exploit the possibilities
Showing 1 - 25 of 149 RSS Feed

Files Date: 2006-08-17

Debian Linux Security Advisory 1142-1
Posted Aug 17, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1142-1 - Luigi Auriemma discovered missing boundary checks in freeciv, a clone of the well known Civilization game, which can be exploited by remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2006-3913
MD5 | 291f48d2b008d9992b65551ab6fc692c
Gentoo Linux Security Advisory 200608-6
Posted Aug 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-06 - Courier MTA has fixed a security issue relating to usernames containing the = character, causing high CPU utilization. Versions less than 0.53.2 are affected.

tags | advisory
systems | linux, gentoo
MD5 | 7fb0b52e9b717b4447b4aacf54710c16
Gentoo Linux Security Advisory 200608-5
Posted Aug 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-05 - LibVNCServer fails to properly validate protocol types effectively letting users decide what protocol to use, such as Type 1 - None. LibVNCServer will accept this security type, even if it is not offered by the server. Versions less than 0.8.2 are affected.

tags | advisory, protocol
systems | linux, gentoo
MD5 | 662e3e9ab748c3420baefd516d1fbc67
Debian Linux Security Advisory 1141-1
Posted Aug 17, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1141-1 - Evgeny Legerov discovered that overly large comments can crash gnupg, the GNU privacy guard.

tags | advisory
systems | linux, debian
advisories | CVE-2006-3746
MD5 | 00d390b185e3b3aab07fdbfecf595f61
adv07-chaoscount.txt
Posted Aug 17, 2006
Authored by Tamriel

CounterChaos versions 0.48c and below suffer from a SQL injection vulnerability.

tags | advisory, sql injection
MD5 | 2533d87d831531572d45c45c6f586087
adv06-chaosgb.txt
Posted Aug 17, 2006
Authored by Tamriel

GaesteChaos versions 0.2 and below suffer from SQL injection and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, sql injection
MD5 | 212e3fe99d5b78073086556f5b6bb59f
adv08-chaosgh.txt
Posted Aug 17, 2006
Authored by Tamriel

GeheimChaos versions 0.5 and below suffer from multiple SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
MD5 | 41da18e9c1f9e6482333aa3b7e45959d
StMichael_LKM-0.13-k2.6.tar.gz
Posted Aug 17, 2006
Authored by Rodrigo Rubira Branco | Site sourceforge.net

StMichael is a LKM that attempts to provide a level of protection against kernel-module rootkits. StMichael is designed to be loaded early in the system boot process, and is intended to be present and running on its host system prior to the introduction of malicious kernel modules. StMichael provides this protection by monitoring various portions of the kernel, and optionally the entire kernel text itself, for modifications that may indicate the presence of a malicious kernel module. If rootkit-like activity is detected, StMichael will attempt to recover the kernel's integrity by rolling back the changes made to a previously known-good state.

Changes: Special 2.6 release for Defcon. Intended for developers who want to help improve the project but no longer care to work on the 2.4 kernel related release.
tags | kernel
systems | linux
MD5 | 44ecd426b3f7a5cb9de7cda5bb696bce
StMichael_LKM-0.13.tar.gz
Posted Aug 17, 2006
Authored by Rodrigo Rubira Branco | Site sourceforge.net

StMichael is a LKM that attempts to provide a level of protection against kernel-module rootkits. StMichael is designed to be loaded early in the system boot process, and is intended to be present and running on its host system prior to the introduction of malicious kernel modules. StMichael provides this protection by monitoring various portions of the kernel, and optionally the entire kernel text itself, for modifications that may indicate the presence of a malicious kernel module. If rootkit-like activity is detected, StMichael will attempt to recover the kernel's integrity by rolling back the changes made to a previously known-good state.

Changes: Last release under the 2.4 kernel series. Only bug fixes will be made after this point.
tags | kernel
systems | linux
MD5 | b6a8b2beb27ce81cd202593b35c71df7
Gentoo Linux Security Advisory 200608-4
Posted Aug 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-04 - The Mozilla Foundation has reported numerous security vulnerabilities related to Mozilla Thunderbird. Versions less than 1.5.0.5 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 1b426d46dd37c36117b4522e946d22e7
zonex103.txt
Posted Aug 17, 2006
Authored by XORON

ZoneX version 1.0.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 11a51bc61720c5a66ecbc6b59938412a
Gentoo Linux Security Advisory 200608-3
Posted Aug 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-03 - The Mozilla Foundation has reported numerous security vulnerabilities related to Mozilla Firefox. Versions less than 1.5.0.5 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | a1b52bdc95fdd950006e489bfd251dcd
HP Security Bulletin 2005-10.24
Posted Aug 17, 2006
Authored by Hewlett Packard, HP | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified in the Xserver running on HP-UX. The vulnerability could be exploited by a local user to execute arbitrary code with the privileges of the Xserver.

tags | advisory, arbitrary, local
systems | hpux
advisories | CVE-2005-2495
MD5 | 176289b5876730f19b9e82923e3d6466
MEDS13.txt
Posted Aug 17, 2006
Authored by Philipp Niedziela

ME Download System version 1.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 3e2344cc0facc392f360190dbba59bc3
Gentoo Linux Security Advisory 200608-2
Posted Aug 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-02 - The Mozilla Foundation has reported numerous security vulnerabilities related to Mozilla SeaMonkey. Versions less than 1.0.3 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 28cbf2af6b70fdb2ee247e7ad0befd42
Debian Linux Security Advisory 1140-1
Posted Aug 17, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1140-1 - Evgeny Legerov discovered that overly large comments can crash gnupg.

tags | advisory
systems | linux, debian
advisories | CVE-2006-3746
MD5 | 891b77c9face00b999bcfcca482d1aff
Debian Linux Security Advisory 1139-1
Posted Aug 17, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1139-1 - It was discovered that the interpreter for the Ruby language does not properly maintain "safe levels" for aliasing, directory accesses and regular expressions, which might lead to a bypass of security restrictions.

tags | advisory, ruby
systems | linux, debian
advisories | CVE-2006-3694
MD5 | 10060bee5ea1505e531710d0081f01f9
BlogCMS.txt
Posted Aug 17, 2006
Authored by Drago84

Blog:CMS versions 4.1.0 and below suffer from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
MD5 | 3c9c7ca4bfa05ac4b95fc5056e1cb058
DRUPAL-SA-2006-011.txt
Posted Aug 17, 2006
Authored by Uwe Hermann | Site drupal.org

Drupal security advisory DRUPAL-SA-2006-011: A malicious user can execute a cross site scripting attack by enticing someone to visit a Drupal site via a specially crafted link. Versions 4.6 and 4.7 are affected.

tags | advisory, xss
MD5 | 63da241f456cfc9b75e2ca8325df4bbe
solpot-adv-04.txt
Posted Aug 17, 2006
Authored by Solpot | Site solpotcrew.org

modernbill version 1.6 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | c22b29bcfa687e711824c1bd92121af4
major_rls27.txt
Posted Aug 17, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Toenda CMS versions 1.0.3 stable and below and version 1.1 suffer from a cross site scripting flaw.

tags | advisory, xss
MD5 | 3fa276ed1a5dd003b3fe74fc1ab1330e
pswd-brute.txt
Posted Aug 17, 2006
Authored by Gianstefano Monni

Brute forcing utility for pswd.js, a common client-side authentication program.

tags | cracker
MD5 | 111cef95f28910e441ee4929bcef7494
sendcard_340_xpl.txt
Posted Aug 17, 2006
Authored by rgod | Site retrogod.altervista.org

SendCard version 3.4.0 and below unauthorized administrative access and remote command execution exploit.

tags | exploit, remote
MD5 | 852dd392e9403399436b28dda514bada
Ubuntu Security Notice 332-1
Posted Aug 17, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-332-1 - Evgeny Legerov discovered that gnupg did not sufficiently check the validity of the comment and a control field. Specially crafted GPG data could cause a buffer overflow. This could be exploited to execute arbitrary code with the user's privileges if an attacker can trick an user into processing a malicious encrypted/signed document with gnupg.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2006-3746
MD5 | c9718c74eef0f3798e83eca5f4f6b414
Ubuntu Security Notice 331-1
Posted Aug 17, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-331-1 - A Denial of service vulnerability was reported in iptables' SCTP conntrack module. On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash. A buffer overflow has been discovered in the dvd_read_bca() function. By inserting a specially crafted DVD, USB stick, or similar automatically mounted removable device, a local user could crash the machine or potentially even execute arbitrary code with full root privileges. The ftdi_sio driver for serial USB ports did not limit the amount of pending data to be written. A local user could exploit this to drain all available kernel memory and thus render the system unusable.

tags | advisory, remote, denial of service, overflow, arbitrary, kernel, local, root
systems | linux, ubuntu
advisories | CVE-2006-2934, CVE-2006-2935, CVE-2006-2936
MD5 | cff17b362b4332dec33ae3c99169ad8c
Page 1 of 6
Back12345Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close