exploit the possibilities
Showing 1 - 25 of 35 RSS Feed

Files Date: 2006-07-14

h00lyshit.c
Posted Jul 14, 2006
Authored by Joanna R.

Linux 2.6 up to and including 2.6.17.4 is vulnerable to a race condition leading to a local root compromise if /proc is not mounted noexec. POC exploit.

tags | exploit, local, root
systems | linux
MD5 | 7fbcac2a32d7bf594af3fcd6cb1887e4
Secunia Security Advisory 20940
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in LibVNCServer, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 66ed700b8fa832b2063e49d9208e41d2
Secunia Security Advisory 21004
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Consumer Banking Solution.

tags | advisory
MD5 | e1baad9bde7e78e1846083891805a9b2
Secunia Security Advisory 21035
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued updates for their kernel. These fix some vulnerabilities, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions or gain knowledge of potentially sensitive information or by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
MD5 | e75a6a668035e12d2d0c6188139f1c5b
Secunia Security Advisory 21037
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - eEye Digital Security has reported a vulnerability in McAfee ePolicy Orchestrator, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 9a346e41c99a7014bb9f8fbf98b88ed5
Secunia Security Advisory 21038
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SHiKaA has discovered a vulnerability in CzarNews, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system.

tags | advisory
MD5 | a6bd90974b7581c4f60fdfe91d4f66d0
Secunia Security Advisory 21040
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft PowerPoint, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 7ed5746dc4f6b89b0720e2784e3f921c
Secunia Security Advisory 21042
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - F-Secure has acknowledged a vulnerability in F-Secure Messaging Security Gateway, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 5cda93a6c6c2f52abfac367824178393
Secunia Security Advisory 21043
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Phorum, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and potentially compromise a vulnerable system.

tags | advisory, vulnerability, xss
MD5 | 0cee832bea77ded19469cdf42aa2e5cc
Secunia Security Advisory 21044
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - endeneu has reported a vulnerability in the perForms Mambo / Joomla component, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 016cf64554eaadd58124159fa7422ef6
Secunia Security Advisory 21047
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Solaris, which may be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
MD5 | 3f582732433671d3cb4c1e7f6458a64a
Secunia Security Advisory 21048
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
MD5 | 07ab46e1c040a4825baf3aa8456e1f63
Secunia Security Advisory 21050
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for php. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to bypass certain security restrictions or by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, local, php, vulnerability
systems | linux, mandriva
MD5 | 6aafbb1d926940c90aa54c546d7e1165
Secunia Security Advisory 21051
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in FlatNuke, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | 4da50d4e5c456136ef005ec0238949cb
Secunia Security Advisory 21052
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luny has reported some vulnerabilities in OrbitMATRIX, which may be exploited by malicious people to conduct cross-site scripting or SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | d0c4fa99a4947cd2c4f20902d66715c4
Secunia Security Advisory 21053
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ahmad Maulana has discovered a vulnerability in the com_hashcash component for Joomla, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 30940c1abd1ddc9949d3147f5df96667
Secunia Security Advisory 21054
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luny has reported a vulnerability in Photocycle, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fcb701dfa22766eba97df1e024e4beb0
Secunia Security Advisory 21055
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ahmad Maulana has discovered a vulnerability in the SiteMap component for Mambo, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 05ad2979aee3bae1b35a13a82c750c53
Secunia Security Advisory 21056
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MazaGi has reported some vulnerabilities in BosClassifieds Classified Ads System, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 3834e95709d5786386c4c61fe3e92f5d
Secunia Security Advisory 21059
Posted Jul 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Joomlaboard component for Joomla, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | e3706b829beb5cc7dcafdc3116d9c2c3
snortsms-1.3.2.tar.gz
Posted Jul 14, 2006
Authored by SmithJ108 | Site snortsms.servangle.net

SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.

Changes: Major rewrite of several areas. Several database changes have occurred. Various other fixes and enhancements.
tags | tool, web, sniffer
MD5 | 3ba07feefb1ff97cb59cf8dc1dab623f
multiadm-1.0.6.tar.bz2
Posted Jul 14, 2006
Authored by Jan Engelhardt | Site alphagate.hopto.org

The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.

Changes: Rediffed for linux-2.6.18-rc1.
tags | kernel, root
systems | linux
MD5 | c9405ed6a85cdf6ad4aa599009a27c7c
linux_prctl_lkm.tar.gz
Posted Jul 14, 2006
Authored by Abhisek Datta

LKM based hotfix for the sys_prctl vulnerability in the Linux kernel 2.6 series.

tags | kernel
systems | linux
MD5 | 2e039971746b8348038ae3234bbd9337
prctl.sh.txt
Posted Jul 14, 2006
Authored by Sunix

Local root exploit for the linux kernel PRCTL core dump handling vulnerability. Affected kernel versions greater than or equal to 2.6.13 and below version 2.6.17.4. Tested by author on 2.6.9-22.ELsmp.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2006-2451
MD5 | 66375768233b6a02a248078184388cd5
perForms-1.0.txt
Posted Jul 14, 2006
Authored by endeneu

perForms versions 1.0 and prior suffer from a remote file inclusion vulnerability.

tags | advisory, remote, file inclusion
MD5 | cbe9ad20b5e81447b3ce61f3198ef67d
Page 1 of 2
Back12Next

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    15 Files
  • 4
    Jun 4th
    25 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close