exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2006-03-15

secunia-Adobe.txt
Posted Mar 15, 2006
Site secunia.com

Secunia Research 15/03/2006 - Adobe Document/Graphics Server File URI Resource Access - Secunia Research has discovered a vulnerability in Adobe Document Server and Adobe Graphics Server, which can be exploited by malicious people to gain knowledge of potentially sensitive information, overwrite arbitrary files, or compromise a vulnerable system.

tags | advisory, arbitrary
SHA-256 | f0e330f89ef6b6e06446d2c5d3d1e6a46994797ef6eeba88e2d2a73c0755ea67
HEXVIEW-2006-03-14-1.txt
Posted Mar 15, 2006
Authored by HexView | Site hexview.com

HEXVIEW*2006*03*14*1 - A vulnerability exists in Microsoft Excel which can be exploited to run a code of attacker's choice on user's PC.

tags | advisory
SHA-256 | b49f61bf0aad7736ae9c98d528c432754324b83c3815c076ca36290e525344d3
xfocus-SD-060314.txt
Posted Mar 15, 2006
Site xfocus.org

Eyas of XFOCUS Security Team discovered a buffer overflow vulnerability when Excel processes a malicious ".xls" file, which might cause Excel to crash or even execute arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | f13ff9c43731ec17ce43578d3325c86bb782de95e49c08e09c10c60a83b15a6a
proxychains-3.1.tar.gz
Posted Mar 15, 2006
Authored by netcreature | Site proxychains.sourceforge.net

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: fixes new DNS resolver.
tags | web, tcp
systems | linux, unix, solaris
SHA-256 | 9a27657fe9f6e17de9e402ba5c60f9954e7e79fb270c1ef242770f3c01d8515a
EV0092.txt
Posted Mar 15, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

eVuln Advisory: discussion - xhawk.net BBCode 'img' XSS & SQL Injection Vulnerabilities

tags | advisory, vulnerability, sql injection
SHA-256 | ba1161cfe035a24bc8161b418af746e2350b041ecd0228af2d6fe63cb550535d
SCOSA-2006.11.txt
Posted Mar 15, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSH Multiple Vulnerabilities: A vulnerability has been reported in the OpenSSH scp utilities. This issue may permit a malicious scp server to corrupt files on a client system when files are copied.

tags | advisory, vulnerability
SHA-256 | 058aa07bb6432ba4bcf1b9be324153ec0020060332d2fe3e2985872f20bb2bec
SCOSA-2006.12.txt
Posted Mar 15, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 6.0.0 : OpenSSH Multiple Vulnerabilities: Two security issues have been reported in OpenSSH, which can be exploited by malicious users to gain escalated privileges or bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | 837090b5029fe521ddda692f8741add4aed4195788bac5f25e483bc9723c4cb5
Debian Linux Security Advisory 1002-1
Posted Mar 15, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1002-1 - Several security related problems have been discovered in webcalendar, a PHP based multi-user calendar.

tags | advisory, php
systems | linux, debian
SHA-256 | 2c1370970ee104ecbb13d0d5785b7a2643241bee393ce6ee65a5307593a74769
knowledgebase.pl.txt
Posted Mar 15, 2006
Authored by uid0 | Site ExploiterCode.com

KnowledgebasePublisher 1.2 Remote Code Execution Exploit.

tags | exploit, remote, code execution
SHA-256 | 49bc0b4aa43f1399e0466008ace7a5af7b9849e696b8f319e542f70e0476febe
current-attack.sh.txt
Posted Mar 15, 2006
Authored by snortattack | Site snortattack.org

Snortattack is a bash shell script that is designed to make the installation of snort in inline mode on Fedora or Debian as easy as possible.

tags | tool, shell, sniffer, bash
systems | linux, debian, fedora
SHA-256 | ca60def0dfed32d507934b45e9e9e6993662431d2b1c7cab8d92e45057fd1320
ip-array_0.05.71.tar.gz
Posted Mar 15, 2006
Authored by AllKind | Site sourceforge.net

IP-Array is a Linux iptables Firewall script written in bash. It allows the creation of precise, stateful rules, while remaining easy to configure. IP-Array supports VPN, Traffic Shaping (creation of custom HTB and SFQ qdiscs, Classes, and Filters), multiple external interfaces, multiple LANs, multiple DMZs, NAT, logging, MAC address matching, packet marking, syslog logging, and various sysctl settings. It also includes some presets and autoconfig options for common needs like DNS, FTP, SMTP.

Changes: This release brings new startup parameters and configuration options, more user input validation, more detailed output, improved program logic and runtime speed, plus some bugfixes.
tags | bash
systems | linux, unix
SHA-256 | 2f82fd0e7e6e2ca8b095a41d998c0e4bee7e9754097ec5fa28daf8f80f77ddf0
Secunia Security Advisory 19170
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Joey Hess has reported a vulnerability in Debian, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
systems | linux, debian
SHA-256 | b39197d6aa0bc8a8952791dbfad64dc4860817842a08e664ab5bad916054ae2a
Secunia Security Advisory 19185
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - The SmoothWall Open Source Project has issued an update for multiple packages. This fixes various vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges, and by malicious people to potentially bypass certain security restrictions and conduct HTTP request smuggling attacks.

tags | advisory, web, denial of service, local, vulnerability
SHA-256 | e7fb5438185001b544dc5fc64c056ec93193375dc1d7b2484de19f2fa0eed662
Secunia Security Advisory 19193
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SCO has issued updates for multiple packages. These fix various vulnerabilities, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) and to compromise a user's system or vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 2ddd85049f0697b83ffe8ae596451086c886924af524f05fed2c9c062b0c7e81
Secunia Security Advisory 19194
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for crossfire. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 46ed58cfb49192362962db455a67423fc07e2940154250faa315f385684fac01
Secunia Security Advisory 19221
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in glFTPd, which potentially can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 52fdac15f71188361ef85e43c7f9abca127d457e36de11a25a1ab8fc69a0e7f4
Secunia Security Advisory 19229
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Adobe Document Server and Adobe Graphics Server, which can be exploited by malicious people to gain knowledge of potentially sensitive information, overwrite arbitrary files, or compromise a vulnerable system.

tags | advisory, arbitrary
SHA-256 | 8e13fbef886fa9d8524aa267f54e89e40cfbdb88b62f6b9d5c1547489304d732
Secunia Security Advisory 19233
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Funkwerk X2300, which potentially can be exploited by malicious people to cause a DoS (Denial of Service), and with an unknown impact.

tags | advisory, denial of service, vulnerability
SHA-256 | c045974dc41c17a2360588905d20920fd07a202ba566a57df0b7d2be60f1da95
Secunia Security Advisory 19235
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which has an unknown impact.

tags | advisory
systems | aix
SHA-256 | 21ad8d9c1f6da075f9f6ee9ed204c2534ad4fc4f600fb7b9366f7d99787ad64c
Secunia Security Advisory 19238
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some security issues in Avaya Modular Messaging, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | d8933d21bebbfe9649e2ec747ebf6ef167345d8436631d2f6c73ae46cc8c2030
Secunia Security Advisory 19240
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for webcalendar. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain information and conduct SQL injection attacks, and by malicious people to conduct HTTP response splitting attacks.

tags | advisory, web, vulnerability, sql injection
systems | linux, debian
SHA-256 | 402111c7fa7602d31f76a7473fb647464996d6cf403a2e5b44bc38ebcffc68cc
Secunia Security Advisory 19246
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Paul Craig has discovered a vulnerability in Horde, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 6be6727ae5977ed31012749fda023c262c1bfd7a783b5f4e9cdd0ba716b37bf5
Secunia Security Advisory 19247
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CodeScan Labs have reported some vulnerabilities in ASP Portal, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection, asp
SHA-256 | 0ca048c4887c94019feb0036cab196880e4a400b67d0ee4afecec4e3809f9f06
vr-10.0i.tar.gz
Posted Mar 15, 2006
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: Mac OS X Universal Binary support.
systems | unix
SHA-256 | 9258689a05e26d759e32c5cf2771f3ddca4c72efb41fe664e061fda5414c2703
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Mar 15, 2006
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: Various enhancements.
tags | kernel, encryption
systems | linux
SHA-256 | c8c1b8ef2d4d72f43379a896e8769555f6c6b83f267829a5d4ffbe631f06a912
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close