what you don't know can hurt you
Showing 1 - 25 of 65 RSS Feed

Files Date: 2006-06-15

Secunia Security Advisory 15779
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sendmail, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | d85a02cfa2295e708eef8b3fbef6fc29
Secunia Security Advisory 20576
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in Adobe Reader.

tags | advisory, vulnerability
MD5 | 17fb0db51755e9963ea5bcf695fe3891
Secunia Security Advisory 20656
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - spykids has discovered some vulnerabilities in PictureDis products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | f968e2e7e1e30940e6951b65df08ffd1
Secunia Security Advisory 20658
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
MD5 | d4ed92d2000fb625b4e02d21aa255191
Secunia Security Advisory 20661
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Horde, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | d992a9c4c3ddb6fdb5b51529320f612b
Secunia Security Advisory 20665
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in wvWare wv2 Library, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
MD5 | b227837318d333ade819896a0d61896c
Secunia Security Advisory 20669
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for DokuWiki. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 282f2f53ab038895191eb4afcf97ced4
Secunia Security Advisory 20672
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, debian
MD5 | 41825a959320a521108920e285207187
Secunia Security Advisory 20675
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in sendmail, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 34ac6e45b52d2887af8f0b1be8ca2044
Secunia Security Advisory 20676
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for php. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

tags | advisory, denial of service, php, vulnerability
systems | linux, suse
MD5 | d71023901afe73bd80dabd079123db6a
Secunia Security Advisory 20687
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - RedTeam has reported a vulnerability in phpBannerExchange, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | ecadbdfc3c94c495c8c5b90e6ddb7a47
Secunia Security Advisory 20688
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
MD5 | ed8c8cafb0bdf91413e022945ddd4a62
Secunia Security Advisory 20689
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, ubuntu
MD5 | 86b90302ef475ab3c7cd4e1a55fdbdac
secunia-zipinfo.txt
Posted Jun 15, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in PicoZip version 4.01, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "zipinfo.dll" info tip shell extension when reading a ACE, RAR, or ZIP archive that contains a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when the user moves the mouse cursor over a malicious archive either in Windows Explorer or from any program that uses the file-open dialog box. Successful exploitation allows arbitrary code execution.

tags | advisory, overflow, arbitrary, shell, code execution
systems | windows
advisories | CVE-2006-2909
MD5 | bea72ef5b0f040b96557a8b38bfddea9
SEC-20060613-0.txt
Posted Jun 15, 2006
Authored by D. Fabian, T. Kerbl | Site sec-consult.com

SEC-CONSULT Security Advisory 20060613-0 - Microsoft Outlook Web Access is vulnerable to an HTML code injection/cross site scripting attack. A malicious user could craft a mail containing HTML and Javascript code. Such code could be used to steal session information from the victims cookies, and thus enable the attacker to get access to the victim's emails. Vulnerable versions are Exchange 2000 (SP3), 2003 (SP1), 2003 (SP2).

tags | advisory, web, javascript, xss
MD5 | 7f38fada882239ce16eb4a77004df1f7
wbb216.txt
Posted Jun 15, 2006
Authored by CrAzY CrAcKeR | Site alshmokh.com

WBB version 2.1.6 is susceptible to a SQL injection flaw in profile.php.

tags | exploit, php, sql injection
MD5 | 357006e896d4383849d5fba5fceef394
wbb221.txt
Posted Jun 15, 2006
Authored by CrAzY CrAcKeR | Site alshmokh.com

WBB version 2.2.1 is susceptible to a SQL injection flaw in studienplatztausch.php.

tags | exploit, php, sql injection
MD5 | 5f3aa1b8a88496256eae92197163c4bd
wbb222.txt
Posted Jun 15, 2006
Authored by CrAzY CrAcKeR | Site alshmokh.com

WBB version 2.2.2 is susceptible to a SQL injection flaw in thread.php.

tags | exploit, php, sql injection
MD5 | 6feb89c39e99cbde70401c712fa71f77
bbrss.txt
Posted Jun 15, 2006
Authored by SpC-x

bbrss PHPBB is susceptible to a remote file inclusion flaw.

tags | exploit, remote, file inclusion
MD5 | e623953f9e886e6703e1b1dd8f54a64a
Samhain File Integrity Checker
Posted Jun 15, 2006
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | b54983526aac9191fb195b6aad26e675
nuface-1.0.5.tar.gz
Posted Jun 15, 2006
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

Changes: Various minor updates.
tags | tool, web, firewall, protocol
systems | unix
MD5 | 8194b8e306a39b6ac951e1da2c086138
vr-10.0j.tar.gz
Posted Jun 15, 2006
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: IP location database update.
systems | unix
MD5 | a163b4d715332ec988af482bd2080118
Nmap Scanning Utility 4.10
Posted Jun 15, 2006
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Various bug fixes and some enhancements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 012088245a014ca43841ac67601678d9
TOR Virtual Network Tunneling Tool 0.1.1.21
Posted Jun 15, 2006
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Various bug fixes.
tags | tool, remote, local, peer2peer
MD5 | 7eea8dbb215d771d275fb42a06f38e76
ntclose-deadlock-advisory.pdf
Posted Jun 15, 2006
Authored by Ruben Santamarta | Site reversemode.com

The Kernel Object Manager is prone to a deadlock situation which could be exploitable making unkillable any process running, complicating its elimination. Exploit included.

tags | exploit, kernel
MD5 | 00507127367926ea623d482e104dab9c
Page 1 of 3
Back123Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    22 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    2 Files
  • 23
    Jun 23rd
    1 Files
  • 24
    Jun 24th
    23 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close