what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 54 RSS Feed

Files Date: 2006-10-24

Secunia Security Advisory 22499
Posted Oct 24, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Fully Modded phpBB, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 3596addda7557b3d0d67f248a793a7ff6a338f18998630ba1f88317f658bc409
Secunia Security Advisory 22544
Posted Oct 24, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | f649989782244b9dfb4f7dc9c70578cb3390e738c01140488cef120c2e96e9c7
Secunia Security Advisory 22556
Posted Oct 24, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for webmin. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, xss
systems | linux, debian
SHA-256 | a50050cb38652d08b3c2c7d204893d30fdb4eefd3da5b6b77ef5d4954479fb4c
PHPNuke-7.9.txt
Posted Oct 24, 2006
Authored by Paisterist | Site neosecurityteam.net

[N]eo [S]ecurity [T]eam [NST] - Advisory 27 - 2006-10-22: PHP Nuke versions 7.9 and prior SQL injection advisory and POC exploit.

tags | exploit, php, sql injection
SHA-256 | a631273d526ba8d6c2ae44d86a8c12f330573ca9b1138f7cb7d8703b4a0c47a2
NetDNS0.3.txt
Posted Oct 24, 2006
Authored by Drago84

Net_DNS 0.03 suffers from a remote file inclusion vulnerability in RR.php.

tags | exploit, remote, php, file inclusion
SHA-256 | a68f4af95871d7eb7eb71ffecfb4342c18e4ce5b8fc5f1850979d8022f55e107
SPIP-Agora_1-4-RC1.txt
Posted Oct 24, 2006
Authored by Drago84

SPIP-Agora_1-4-RC1 has a remote file inclusion bug in Wiki.php

tags | exploit, remote, php, file inclusion
SHA-256 | 5a1944ab466c49e00b7b440fe7786ba65e3e77318ae60736ba1b1ffb8c614e0f
Mdweb132-postgres.txt
Posted Oct 24, 2006
Authored by Drago84

Mdweb132-postgres suffers from several remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | cc8e4b28c64ef3b305824e64dce7fa0927e297e9c1b4d2b240c80de62fd3ce7d
Jaws0.5.2.txt
Posted Oct 24, 2006
Authored by Drago84

Jaws 0.5.2 and prior suffer from a remote file inclusion vulnerability in JawsDB.php.

tags | exploit, remote, php, file inclusion
SHA-256 | d062f8f66c74392bb5f0449059289aa0e530d8c5cb49dcb7b1d0b02a4dede544
Derdirigent.txt
Posted Oct 24, 2006
Authored by Drago84

Der dirigent suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | 41f533ef1327952b720417045a882b920b2d42b5e89b06bf4d996e5d1d980e22
Boum.txt
Posted Oct 24, 2006
Authored by Drago84

Boum suffers from a remote file inclusion vulnerability in utilitaires.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 04fcf979f32f5b265bbc38cf9da21c8d320b94638682849147cc6f2725f584c6
beautifier.txt
Posted Oct 24, 2006
Authored by Drago84

beautifier suffers from a remote file inclusion vulnerability in HFile_xhtml11.php.

tags | exploit, remote, php, file inclusion
SHA-256 | a5fe23ea2ac8d79b3afbf33b64d069525754bd112402435e4d7b824edde275dc
back-end0.7.2.1.txt
Posted Oct 24, 2006
Authored by Drago84

back-end 0.7.2.1 and prior suffer from a remote file inclusion vulnerability in jpcache.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 79747adc6202364a7bd0987684d6571e33e0ed1dc3cffb2d840749e1a7a991eb
Secunia Security Advisory 22426
Posted Oct 24, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - FREAK_PR has discovered a vulnerability in RMSOFT Gallery System, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 7a578a80668f50adaf5bf292a96156bcc1761e31edbb9bd6eadbca38280ef156
Secunia Security Advisory 22508
Posted Oct 24, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kw3[R]Ln has reported a vulnerability in EPNadmin, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | d751b7fe4309345e5fd752e034ed843dd0971944482c7144e0155baad341446b
Secunia Security Advisory 22535
Posted Oct 24, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Moran Zavdi has reported a vulnerability in Simpnews, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 65698d1781b4411433c6be4f8d3e092752abe54bb684164bf557ad4d453e595f
Secunia Security Advisory 22551
Posted Oct 24, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 7e95cda21dbf0d0c2b8e29b6120c7e8d0ad66fe8e1a0c9700da987051fcdc1e7
speedberg-1.2b.txt
Posted Oct 24, 2006
Authored by k1tk4t

speedberg 1.2beta1 and prior have multiple remote file inclusion bugs.

tags | exploit, remote, file inclusion
SHA-256 | 558c9bb999ca093b381ac7e5856908164c17c2ab293c8918f86347e286bbea9d
trawler-1.8.1.txt
Posted Oct 24, 2006
Authored by k1tk4t

trawler versions 1.8.1 and prior suffer from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | 3c695298559f032d90d3389fe15ef6ee6a10a784e72212cdeb8514e70c672a9f
mood-nt.tgz
Posted Oct 24, 2006
Authored by darkangel | Site darkangel.antifork.org

Mood-NT is a linux kernel rootkit suckit2-like for 2.4.x/2.6.x kernels. It can hide processes, files, connections (unix, raw, and ipv6 too), promisc flag and it allows tty sniffing, exec redirection, exec parameters sniffing, has an internal private init script for starting whatever you want on boot. It has a lot of anti-detectors engines and a unique hiding engine hardware based (through the debug registers) that makes it completely stealth on x86 machines. If the kernel changes it automatically reinstall itself on boot.

tags | tool, x86, kernel, rootkit
systems | linux, unix
SHA-256 | b6fdbe271e20c2decd39606ddd7120a97d4342ab43b9ee7ead8e6981a659c90e
Netragard Security Advisory 2006-08-10
Posted Oct 24, 2006
Authored by Netragard | Site netragard.com

Netragard, L.L.C Advisory NETRAGARD-20060810 (UPDATE): dtmail suffers from a buffer overflow vulnerability which could result in the execution of arbitrary code. More specifically this vulnerability is triggered when using -a flag:

tags | advisory, overflow, arbitrary
SHA-256 | cb88802b1e79a6bd8af6ec797980b6a411c718a0a876e8bd52cf03e206da577d
SMF-xss.txt
Posted Oct 24, 2006
Authored by Jose Carlos Norte

Simple Machines Forum SMF suffers from a cross site scripting vulnerability in index.php.

tags | exploit, php, xss
SHA-256 | fed7bd5bff8f1c1d58b66a6ba3c5104cbeedac6164a2bdd27ab278c966845442
OneOrZero-adv.txt
Posted Oct 24, 2006
Authored by Mike Klingler | Site whitedust.net

OneOrZero Helpdesk v1.6.0 - v1.6.4 has an insecure password reset function that allows anyone to guess what the password is set to provided they know what the time of the server is. POC included.

tags | advisory
SHA-256 | 50bd7c551376b0ecee12ad9ea67a2f39a8266ad54dc574489d124ff3cb0c245a
PollCreator1.04.txt
Posted Oct 24, 2006
Authored by Mahmood_ali

PHP Poll Creator 1.04 suffers from a remote file inclusion vulnerability in poll_vote.php.

tags | exploit, remote, php, file inclusion
SHA-256 | a8a2de1af6f946864fb2109c69dca733f944f37b97a902f1b3ab3c0980696a71
HP Security Bulletin 2006-12.23
Posted Oct 24, 2006
Authored by Hewlett Packard | Site hp.com

HPSBUX02162 SSRT061223 rev.1 - HP-UX Running dtmail, Local Execution of Arbitrary Code - A potential security vulnerability has been identified with HP-UX running dtmail. The vulnerability could be exploited by a local, authorized user to execute arbitrary code as a member of the 'mail' group.

tags | advisory, arbitrary, local
systems | hpux
SHA-256 | 410c2a18434f593be738868bf942e505dda13da8883ae0d4e6bbdfe24a8ab1a3
HP Security Bulletin 2006-12.23
Posted Oct 24, 2006
Authored by Hewlett Packard | Site hp.com

HPSBTU02163 SSRT061223 rev.1 - HP Tru64 UNIX Running dtmail, Local Execution of Arbitrary Code

tags | advisory, arbitrary, local
systems | unix
SHA-256 | 410c2a18434f593be738868bf942e505dda13da8883ae0d4e6bbdfe24a8ab1a3
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close