what you don't know can hurt you
Showing 1 - 25 of 113 RSS Feed

Files Date: 2006-09-07

Secunia Security Advisory 21790
Posted Sep 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in bind, which potentially can be exploited by malicious people to cause a Denial of Service.

tags | advisory, denial of service
MD5 | fcc9d8f00b25855699028319ad9f031e
MDCrack-15.zip
Posted Sep 7, 2006
Authored by Gregory Duchemin | Site mdcrack.openwall.net

MDCrack is a free, feature filled password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multithreading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s).

tags | cracker
MD5 | a5736f935d162cadf91f57bcbab8dd7d
Mandriva Linux Security Advisory 2006.161
Posted Sep 7, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-161 - Daniel Bleichenbacher recently described an attack on PKCS #1 version 1.5 signatures where an RSA key with a small exponent used could be vulnerable to forgery of a PKCS #1 version 1.5 signature signed by that key. Any software using OpenSSL to verify X.509 certificates is potentially vulnerable to this issue, as well as any other use of PKCS #1 version 1.5, including software uses OpenSSL for SSL or TLS.

tags | advisory
systems | linux, mandriva
advisories | CVE-2006-4339
MD5 | 779e310851570485664d412935a7d63e
lotusDUNZIP32dll.txt
Posted Sep 7, 2006
Authored by Juha-Matti Laurio | Site networksecurity.fi

The IBM Lotus Notes DUNZIP32.dll suffers from a buffer overflow vulnerability. The vulnerability has been confirmed in versions Lotus Notes 5.0.10, 6.0 and 6.5.1. Other versions may also be affected. It is expected that the latest R5 build 5.0.12 build is affected too.

tags | advisory, overflow
MD5 | eb6e8ccd30441e2af9278fe031e04b93
phpopenchat30.txt
Posted Sep 7, 2006
Authored by rUnViRuS

PHPOpenChat version 3.0.x is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 786cd66bf17772f05989aa8e4b56cd39
Debian Linux Security Advisory 1170-1
Posted Sep 7, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1170-1 - It was discovered that upon unpacking JAR archives fastjar from the GNU Compiler Collection does not check the path for included files and allows to create or overwrite files in upper directories.

tags | advisory
systems | linux, debian
advisories | CVE-2006-3619
MD5 | d9d861d67f7620169b18c69788414640
wpSQL.txt
Posted Sep 7, 2006
Authored by vannovax

Wordpress version 2.0.5 suffers from path disclosure and SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
MD5 | c626c03e86f99e117cbc7cc127125734
CiscoGRE.txt
Posted Sep 7, 2006
Authored by FX | Site phenoelit.de

Phenoelit Advisory - Cisco Systems IOS contains a bug when parsing GRE packets with GRE source routing information. A specially crafter GRE packet can cause the router to reuse packet packet data from unrelated ring buffer memory. The resulting packet is reinjected in the routing queues. Tested on C3550 IOS 12.1(19).

tags | advisory
systems | cisco
MD5 | f09a97e7d16b1d3caf71b6f332a4a856
Secunia Security Advisory 21805
Posted Sep 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SHiKaA has reported a vulnerability in phpFullAnnu, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 3164d42a9903aeb2a2d67f1c4756b0e2
uhooker_v1.2.tgz
Posted Sep 7, 2006
Site oss.coresecurity.com

The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed when the hooked function is called in run-time.

Changes: Multiple bug fixes, enhancements, and features have been added.
tags | arbitrary, python
MD5 | 694b79a4fda0e478e560620f0f1e445f
Gentoo Linux Security Advisory 200609-4
Posted Sep 7, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200609-04 - Several integer overflows have been found in the PCF font parser. Versions less than 1.2.0-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
MD5 | 77e8f04823ce0bd8ab58edb844864057
Gentoo Linux Security Advisory 200609-3
Posted Sep 7, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200609-03 - OpenTTD is vulnerable to a Denial of Service attack due to a flaw in the manner the game server handles errors in command packets. Versions less than 0.4.8 are affected.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | 27abf0eddb17fa36ca8627a068635e25
Gentoo Linux Security Advisory 200609-2
Posted Sep 7, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200609-02 - Michael Gehring has found that GTetrinet fails to properly handle array indexes. Versions less than 0.7.9 are affected.

tags | advisory
systems | linux, gentoo
MD5 | a1e81f305e3cabadafbde439feec3b05
Gentoo Linux Security Advisory 200609-1
Posted Sep 7, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200609-01 - Ulf Harnhammar, from the Debian Security Audit Project, has found that Streamripper is vulnerable to multiple stack based buffer overflows caused by improper bounds checking when processing malformed HTTP headers. Versions less than 1.61.26 are affected.

tags | advisory, web, overflow
systems | linux, debian, gentoo
MD5 | 8bb04206fbb8b761ba3f7d6862810b8e
db2udb-handshake.txt
Posted Sep 7, 2006

An attacker can send a specially crafted ACCSEC command during the handshake process with the server, causing the server process to crash in the DB2 Universal Database versions 8.x.

tags | advisory
MD5 | 253f8ce11873731c88cdfcd862c1e9af
db2udb-unauth.txt
Posted Sep 7, 2006

An attacker can send a specially crafted EXCSAT command during the handshake process with the server, causing the server process to crash in the DB2 Universal Database versions 8.x.

tags | advisory
MD5 | da70d9291764aa0b92e4fa9dc9cf1476
Ubuntu Security Notice 340-1
Posted Sep 7, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-340-1 - Tavis Ormandy discovered several buffer overflows in imagemagick's Sun Raster and XCF (Gimp) image decoders. By tricking a user or automated system into processing a specially crafted image, this could be exploited to execute arbitrary code with the users' privileges.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2006-3743, CVE-2006-3744
MD5 | 6e5488de7d25c5623b523bd91b1d26f4
canonDisclose.txt
Posted Sep 7, 2006
Authored by GR

The Canon ImageRunner remote UI web interface software will reveal username and password pairs contained in address book entries when the address book is exported. Tested and verified on Canon iR C3220, iR 5020, iR9070, iR C6800, iR C6870, and iR 8500.

tags | advisory, remote, web
MD5 | 51f5d277ec198b1f10ca9d211b51459d
HP Security Bulletin 2006-12.2
Posted Sep 7, 2006
Authored by Hewlett Packard, HP | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with Apache running on HP-UX. These vulnerabilities could be exploited remotely to allow execution of arbitrary code, denial of service, or unauthorized access.

tags | advisory, denial of service, arbitrary, vulnerability
systems | hpux
advisories | CVE-2006-3747, CVE-2005-3352, CVE-2005-3357
MD5 | 7060db2e730ca644a55dcccbba488d35
forum112.txt
Posted Sep 7, 2006
Authored by Chironex Fleckeri

ZIXForum version 1.12 suffers from a SQL injection flaw due to a lack of sanitization in the RepId variable.

tags | exploit, sql injection
MD5 | c3a60be3e68d008313570f33a45ea271
annoncev.txt
Posted Sep 7, 2006
Authored by Andries Bruinsma

AnnonceV version 1.1 suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
MD5 | 93743bf3e716e720dcc8e8c0ad768f66
Secunia Security Advisory 20270
Posted Sep 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in ZipTV, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
MD5 | b72ebaa145f1a8da56714dc29a8ed62a
Secunia Security Advisory 21789
Posted Sep 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - DrEiNsTeIn has discovered a vulnerability in PhpLeague, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | caffb56f4d407204ca308746a6758546
Secunia Security Advisory 21797
Posted Sep 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gcc-3.4. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
MD5 | a80eb083457ccba3771c8cd86debc9ce
Secunia Security Advisory 21800
Posted Sep 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for gtetrinet. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
MD5 | 0d13b195f99db2caca6393d9d7eedc5f
Page 1 of 5
Back12345Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    11 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close