exploit the possibilities
Showing 1 - 25 of 35 RSS Feed

Files Date: 2006-11-27

Secunia Security Advisory 23102
Posted Nov 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bolivar has reported a vulnerability in Basic Forum, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | fcd7da2d00375d71e550f0ebbcb17cadb0061af1351c5a2babc051f3201c9359
Secunia Security Advisory 23132
Posted Nov 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions, expose sensitive information, and manipulate data.

tags | advisory, denial of service, vulnerability
systems | linux, suse
SHA-256 | 395dca194f8e14bbe83479a5b94c0a5dfd91198737956f23b8efd191a73793b9
apb-rfi.txt
Posted Nov 27, 2006
Authored by ThE-LoRd-Of-CrAcKiNg

Active PHP Bookmarks version 1.1.02 suffers from a remote file inclusion flaw in apb.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 562d5f36a0c1bd8997400a8490dc46e6ab7b2cebdb0163d553a3a8be4304e364
javacrack.pdf
Posted Nov 27, 2006
Authored by Subere

Whitepaper entitled Cracking String Encrypting in Java Obfuscated Bytecode.

tags | paper, java
SHA-256 | b3a054932b76ff48af0039a46178eecf584bc4eb5e4ead1c864b310c0394d2cb
wbblite_102_sql.html
Posted Nov 27, 2006
Authored by rgod | Site retrogod.altervista.org

Woltlab Burning Board Lite version 1.0.2 Zend_Hash_Del_Key_Or_Index / blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | e295471bd99cd36e304cd10cd62404b9cf790413f6c6c2cb855454e1081f5dae
mmgallery.txt
Posted Nov 27, 2006
Authored by Al7ejaz Hacker

mmgallery suffers from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 9071003c6c8c1532702c2c247b28c4daeac7626488b311cb717aa5891fb9d8e1
spg-xss.txt
Posted Nov 27, 2006
Authored by Al7ejaz Hacker

Simple PHP Gallery version 1.1 suffers from a cross site scripting flaw.

tags | exploit, php, xss
SHA-256 | 88944544a16e9dac6f26da14d3579629367896361d5b17fc7edc2343e17c0520
Gentoo Linux Security Advisory 200611-20
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-20 - GNU gv does not properly boundary check user-supplied data before copying it into process buffers. Versions less than 3.6.2-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | cba70d2adfa77dcfee4ffb28520f3196f74302f716f95d1c81f203f31885df44
Gentoo Linux Security Advisory 200611-19
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-19 - M. Joonas Pihlaja has reported that a boundary error exists within the ReadDCMImage() function of coders/dcm.c, causing the improper handling of DCM images. Pihlaja also reported that there are several boundary errors in the ReadPALMImage() function of coders/palm.c, similarly causing the improper handling of PALM images. Versions less than 6.3.0.5 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | eb03626dd75b41e22a1dd7f7a4714a958ea8b46bf360b20cc7dd3bc65b5c01c3
Gentoo Linux Security Advisory 200611-18
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-18 - Urs Janssen and Aleksey Salow have reported multiple buffer overflows in TIN. Additionally, the OpenPKG project has reported an allocation off-by-one flaw which can lead to a buffer overflow. Versions less than 1.8.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 54a3d42518a6830f76d715e26380c993a23bf54dd68182b9f2c763505bd6af74
katsnoop.tbz2
Posted Nov 27, 2006
Authored by Kris Katterjohn

Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.

tags | tool, web, sniffer
SHA-256 | d1f498ffeccaf405d1c5eee02b9059c9c967af99640fa813e9ef92cb76640102
NCISACIS-2007-CFP.txt
Posted Nov 27, 2006
Authored by Jeimy J. Cano

The Seventh National Computer and Information Security Conference ACIS 2006 (NCIS 2006) invites all researchers and practitioners to submit research papers in security topics.

tags | paper, conference
SHA-256 | 09c5aa8aba24e5120087a319fd1f2bb90073b2247fc71df14537ec118f6c09f4
googleInclusion.txt
Posted Nov 27, 2006
Authored by Noam Rathaus

The Google Crawler could be leveraged as an anonymizer for launching remote file inclusion attacks.

tags | advisory, remote, file inclusion
SHA-256 | 1d9ac034caee1ce402b242faeef52d03b033b705d33d2a8ceee4d07f61800070
nvidia.c
Posted Nov 27, 2006
Authored by Hessam-x | Site hessamx.net

NVIDIA nView suffers from a local denial of service condition in keystone.exe.

tags | exploit, denial of service, local
SHA-256 | 7d22bcb7b9a88dbe9a3472b1ef5dd826c7ed3ca88845ae22ac72ae2da4defc87
Mandriva Linux Security Advisory 2006.218
Posted Nov 27, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-218-1 - An off-by-one error in the der_get_oid function in mod_auth_kerb 5.0 allows remote attackers to cause a denial of service (crash) via a crafted Kerberos message that triggers a heap-based buffer overflow in the component array.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2006-5989
SHA-256 | 0c1995f891f62c93e82e5908e9f4bed81d74128b3655271258f0fd6d3aae1a46
Gentoo Linux Security Advisory 200611-17
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-17 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that fvwm-menu-directory does not sufficiently sanitise directory names prior to generating menus. Versions less than 2.5.18-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | a29fbbf065020f67e0cb941dece13bd9270433aa7c319d93804e113250a8c44c
Echo Security Advisory 2006.61
Posted Nov 27, 2006
Authored by Echo Security, Matdhule

a-ConMan versions 3.2beta and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | f2f33d994fb8037fec0cf26a435839baad586e6b8bc79ad45b8903cf389f4922
ihd231-xss.txt
Posted Nov 27, 2006
Authored by SwEET-DeViL

InverseFlow Help Desk version 2.31 is susceptible to multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | c08a060f103f26ab6d295cf63923f15878ff996977a02b623f4ee05bbd07eb90
confidence-2007-cfp.txt
Posted Nov 27, 2006
Site 2007.confidence.org.pl

Call for papers for the 3rd edition of the best Polish IT security conference, CONFIDENCE 2007, which is taking place on May 12 and May 13, 2007.

tags | paper, conference
SHA-256 | c50cc19809dd09df77eec2315f1b8f91c5e09015007d5559a93fe2cc50f5f35b
secunia-passgosso.txt
Posted Nov 27, 2006
Site secunia.com

Secunia Research has discovered a security issue in PassGo SSO Plus version 2.1.0.32, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
advisories | CVE-2006-5965
SHA-256 | 55aae3eff1047ad72eec9e6d3d4305f55fa93d17b367dcf51e780830d77ce244
mozExpose.txt
Posted Nov 27, 2006

Mozilla has made public bug #360493 that discusses a flaw where Firefox's Password manager is exposed to public sites.

tags | advisory
SHA-256 | 2d4ce343138dc4c7ae6a7ab1eb1432e4851b920bda267470684e6bd3bdd8a75b
proxychecker.txt
Posted Nov 27, 2006
Authored by b1ma | Site iko94.blogspot.com

HTTP proxy checking utility.

tags | web
SHA-256 | eec08c60dfe292551451ec91226d1e4a99c355b1e7cef9e6bfac347439032c2f
GSI.zip
Posted Nov 27, 2006
Authored by Jeffball55

Google Site Indexer (GSI) is a program designed to create a directory listing when a site has turned directory listing off. It sends requests to google using the site operator. Also it gets the sites robots.txt file.

tags | web
SHA-256 | ff1c4129776bb482f9d57c28d911fdf7853b9b621596cdea8bd543ec3b16845d
snort-2.6.1.1.tar.gz
Posted Nov 27, 2006
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Fixed problem with snort using high CPU and potentially reprocessing the same TCP reassembled packets at session end or TCP ACK of only part of a packet.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 01e21432ec5a60a3965ce3e3ebf9cdb4125c9dd5d218da22688857a6357e2a94
mod_securid-2.0.3.tar.gz
Posted Nov 27, 2006
Authored by Erwan Legrand | Site deny-all.com

The mod_securid Apache module implements RSA SecurID authentication for the Apache Web server. It allows administrators to restrict access to Web sites (or parts of Web sites) to users authenticated using a SecurID token and an ACE server.

Changes: Added configure script. Added process maintenance. Fixed a few bugs.
tags | web
SHA-256 | 87c2643540d71c6fdf5c119067c34b61e9d37872340eca467bdb8ec2afb42713
Page 1 of 2
Back12Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close