exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files Date: 2006-11-13

Secunia Security Advisory 22793
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Laurent Gaffi

tags | advisory, vulnerability, sql injection
SHA-256 | f6ef1656bcb3335ba85cafb9932052ed889992ff409d6deb6e63874773dadd34
Secunia Security Advisory 22743
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Tru64, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | fc0978bd5dfb0de9d690ed73e0a68856c678df2d2c33aadb3bb71b80dc28e140
reboot-kk.c
Posted Nov 13, 2006
Authored by Kris Katterjohn

20 byte Linux/x86 shellcode that reboots the system.

tags | x86, shellcode
systems | linux
SHA-256 | 94f1faff10f9bedfe3cd5057c2bfe06d3ec14d006792926f227319b5f5e08e52
modsecips.html
Posted Nov 13, 2006
Authored by Jesus Oquendo | Site infiltrated.net

Securing LAMP - A whitepaper that discusses a methodology to configure, test, and run a Secure LAMP environment.

tags | paper
SHA-256 | 0a73c4ff31794a44f95f44d0961f1120c44546bc0cf54caca727cf680291cce0
Zero Day Initiative Advisory 06-039
Posted Nov 13, 2006
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Marshal MailMarshal (formerly of NetIQ). Authentication is not required to exploit this vulnerability. The specific flaw exists within the extraction and scanning of ARJ compressed attachments. Due to incorrect sandboxing of extracted filenames that contain directory traversal modifiers such as "../", an attacker can cause an executable to be created in an arbitrary location. Affected are MailMarshal SMTP 5.x, 6.x, and 2006 and MailMarshal for Exchange 5.x.

tags | advisory, remote, arbitrary
advisories | CVE-2006-5487
SHA-256 | 96fb3659a81e9afceb913739fbac7b19661a909a3df69a48bb514072d63a0f23
Gentoo Linux Security Advisory 200611-5
Posted Nov 13, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-05 - Paul Szabo reported that an incorrect seteuid() call after the chdir() function can allow an attacker to access a normally forbidden directory, in some very particular circumstances, for example when the NFS-hosted targeted directory is not reachable by the client-side root user. Additionally, some potentially exploitable unchecked setuid() calls were also fixed. Versions less than 0.17-r4 are affected.

tags | advisory, root
systems | linux, gentoo
SHA-256 | f3c4ec227e937ca7d1a7514d3394bd1a6aa5ea9e3dbf07284e41f8873b096c80
OpenPKG Security Advisory 2006.33
Posted Nov 13, 2006
Authored by OpenPKG Foundation | Site openpkg.org

OpenPKG Security Advisory OpenPKG-SA-2006.033 - Evgeny Legerov discovered a vendor-confirmed denial of service vulnerability in OpenLDAP. The vulnerability allows remote attackers to cause a DoS via a certain combination of LDAP "Bind" requests that trigger an assertion failure in "libldap". The flaw is caused by incorrectly computing the length of a normalized name.

tags | advisory, remote, denial of service
advisories | CVE-2006-5779
SHA-256 | f298e21b67c62cc61561c562fe81bcf25b76c0493617dca53ced2a579adadcbd
Netragard Security Advisory 2006-08-10
Posted Nov 13, 2006
Authored by Netragard | Site netragard.com

Netragard, L.L.C Advisory NETRAGARD-20060810 - libpthread suffers from a buffer overflow vulnerability which may enable an attacker to execute arbitrary commands on the system. This vulnerability may potentially be exploited by a creating a specially crafted buffer and inserting it into the PTHREAD_CONFIG variable. Version 5.1b is affected.

tags | advisory, overflow, arbitrary
SHA-256 | 987de219a762a82acd64d995906ea3a9208ed3a544ba195b808c097d325cf8e8
Mandriva Linux Security Advisory 2006.206
Posted Nov 13, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-206 - A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Thunderbird program, version 1.5.0.8.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2006-5462, CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748
SHA-256 | 825c6e50331e1bfa5698e1caa8d1a798090692b4e9fd5286767921aa79184f8b
Mandriva Linux Security Advisory 2006.205
Posted Nov 13, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-205 - A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox program, version 1.5.0.8.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2006-5462, CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748
SHA-256 | bfbc7f9917c3d4bb2a2ac822cf3f34102b6d5c00d02f7ba49fa4e9251b714cdd
Gentoo Linux Security Advisory 200611-4
Posted Nov 13, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-04 - Bugzilla is vulnerable to cross-site scripting, script injection, and request forgery. Versions less than 2.18.6 are affected.

tags | advisory, xss
systems | linux, gentoo
SHA-256 | 4b0fecd0208c38704fc573e5a4bd0fda12683230bc38650becd1d00172337690
wheatblogXSS.txt
Posted Nov 13, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Wheatblog suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 992190041a3ceba8a6f33eb07dde7d3f00c201418b022cf53cd33a679bf10bcd
Ubuntu Security Notice 379-1
Posted Nov 13, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 379-1 - Miloslav Trmac discovered a buffer overflow in texinfo's index processor. If a user is tricked into processing a .texi file with texindex, this could lead to arbitrary code execution with user privileges.

tags | advisory, overflow, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2006-4810
SHA-256 | 1e789714fd59aa9ed0be597252639e409cce1d9171c9b62c772e7bc500a8cfda
landshop.txt
Posted Nov 13, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

The LandShop Real Estate software suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 64dd74bfd46cd3d25e8e2421db6e16cb3b55ffa4cfa4f2b985e87b4510cd3dcc
Debian Linux Security Advisory 1207-1
Posted Nov 13, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1207-1 - Several remote vulnerabilities have been discovered in phpMyAdmin that allow for everything from CRLF injection to cross site scripting.

tags | advisory, remote, vulnerability, xss
systems | linux, debian
advisories | CVE-2006-1678, CVE-2006-2418, CVE-2005-3621, CVE-2005-3665, CVE-2006-5116
SHA-256 | ada8e0398cb473593cabaec5b5fc2e29190d0cbce81de3ed54c4b75b5bf4ff51
Zero Day Initiative Advisory 06-038
Posted Nov 13, 2006
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows attackers to execute arbitrary code on vulnerable installations of Citrix MetaFrame Presentation Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the routine IMA_SECURE_DecryptData1() defined in ImaSystem.dll and is reachable through the Independent Management Architecture (IMA) service (ImaSrv.exe) that listens on TCP port 2512 or 2513. The encryption scheme used is reversible and relies on several 32-bit fields indicating the size of the packet and the offsets to the authentication strings. During the decryption of authentication data an attacker can specify invalid sizes that result in an exploitable heap corruption.

tags | advisory, arbitrary, tcp
advisories | CVE-2006-5821
SHA-256 | 85f81d263737b72b51ceb60707eb84886803fabd9d979123dee1461b13db004f
iDEFENSE Security Advisory 2006-11-08.3
Posted Nov 13, 2006
Authored by iDefense Labs, Eric DETOISIEN | Site idefense.com

iDefense Security Advisory 11.08.06 - Remote exploitation of an input validation error in Citrix Systems Inc.'s Metaframe Presentation Server 4.0 IMA service may allow an attacker to cause a denial of service (DoS) condition. The IMA (Independent Management Architecture) server component Citrix's Presentation Server (previously known as Metaframe) contains an input validation error in the handling of certain packet types. By constructing a specific packet, it is possible to cause the service to reference an unmapped memory address. This causes an unhandled exception, which in turn causes the service to exit, resulting in a DoS condition. This vulnerability has been confirmed to affect Citrix Presentation Server 4.0. Previous versions may also be affected.

tags | advisory, remote, denial of service
SHA-256 | 6cbb80e9d1121039d25d51965a6e8224a96c1c5c2f11e6ae1accdb5784cfc172
bitweaver131.txt
Posted Nov 13, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Bitweaver versions 1.3.1 and below suffer from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 5be0fc23df07e33436c07f4cf8c318d0751177af831fac85d50fe817de6c8820
gnugv362.txt
Posted Nov 13, 2006
Authored by Renaud Lifchitz

GNU gv version 3.6.2 is susceptible to a remote stack overflow vulnerability. This issue exists because the application fails to perform proper boundary checks before copying user-supplied data into process buffers.

tags | exploit, remote, overflow
SHA-256 | f79e70f699933fa7558eb05a1eef26d630ad090d7eea37ea2ad8585c935bec02
Secunia Security Advisory 22816
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Paul Szabo has reported some vulnerabilities in the Linux NetKit FTP Server, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, or perform certain actions with escalated privileges.

tags | advisory, local, vulnerability
systems | linux
SHA-256 | 9a3f9b22233f261f0e876ce7c070c84870423044f1f1c5643759d37c68a910c7
Secunia Security Advisory 22699
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Novell BorderManager, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or bypass certain security restrictions via replay attacks.

tags | advisory, denial of service
SHA-256 | 93120ccb56e637aa8260ef45d54f89b0048155eb703f5d879e78d273f7318700
Secunia Security Advisory 22711
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various Juniper products, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | juniper
SHA-256 | 81ba8675868f11fecc4cf4eb82c4c06ed3a44c85cf369a9164165f0283650786
Secunia Security Advisory 22716
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Vieira-Kurz has reported some vulnerabilities in xenis.creator, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | a435b04da8358d87208658cdf1fe2263a637d6e1ff0d98fd6f8d55572344f179
Secunia Security Advisory 22776
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service)

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | c3c1331fd69188880786c74fb3a24f2c3427dbc92de9176d6593814a15f12afa
Secunia Security Advisory 22805
Posted Nov 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0ut3r has discovered some vulnerabilities in ContentNow, which can be exploited by malicious people to disclose certain sensitive information, perform certain actions with escalated privileges, or to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | dd6bfa78f65410e9e082103700676780d0241498ec9059bcaa3ef33367096430
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close