exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 65 RSS Feed

Files Date: 2006-06-15

Secunia Security Advisory 15779
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sendmail, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 31439ad51559bb5fc04f69e80f2029db4458187d63633b045c69a274215b810b
Secunia Security Advisory 20576
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in Adobe Reader.

tags | advisory, vulnerability
SHA-256 | 72cfff4a342f12461555780a68168ccb44b77fdaa48d252d7aad44e11440b843
Secunia Security Advisory 20656
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - spykids has discovered some vulnerabilities in PictureDis products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | c0f604aec3e4f9749edb33464fb9b4f300dd365fc39c3845082a4cb334c12b3d
Secunia Security Advisory 20658
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
SHA-256 | f64c88d1c412dc1792893b567ff5054ee78e6ca27e41a18b824e83b54b27b115
Secunia Security Advisory 20661
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Horde, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 1ddf764cdc6ab4d6e5229a7419d6f2ff140d3659b20905962ecb84744a046bf2
Secunia Security Advisory 20665
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in wvWare wv2 Library, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
SHA-256 | c7a0c559a3540b1dcf508270fce22c095e9a8a950c43e403b137f5e43309bd5c
Secunia Security Advisory 20669
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for DokuWiki. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 7d0da4decc177f3a597049052009e10af3ad59d4bc0d3d466f192f35dba2bec0
Secunia Security Advisory 20672
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 0b92f1c594b5ed37a7f0a1778aa17a9f1e4537cee4521740beb0ac396c351498
Secunia Security Advisory 20675
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in sendmail, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 0a83118a42672729f1fb5bcbab5597c000229a1462e66b1166ad8d60f1607253
Secunia Security Advisory 20676
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for php. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

tags | advisory, denial of service, php, vulnerability
systems | linux, suse
SHA-256 | 9d3c8118673016f0da5036b80c52fd749e8e0dca587d1af8ecd85932f229fb5d
Secunia Security Advisory 20687
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - RedTeam has reported a vulnerability in phpBannerExchange, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 95d36a5b6204c392b6293db2a71f5e6089ff061e8b4a663f8f329397b10d3820
Secunia Security Advisory 20688
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
SHA-256 | 069075ececc2d971a14b18ec4cfeaccb0d33c8e6d99d29cd559df6a7fe0d4c90
Secunia Security Advisory 20689
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, ubuntu
SHA-256 | c43f87e0b469196d159252b4520baf7e278d929133f4acbf2d05fd50fc88642c
secunia-zipinfo.txt
Posted Jun 15, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in PicoZip version 4.01, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "zipinfo.dll" info tip shell extension when reading a ACE, RAR, or ZIP archive that contains a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when the user moves the mouse cursor over a malicious archive either in Windows Explorer or from any program that uses the file-open dialog box. Successful exploitation allows arbitrary code execution.

tags | advisory, overflow, arbitrary, shell, code execution
systems | windows
advisories | CVE-2006-2909
SHA-256 | d020df17118c2708ed7b20a03b95d908f801e7b21c0521b16b3d114542da5705
SEC-20060613-0.txt
Posted Jun 15, 2006
Authored by D. Fabian, T. Kerbl | Site sec-consult.com

SEC-CONSULT Security Advisory 20060613-0 - Microsoft Outlook Web Access is vulnerable to an HTML code injection/cross site scripting attack. A malicious user could craft a mail containing HTML and Javascript code. Such code could be used to steal session information from the victims cookies, and thus enable the attacker to get access to the victim's emails. Vulnerable versions are Exchange 2000 (SP3), 2003 (SP1), 2003 (SP2).

tags | advisory, web, javascript, xss
SHA-256 | 660a8881d54862ec36db23fe8a4c02478e27719f256152894a6da754d91c8977
wbb216.txt
Posted Jun 15, 2006
Authored by CrAzY CrAcKeR | Site alshmokh.com

WBB version 2.1.6 is susceptible to a SQL injection flaw in profile.php.

tags | exploit, php, sql injection
SHA-256 | 6157fa137220101662b1d7d9a1c08030647c44154f00a12317659dabed4b66f8
wbb221.txt
Posted Jun 15, 2006
Authored by CrAzY CrAcKeR | Site alshmokh.com

WBB version 2.2.1 is susceptible to a SQL injection flaw in studienplatztausch.php.

tags | exploit, php, sql injection
SHA-256 | 2fddb4891ff9e5cf5b8c41557d1d05f204399fba8d38e187be0f2924f3198053
wbb222.txt
Posted Jun 15, 2006
Authored by CrAzY CrAcKeR | Site alshmokh.com

WBB version 2.2.2 is susceptible to a SQL injection flaw in thread.php.

tags | exploit, php, sql injection
SHA-256 | 4d081f6b4eb5ba1606f6253b7c724c0a9037c6360aa0b04152a046e1e953c019
bbrss.txt
Posted Jun 15, 2006
Authored by SpC-x

bbrss PHPBB is susceptible to a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 16024f1dffc64686c3d2b570bc13135cf587f98b5c1a65678107489728036b32
Samhain File Integrity Checker
Posted Jun 15, 2006
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 653daa580b75c74cfe8c26da3ce396ad08342a7308f7fd1e63ce4e11b1f2dbd8
nuface-1.0.5.tar.gz
Posted Jun 15, 2006
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

Changes: Various minor updates.
tags | tool, web, firewall, protocol
systems | unix
SHA-256 | c7083d6cfdb2e69e1ec2f9d7f9e58c1569ae9914f576f5bce1d6f43d88a386b2
vr-10.0j.tar.gz
Posted Jun 15, 2006
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: IP location database update.
systems | unix
SHA-256 | d6dfd32e39ce1cefb7229c255e35d27d6796c93088bb2e6f086c715a99dd4d82
Nmap Scanning Utility 4.10
Posted Jun 15, 2006
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Various bug fixes and some enhancements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 3aa1545b95977bbcda85b12cf39558809529da33f40f3f2d7d2c523e0524c892
TOR Virtual Network Tunneling Tool 0.1.1.21
Posted Jun 15, 2006
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Various bug fixes.
tags | tool, remote, local, peer2peer
SHA-256 | 3b8449c1488ef82857b42144cf919a3c6cf1aacd165065904d8e62bc9a8b4437
ntclose-deadlock-advisory.pdf
Posted Jun 15, 2006
Authored by Ruben Santamarta | Site reversemode.com

The Kernel Object Manager is prone to a deadlock situation which could be exploitable making unkillable any process running, complicating its elimination. Exploit included.

tags | exploit, kernel
SHA-256 | 17871ea1d002a3e25ba2cf1431e565ed676c7752e14f1d0fb9ed45a6c632038d
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close