what you don't know can hurt you
Showing 1 - 25 of 26 RSS Feed

Files Date: 2007-08-09

ndisc6-0.9.3.tar.bz2
Posted Aug 9, 2007
Authored by Remi Denis-Courmont | Site people.via.ecp.fr

ndisc consists or two small command line tools (ndisc and rdisc) that perform ICMPv6 Neighbor Discovery and ICMPv6 Router Discovery respectively. It is primarily meant for IPv6 networking diagnostics or to detect rogue IPv6 nodes or routers on an Ethernet segment.

Changes: Updated gettext. Some other minor changes.
tags | tool, scanner
systems | unix
MD5 | 5524ea45f371ff7d40638ad3e15d80a8
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Aug 9, 2007
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: Various enhancements.
tags | kernel, encryption
systems | linux
MD5 | 89a9c534d2f2c30733ea944c3630a531
Openwall Linux Kernel Patch
Posted Aug 9, 2007
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

tags | overflow, kernel
systems | linux
MD5 | e0072eb53c9163f7c62a23c17236548d
Gentoo Linux Security Advisory 200708-3
Posted Aug 9, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200708-03 - CPNI, CERT-FI, Tim Kientzle, and Colin Percival reported a buffer overflow (CVE-2007-3641), an infinite loop (CVE-2007-3644), and a NULL pointer dereference (CVE-2007-3645) within the processing of archives having corrupted PaX extension headers. Versions less than 2.2.4 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2007-3641, CVE-2007-3644, CVE-2007-3645
MD5 | d6d4b9c9d764f998fdea5b893712f6b4
Gentoo Linux Security Advisory 200708-2
Posted Aug 9, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200708-02 - Trixter Jack discovered an array indexing error in the get_intra_block() function in the file src/bitstream/mbcoding.c. The get_inter_block_h263() and get_inter_block_mpeg() functions in the same file were also reported as vulnerable. Versions less than 1.1.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-3329
MD5 | a31ce67035a391f9b578a38adae7cd7d
dersimiz-xss.txt
Posted Aug 9, 2007
Authored by GeFORC3

Dersimiz Haber Ekleme Mod

tags | exploit, xss
MD5 | 7914d453edee1fed2a71afe8112ed2c1
Gentoo Linux Security Advisory 200708-1
Posted Aug 9, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200708-01 - Mark Hills discovered some errors when interacting with a browser for keystrokes handling (CVE-2007-2022). Stefano Di Paola and Giorgio Fedon from Minded Security discovered a boundary error when processing FLV files (CVE-2007-3456). An input validation error when processing HTTP referrers has also been reported (CVE-2007-3457). Versions less than 9.0.48.0 are affected.

tags | advisory, web
systems | linux, gentoo
advisories | CVE-2007-2022, CVE-2007-3456, CVE-2007-3457
MD5 | 6b10fe9e49a4c53d83799e0f5245363d
Cisco Security Advisory 20070808-IOS-voice
Posted Aug 9, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple voice-related vulnerabilities have been identified in Cisco IOS software, one of which is also shared with Cisco Unified Communications Manager. These vulnerabilities only affect devices running Cisco IOS that have voice services enabled. The only exception is the vulnerability documented as Cisco bug ID CSCsi80102, which also exists on Cisco Unified Communications Manager.

tags | advisory, vulnerability
systems | cisco
MD5 | 96c8d43c208678f5396b6f54691b35a3
Cisco Security Advisory 20070808-IOS-IPv6-leak
Posted Aug 9, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS and Cisco IOS XR contain a vulnerability when processing specially crafted IPv6 packets with a Type 0 Routing Header present. Exploitation of this vulnerability can lead to information leakage on affected IOS and IOS XR devices, and may also result in a crash of the affected IOS device. Successful exploitation on an affected device running Cisco IOS XR will not result in a crash of the device itself, but may result in a crash of the IPv6 subsystem.

tags | advisory
systems | cisco, osx
MD5 | cfe453119c8720eb63366e68931530e1
Cisco Security Advisory 20070808-scp
Posted Aug 9, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The server side of the Secure Copy (SCP) implementation in Cisco Internetwork Operating System (IOS) contains a vulnerability that allows any valid user, regardless of privilege level, to transfer files to and from an IOS device that is configured to be a Secure Copy server. This vulnerability could allow valid users to retrieve or write to any file on the device's filesystem, including the device's saved configuration. This configuration file may include passwords or other sensitive information.

tags | advisory
systems | cisco
MD5 | 11d7b0fb83fe8f96ddeb6941737729d1
cisco-sr-20070808-mp.txt
Posted Aug 9, 2007
Site cisco.com

Cisco Security Response - This is the Cisco PSIRT response to an issue discovered and reported to Cisco by Roger Jefferiss and Rob Pope of SecureTest Ltd, UK regarding cross-site scripting (XSS) vulnerability in Cisco Unified MeetingPlace Web Conferencing.

tags | advisory, web, xss
systems | cisco
MD5 | edbf0f5753204684b5ed59fa311d5e14
phpmsql-local.txt
Posted Aug 9, 2007
Authored by Inphex

PHP mSQL local buffer overflow exploit that binds a shell.

tags | exploit, overflow, shell, local, php
MD5 | 719b986d2349f81326cb1f752a759a5d
fishcart-rfi.txt
Posted Aug 9, 2007
Authored by k1n9k0ng | Site sekuritionline.net

FishCart versions 3.2 RC2 and below suffer from a remote file inclusion vulnerability in fc_example.php.

tags | exploit, remote, php, code execution, file inclusion
MD5 | 5160a4cf528c43f42b8fdb4fe42474f3
mplayer11.txt
Posted Aug 9, 2007
Authored by Abed Adonis | Site safehack.com

Microsoft Media Player 11 on Win XP SP2 suffers from a denial of service condition when handling a specially crafted .au file.

tags | advisory, denial of service
MD5 | b6ab386592e7a8e53ffb3adc1ca29185
Secunia Security Advisory 26325
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for poppler. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, ubuntu
MD5 | bf47b97b85d3c99458062d40c50a70cf
Secunia Security Advisory 26333
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in KnowledgeTree Open Source, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 43cd37594145d6d4a62841b92511ceb8
Secunia Security Advisory 26337
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in TIBCO Rendezvous, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks.

tags | advisory, denial of service, vulnerability
MD5 | 91d51ef9dc80dcaa713679acb2421af2
Secunia Security Advisory 26340
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Asterisk, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | ed8f34137605dc3940c4b53cb827fdb1
Secunia Security Advisory 26347
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Erich Schubert has reported a vulnerability in Serendipity, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | bda6d017debaeba4b4b82da40581ad5b
Secunia Security Advisory 26350
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - K3ZZAP66345 has discovered a vulnerability in FrontAccounting, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.

tags | advisory
MD5 | 726ca270baf2e867c83c6afb31deb559
Secunia Security Advisory 26364
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for bochs. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | 7bd8323774e0fdc127462276c1d01de6
Secunia Security Advisory 26365
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for pdfkit.framework. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | 60715578bea2b473b495a3f8045e74bc
Secunia Security Advisory 26367
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libgtop2. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, redhat
MD5 | c218da3c283502051891d695d96af373
Secunia Security Advisory 26368
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, redhat
MD5 | df2cd1704ae368ee7fb9131882c5834b
Secunia Security Advisory 26369
Posted Aug 9, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.5.0-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, cause a DoS (Denial of Service), or to compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability, xss
systems | linux, redhat
MD5 | a538f97fd7e22e9dcfd7505eda85b8d2
Page 1 of 2
Back12Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    14 Files
  • 20
    Sep 20th
    20 Files
  • 21
    Sep 21st
    3 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close