what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2006-10-16

Secunia Security Advisory 22389
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SHiKaA has discovered a vulnerability in Def-Blog, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 3610ba723aaa56fc22b72ec0bcd63f335c47703d2c00fd91b11b697f05c8a968
Secunia Security Advisory 22363
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mdX has reported some vulnerabilities in AFGB Guestbook, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 76e960355bbe410f7e07a5a94e9b931afc9c261394efa4620b3cab0950caf5f2
Secunia Security Advisory 22370
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Clam AntiVirus, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | c574affe21f461686e83a4d0b4d8b5a39781f561bb281567f451567e956de1f4
Secunia Security Advisory 22384
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Steven Roddis has discovered a vulnerability in TorrentFlux, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | e93c05a9f05797b3745ea7f198756de439cd9c47db066e07940f82ff2fb69ce0
Secunia Security Advisory 22391
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, gentoo
SHA-256 | 0eb393fc98b25c296d672e6a14068010d6e9774b046b32ee529116a1fe73f9f2
Secunia Security Advisory 22395
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Esser has reported a vulnerability in ViewVC, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | c53bfc5a40f7349ac313b71706fafa06365ab5d8e2f0eb74e19b9ecaa670eb5c
Secunia Security Advisory 22403
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kw3rLn has reported a vulnerability in NuralStorm Webmail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 774bd99a3b6e7880000ab7fb11c60a589fc96966106d753ae004d79d812a6e90
Secunia Security Advisory 22409
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Bugzilla, which can be exploited by malicious people or malicious users to disclose potentially sensitive information, conduct cross-site scripting, script insertion, and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | 24aaead18c89fb1addcf0ec22fab40f86745397e385817e6c6f862c540335f47
Secunia Security Advisory 22411
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - k1tk4t has reported a vulnerability in phpMyConference, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6027c434ff56f23c1857a1cab97b31487acc54ae9e286bf314e0ae6db79f31b2
Secunia Security Advisory 22412
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - k1tk4t has reported a vulnerability in Open Conference Systems, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c75415ef1b5b5c4e2f8447bcf14caaf48b8558303483574df1071b43d43cb7b6
Secunia Security Advisory 22417
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some vulnerabilities in the Linux Kernel included in various Avaya products, which can be exploited by malicious, local users to bypass certain security restrictions, gain knowledge of potentially sensitive information, or cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions or cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
SHA-256 | 2cc37f264449d8a6a81c2a17dc948439b7a944583b536b2ee8b61107bee5e5c6
Secunia Security Advisory 22420
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kacper has reported a vulnerability in IncCMS Core, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | bf2777d7f27edbd8137be50aec8438b539605e83154536b5f64e12c62ffc76a9
Secunia Security Advisory 22425
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS/IR, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 680fc111b87ea50ec8c032778d691d3f99ea66c8d811c7c67ea8d46018c25ce9
Secunia Security Advisory 22435
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some vulnerabilities in gzip included in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 85102dedb1f9aecb5143a5304934318b1445618fdaa65a49bd1a1800bf7a1242
Secunia Security Advisory 22458
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the mod_tcl module for Apache HTTP server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, web, vulnerability
SHA-256 | a2a758b0473904a22d0f5064894488a97c494180653a3ff69653df09b689ce8f
Secunia Security Advisory 22460
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun Microsystems has acknowledged some vulnerabilities in Sun Grid Engine, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 3d5eb11bc9ac5d2fd7688a8dcefc7fcf4abfd93532267f86bdfddb70bb8f43c9
Secunia Security Advisory 22463
Posted Oct 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in various Fuji Xerox DocuPrint printers, which can be exploited by malicious people to bypass certain security restrictions or to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 67a2a6c5bc531a868d19574b77c0342e160edb0b139d15bfbcae0e383cdc1b7a
torutils.tar.gz
Posted Oct 16, 2006
Authored by Andrew Christensen | Site fortconsult.net

Perl and bash scripts to enable easy manipulation of Tor traffic exiting through your Tor node. Uses Linux iptables QUEUE target to dump Tor exit traffic into a processing script, which modifies the packet with a web-bug, then re-injects it onto the wire again.

tags | tool, web, perl, bash, peer2peer
systems | linux
SHA-256 | e264ded751e5361a5dd4ab1ab99f84c92f40fbc9acd30e7fdf0c7d4b072d2379
Practical_Onion_Hacking.pdf
Posted Oct 16, 2006
Authored by Andrew Christensen | Site fortconsult.net

Paper describing simple means of finding the true address of Tor clients, if they are browsing an HTTP (non-encrypted) website and exit through an exit node which you control. Presents technique for using iptables to inject Javascript, Flash, into web traffic to persuade the client to temporarily bypass the Tor network.

tags | advisory, web, javascript
SHA-256 | 477c69883b11c9ea4888422b2968acc602e150bee30795b919f37527a85f5de8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close