | CVE-2006-0476
MD5 | fdc6c8286e1eeeec703e566675b07319
Secunia Security Advisory 18681
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in various products within the CA Message Queuing (CAM / CAFT) software, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | c00d40c95cf440b8103910539e64fa18
Secunia Security Advisory 18682
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various Autodesk products, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 91f571752aaf78121a832fa01d70fe32
Secunia Security Advisory 18696
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | freebsd
MD5 | d5265bf666fcf2c28e8d6912caf2982e
Secunia Security Advisory 18700
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Firefox, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, potentially disclose sensitive information, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | c45bd99329d302d81a21ce53afcd16f9
Secunia Security Advisory 18703
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Mozilla Suite, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | 7ec739098f367d5d74b76ebddc3be4f6
Secunia Security Advisory 18704
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, potentially disclose sensitive information, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | 713a27cc26c36247561d79b64209622f
iDEFENSE Security Advisory 2006-02-01.1
Posted Feb 2, 2006
Authored by iDefense Labs, b0f | Site idefense.com

iDefense Security Advisory 02.01.06 - It has been found that a specially crafted m3u or pls file with a target filename having the .wma extension can crash Winamp giving the attacker control over the EAX register. The vulnerability appears to have been silently fixed in Winamp 5.11.

tags | advisory
advisories | CVE-2005-3188
MD5 | 79ed6959a0c4e0e3aeb4166d0c99e956
fcron.txt
Posted Feb 2, 2006
Authored by Adam Zabrocki

Fcron (convert-fcrontab) allow users to corruption on heap section.

tags | advisory
MD5 | ca84b3a25d392ff23f445f59612c44ce
Secunia Security Advisory 18685
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Preben Nylokken has reported a vulnerability in Daffodil CRM, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 3819cc6f130d42961ceed81248433f16
Secunia Security Advisory 18690
Posted Feb 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Tru64 UNIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | unix
MD5 | 4cdd72c0d97a0af528ae8c32477f96a5
Debian Linux Security Advisory 962-1
Posted Feb 2, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 962-1 - infamous41md and Chris Evans discovered several heap based buffer overflows in xpdf which are also present in pdftohtml, a utility that translates PDF documents into HTML format, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-3191, CVE-2005-3192, CVE-2005-3193, CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, CVE-2005-3627, CVE-2005-3628
MD5 | e42c525439a50aa3bb6f38b8b982c5c4
EV0053.txt
Posted Feb 2, 2006
Authored by Aliaksandr Hartsuyeu

SZUserMgmt version 1.4 suffers from an authentication bypass flaw.

tags | advisory
MD5 | cc279f0015b5587403a87350f7c932b8
EV0052.txt
Posted Feb 2, 2006
Authored by Aliaksandr Hartsuyeu

Calendarix version 0.6.20050830 is susceptible to SQL injection and authorization bypass vulnerabilities.

tags | advisory, vulnerability, sql injection
MD5 | 00d1a1c5eb22730071b34c60eaeac99c
Debian Linux Security Advisory 961-1
Posted Feb 2, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 961-1 - infamous41md and Chris Evans discovered several heap based buffer overflows in xpdf which are also present in pdfkit.framework, the GNUstep framework for rendering PDF content, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-3191, CVE-2005-3192, CVE-2005-3193, CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, CVE-2005-3627, CVE-2005-3628
MD5 | e7236cdd03c7cf87f27a625f9e651dcf
ZRCSA-200601.txt
Posted Feb 2, 2006
Authored by Siegfried | Site zone-h.fr

Various SQL injection and cross site scripting vulnerabilities have been discovered in SPIP versions 1.8.2-e and below and 1.9 Alpha 2 and below.

tags | exploit, vulnerability, xss, sql injection
MD5 | e14e51d79a8abda6e77f3d50c444d101
Pound-2.0.tgz
Posted Feb 2, 2006
Authored by roseg | Site apsis.ch

Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.

Changes: See the changelog.
tags | web
MD5 | ddbd39a9f2beaf625ec7e7a9a2379801
Linux IPTables Firewall
Posted Feb 2, 2006
Site iptables.org

iptables is the packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: Various fixes in this release.
tags | tool, firewall
systems | linux
MD5 | 00fb916fa8040ca992a5ace56d905ea5
scponly-4.6.tgz
Posted Feb 2, 2006
Authored by Joe | Site sublimation.org

scponly is an alternative shell for system administrators who would like to provide access to remote users to both read and write local files without providing any remote execution privileges. Functionally, it is a wrapper around the ssh suite of applications.

Changes: Added missing semicolon.
tags | remote, shell, local
systems | unix
MD5 | 0425cb868cadd026851238452f1db907
Page 1 of 3
Back123Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    14 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close