exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 33 of 33 RSS Feed

Files Date: 2005-02-28 to 2005-02-28

wormCFP.txt
Posted Feb 28, 2005
Site www1.cs.columbia.edu

Call for papers for WORM 2005, the 3rd Workshop on Rapid Malcode. Submissions are due by June 23rd, 2005.

tags | paper, worm, conference
SHA-256 | ce06ad691b6f58f4a13eaecd6e5934f34deb492bb31514677f016e6bfb106cdc
rsbac-v1.2.4.tar.bz2
Posted Feb 28, 2005
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: Fully access controlled kernel level user and group management, transaction support for administration.
tags | kernel
systems | linux
SHA-256 | 968f48b825a3de78d395db6f9f9503f25783a06bf5fe4c85ade530ad03b7272c
Secunia Security Advisory 14381
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to overwrite or delete arbitrary files on a vulnerable system.

tags | advisory, arbitrary, local
systems | solaris
SHA-256 | 5497d544e2202cd6075a1a5f7ff931a55d1efe78f0c25f64514e070f4c0bd641
dsa-690.txt
Posted Feb 28, 2005
Site debian.org

Debian Security Advisory 690-1 - Bastian Blank found a vulnerability in bsmtpd, a batched SMTP mailer for sendmail and postfix. Unsanitized addresses can cause the execution of arbitrary commands during alleged mail delivery.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0107
SHA-256 | b0b1a17b1af7846374d350b779527284f2f36c713156f3fd3b1ab100b1f0ecf3
gaim113.txt
Posted Feb 28, 2005
Authored by Randall Perry

By sending a file with parenthesis in it to another GAIM user, you can cause their client to crash and completely close GAIM down.

tags | advisory
SHA-256 | 0b8a25fa28658e8a92e8acd0c39aa0846a6d979482aca7fdd97872679f2760e3
advisory003.txt
Posted Feb 28, 2005
Authored by John Gumbel

Improper handling of several arguments in the moderate.php code in punbb version 1.2.1 allows a malicious moderator to inject arbitrary SQL statements.

tags | exploit, arbitrary, php
SHA-256 | 6bdc9357ff20bb7f7303ff83fef6913311150b993239cb8d7c76abff375397bd
advisory002.txt
Posted Feb 28, 2005
Authored by John Gumbel

Due to a flaw in punbb version 1.2.1, a remote attacker without an account can set the password of any user on the system to NULL, effectively shutting them out of the system.

tags | exploit, remote
SHA-256 | 3034c8b9bfd452eee66b4d3131399bf4eb4662a52606ffdf7b798f4fc2a8493f
advisory001.txt
Posted Feb 28, 2005
Authored by John Gumbel

A remote attacker can cause register.php punbb version 1.2.1 to execute arbitrary SQL statements by supplying malicious values to the language or email parameters.

tags | exploit, remote, arbitrary, php
SHA-256 | 50193fa1b4c0adde13ec79fb65995c4f0740db19db311771e4c52fb259438b50
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close