exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2005-03-01 to 2005-03-02

issue_4_2004.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 4 Astalavista Security Newsletter

SHA-256 | 492d751f3c31d4d620033abe24b48776691a16ffa121f0ead0a34a4f41ea635e
issue_2_2003.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 2 Astalavista Security Newsletter

SHA-256 | 01bd7d5eebd974150d38e3b2387b71a7ba51ca405ed452364211f6e35746f523
issue_3_2003.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 3 Astalavista Security Newsletter

SHA-256 | e646d451cfb1e653e4174de5a96977b584656490f329d4382924d45586b829e6
issue_12_2004.txt
Posted Mar 1, 2005
Authored by astalavista | Site astalavista.com

Featured articles - Can our 5k firewall tell us if we're really under attack? ; Will my PC ever be secured? Part 1 - basic security concepts - Interview with Mitchell Rowton from SecurityDocs.com

SHA-256 | ff7a6004fcd9cbf41371a09977a34aff81bdd511a32a67b3f1da4e91ad82c6c0
issue_1_2003.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 1 Astalavista Security Newsletter

SHA-256 | 4bfc66b4cc7969e00e63d3503f22f5de7786e39c2fb562bb813e5c3e32c2801e
issue_11_2004.txt
Posted Mar 1, 2005
Authored by astalavista | Site astalavista.com

Featured articles - Company's best practices on anti-spam prevention ; How to effectively fight spam - pratical tips - Interview with Dave Wreski from LinuxSecurity.com

SHA-256 | a2781cc386867d81a71d62326e91d202b477ee4063ec51bd329b77fbef0d0dc4
issue_10_2004.txt
Posted Mar 1, 2005
Authored by astalavista | Site astalavista.com

Featured articles - Passwords - Common Attacks and Possible Solutions - Interview with Anthony Aykut from Frame4.com

SHA-256 | d210bc4442e08b4f2b9a5c4c6e9a108b32e645ade65554176fb17e7d5f8940a0
0502-exploits.tgz
Posted Mar 1, 2005
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for February, 2005.

tags | exploit
SHA-256 | 191da9ffce9c9d89dc8e51895a6ec83a809653dcc1b497f0d0af65dc61cfbda4
Gentoo Linux Security Advisory 200502-32
Posted Mar 1, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-32 - Ulf Harnhammar discovered that UnAce suffers from buffer overflows when testing, unpacking or listing specially crafted ACE archives. He also found out that UnAce is vulnerable to directory traversal attacks, if an archive contains ./.. sequences or absolute filenames.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-0160, CVE-2005-0161
SHA-256 | ae4a4c5c890780d64193effa07efc6176d68f843d0ba2cc2659c08cbd16090df
Gentoo Linux Security Advisory 200502-31
Posted Mar 1, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-31 - Takumi Asaki discovered that uim insufficiently checks environment variables. setuid/setgid applications linked against libuim could end up executing arbitrary code. Versions below 0.4.5.1 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2005-0503
SHA-256 | 96ef48c9a6a658e8af62e64b7d27c3a85a1dc6cdb6a33aa95d9b0b3ce8ea6cb4
022805.txt
Posted Mar 1, 2005
Authored by Amit Klein | Site webappsec.org

This paper describes several techniques for exposing file contents using the site search functionality. It is assumed that a site contains documents which are not visible/accessible to external users. Such documents are typically future PR items, or future security advisories, uploaded to the website beforehand. However, the site is also searchable via an internal search facility, which does have access to those documents, and as such, they are indexed by it not via web crawling, but rather, via direct access to the files. Therein lies the security breach.

tags | paper, web
SHA-256 | 95d07a72940beb4eb7d8ef7e8dce89e68ae8dd623e9569d62e531063c6e241f1
Page 2 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close