all things security
Showing 1 - 25 of 64 RSS Feed

Files Date: 2006-04-27

axoverzicht_cgi.txt
Posted Apr 27, 2006
Site alshmokh.com

axoverzicht.cgi is vulnerable to remote file inclusion.

tags | exploit, remote, cgi, file inclusion
MD5 | da64f752dc396a5c09e52b9da7a8dc84
phpsurveyor_0995_xpl
Posted Apr 27, 2006
Authored by rgod | Site retrogod.altervista.org

PHPSurveyor versions less than or equal to 0.995 save.php/surveyid remote command execution exploit.

tags | exploit, remote, php
MD5 | 2107ac047716ab96fd8d77388c0d8aad
PCPINChat-5.0.4.txt
Posted Apr 27, 2006
Authored by rgod | Site retrogod.altervista.org

PCPIN Chat versions less than or equal to 5.0.4 remote command execution exploit.

tags | exploit, remote
MD5 | 635b404ed19c960df6e376bb8db8bbfe
Cisco Security Advisory 20060419-wlse
Posted Apr 27, 2006
Authored by Cisco Systems | Site cisco.com

iCisco Security Advisory: Multiple Vulnerabilities in the WLSE Appliance - cisco-sa-20060419-wlse: There are two vulnerabilities that exist in the CiscoWorks Wireless LAN Solution Engine (WLSE). The first is a cross site scripting (XSS) vulnerability that may allow an attacker to gain administrative privileges on the system. The second is a local privilege escalation vulnerability that can be used by an attacker who already has authenticated access to the command line interface to obtain access to the underlying operating system.

tags | advisory, local, vulnerability, xss
systems | cisco
MD5 | cff7fc62b93998d7e4f5872ab6986dc1
Cisco Security Advisory 20060419-xr
Posted Apr 27, 2006
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory: Cisco IOS XR MPLS Vulnerabilities - ultiple Multi Protocol Label Switching (MPLS) related vulnerabilities exist on Cisco IOS XR. Only systems that are running Cisco IOS XR and configured for MPLS are affected by these vulnerabilities.

tags | advisory, vulnerability, protocol
systems | cisco, osx
MD5 | e716205459421d33772fa764011ad890
HP Security Bulletin 2006-11.33
Posted Apr 27, 2006
Authored by Hewlett Packard | Site hp.com

HPSBUX02108 SSRT061133 rev.7 - HP-UX running Sendmail, Remote Execution of Arbitrary Code

tags | advisory, remote, arbitrary
systems | hpux
MD5 | 0b82bcf0f01481ef49eaa723295a7ca8
HP Security Bulletin 2006-11.29
Posted Apr 27, 2006
Authored by Hewlett Packard | Site hp.com

HPSBST02112 SSRT061129 rev.1 - HP StorageWorks Secure Path for Windows Remote Denial of Service (DoS)

tags | advisory, remote, denial of service
systems | windows
MD5 | 739dc37fcf7d7d8f637f9144c7616684
HP Security Bulletin 2005-10.7
Posted Apr 27, 2006
Authored by Hewlett Packard | Site hp.com

HPSBTU02095 SSRT051007 rev.3 - HP Tru64 UNIX Running DNS BIND4/BIND8 as Forwarders: Remote Unauthorized Privileged Access

tags | advisory, remote
systems | unix
MD5 | e3e9809668d3a6f8cb771ef29ed7dd10
BKForum-4.0.txt
Posted Apr 27, 2006
Authored by n0m3rcy

BK Forum versions less than or equal to 4.0 suffer from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
MD5 | 17df56cd68920e25f4832a1f4afb4156
metacab-2006-04-R5.zip
Posted Apr 27, 2006
Authored by Phoenix 2600 | Site phx2600.org

Metacab (meta.cab) is a single, inclusive Microsft CAB file of remote administration tools. The CAB file and everything within can be decompressed, installed and used with only cmd.exe. Includes: WinPcap needed for Nmap, DCOM RPC overflow exploit, Simple bat file to ping sweep a Class D, HOD's PnP exploit, Netcat CAB, Nmap CAB, VNC CAB.

Changes: Now includes TCPDUMP, install.bat hides Metacab install, map.bat timeout cut in half, Naming is cleaner, Updated README, including links to sources.
tags | remote, overflow
MD5 | c6ee4155396f5027ab2b60cb3d79f2fd
Gentoo Linux Security Advisory 200604-10
Posted Apr 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200604-10 - Andrea Barisani of Gentoo Linux discovered xzgv and zgv allocate insufficient memory when rendering images with more than 3 output components, such as images using the YCCK or CMYK colour space. When xzgv or zgv attempt to render the image, data from the image overruns a heap allocated buffer. Versions less than 0.8-r2 are affected.

tags | advisory, overflow
systems | linux, gentoo
MD5 | 6d74dc7fcf3ca5ace04339a1f91513d6
Gentoo Linux Security Advisory 200604-9
Posted Apr 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200604-09 - Cyrus-SASL contains an unspecified vulnerability in the DIGEST-MD5 process that could lead to a Denial of Service. Versions less than 2.1.21-r2 are affected.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | 71606e1fd6e8c068caba352912a191e3
Gentoo Linux Security Advisory 200604-14
Posted Apr 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200604-14 - infamous41md discovered multiple buffer overflows in Dia's XFig file import plugin. Versions less than 0.94-r5 are affected.

tags | advisory, overflow
systems | linux, gentoo
MD5 | dac2929cdf14d32f2fd1f11ee4772558
Gentoo Linux Security Advisory 200604-13
Posted Apr 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200604-13 - Jan Braun has discovered that the fbgs script provided by fbida insecurely creates temporary files in the /var/tmp directory. Versions less than 2.03-r3 are affected.

tags | advisory
systems | linux, gentoo
MD5 | 24575d9bd08e2b931f7e28f7285666bb
Gentoo Linux Security Advisory 200604-12
Posted Apr 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200604-12 - Several vulnerabilities were found in Mozilla Firefox. Versions 1.0.8 and 1.5.0.2 were released to fix them. Versions less than 1.0.8 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 55aa99e9810adda91f7a4803476d5730
Gentoo Linux Security Advisory 200604-11
Posted Apr 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200604-11 - Luigi Auriemma discovered a vulnerability in the Crossfire game server, in the handling of the oldsocketmode option when processing overly large requests. Versions less than 1.9.0 are affected.

tags | advisory
systems | linux, gentoo
MD5 | 873e124cbacb95617a5e28b8ed882563
Secunia Security Advisory 19473
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various SpeedProject products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | af31aec1ccf642f7c54fd4d64215b0db
Secunia Security Advisory 19738
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - codedreamer has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | 155c0252bb30c9f2db219b8bfd419af1
Secunia Security Advisory 19750
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in DeleGate, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 3a67f17c4681119e1de9c69d657c5ee2
Secunia Security Advisory 19772
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, ruby
systems | linux, mandriva
MD5 | 0e0c8407e79c0b6fb7ad58fe31202e7b
Secunia Security Advisory 19774
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Sun Cobalt, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 759d36002602452dfa3ea544ff687085
Secunia Security Advisory 19804
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, ruby
systems | linux, ubuntu
MD5 | 24b11257847192ade4dff2534c1a0dd8
Secunia Security Advisory 19805
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
MD5 | 6b991971f4b71121a48fde2003d0f9fd
Secunia Security Advisory 19808
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability been reported in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 9e145c8f0b4ae7c1719c419d243298ed
Secunia Security Advisory 19809
Posted Apr 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for cyrus-sasl2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 494d487ce7aff3a5726158b16eca8d5d
Page 1 of 3
Back123Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close