what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 109 RSS Feed

Files Date: 2005-03-22 to 2005-03-23

Secunia Security Advisory 14648
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NT has reported a vulnerability in exoops, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 705b58195a86feeb14e4eab0687cf4840131151242c2a3e0bb42df9fee96d609
Secunia Security Advisory 14635
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in LTris, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 0b41f7a104b397b75a758f3bea3929f0f2d85b9f4e034cf67b806b8c07f8e9ee
Secunia Security Advisory 14585
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Linux kernel. One has an unknown impact, and the others can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel, vulnerability
systems | linux
SHA-256 | 407304cc1e0d1a73481b0c624354726b51a728e49b422bb6fad81b7e4a8d0266
Secunia Security Advisory 14617
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NOAA NCIRT Lab has reported some vulnerabilities in NotifyLink Enterprise Server, which can be exploited to disclose sensitive information, bypass certain security restrictions, and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 4d408d715d9dbc5c8eed6df38cca8d883baead0561a686a58bafea47b4a9b46d
Secunia Security Advisory 14629
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kozan has discovered a security issue in iPool and iSnooker, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
SHA-256 | 511c4d2b830897f78141ded7e95575bf1a6b366acdfc28da11c748a8850df4d5
Secunia Security Advisory 13577
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in My Firewall Plus, which can be exploited by malicious, local users to manipulate the content of arbitrary files on a vulnerable system.

tags | advisory, arbitrary, local
SHA-256 | 28ebc6dc665677204d84fe2ab1c3bfd0805156e4637441988221a7d193660885
Secunia Security Advisory 14628
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ISS X-Force has reported a vulnerability in multiple McAfee products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 9f665a32d8c9ab32dd957fe6016cf226e5bbb273af5fbbf817f3d0a976c29488
Fwknop Port Knocking Utility
Posted Mar 22, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Various additions and reworks.
tags | tool, scanner
systems | linux, unix
SHA-256 | cc78b9428e15e70890d6f053d4858871508416a5f26d141773d0f19d695197be
os-sim-0.9.8rc2.tgz
Posted Mar 22, 2005
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Various bug fixes and feature enhancements.
tags | system logging
systems | linux, unix
SHA-256 | 5a9a9d3c040925a64cb058fee06106c436cbfdebe6217dfa97a7e514e06327a6
Tenshi Log Monitoring Program
Posted Mar 22, 2005
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Fixed whitespaces only lines handling in configuration file, added configuration check mode and checkconfig target in init scripts.
tags | system logging
systems | unix
SHA-256 | 85bbb5384f314f1326bb3aa5d7c2532903781c593606a941c95238ae5e163a2b
alph-0.8.tar.gz
Posted Mar 22, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Morse code implemented.
tags | encryption
SHA-256 | ffcfcd3e9b911f6b3a0cddae8d5c9a361d3e7e7fa4b171ce091fb47a3ee0ca4c
umbrella-0.6.tar.bz2
Posted Mar 22, 2005
Site umbrella.sourceforge.net

The Umbrella security mechanism implements a combination of process-based Mandatory Access Control (MAC) and authentication of files through Digital Signed Binaries (DSB) for Linux based consumer electronics devices ranging from mobile phones to settop boxes. Umbrella is implemented on top of the Linux Security Modules (LSM) framework. The MAC scheme is enforced by a set of restrictions on each process. This policy is distributed with a binary in form of execute restrictions (in the file signature) and within the program, where the developer has the opportunity of making a restricted fork.

Changes: Complete integration with GNU Privacy Guard to authenticate binaries. Hash tables for storing restrictions is replaced by the new, fast and simple FSR data structure, that mimics the 'dentry' structs in the kernel. The Umbrella system call is eliminated and completely replaced by a /proc filesystem interface. The Umbrella code is now completely independent of all architectures and kernel subversions.
systems | linux
SHA-256 | f2a02dad61810591cd43f457b9e8da66eaad90f9f495027ac6ebe526104545fd
phpOpenChat.txt
Posted Mar 22, 2005
Authored by Pi3cH

PHPOpenChat version 3.x is susceptible to multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | eb640f8cd71386f8b9bcd2ff6d49201c80d343e38dfeb94f3d88ebb58c229c92
iso9660handler.txt
Posted Mar 22, 2005
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Linux kernel versions up to and including 2.6.11 has various bugs in the ISO9660 filesystem handler code that can cause denial of service conditions. Script included that tests for this.

tags | exploit, denial of service, kernel
systems | linux
SHA-256 | 3b9fb06993c1ae8e5272ced026e456981eb915235b15ab9645b2d41729a0dc8d
mailenable.tar.gz
Posted Mar 22, 2005
Authored by Mati Aharoni | Site see-security.com

Denial of service exploit that makes use of a format string vulnerability in MailEnable Standard Edition 1.8.

tags | exploit, denial of service
SHA-256 | 8a00478be0a8dc102229ae0af5901d3d9b81f6f9a086a712f08d589f8d2b366a
Secunia Security Advisory 14610
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Piotr Bania has reported a vulnerability in IDA Pro, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3408ab6fe8135801ed51c86b127361d703b329c58c8651d3829dd647c7e5ae71
Gentoo Linux Security Advisory 200503-21
Posted Mar 22, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200503-21 - Joseph VanAndel has discovered a buffer overflow in Grip when processing large CDDB results. Versions less than 3.3.0 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-0706
SHA-256 | 521305c4cd1409fa5f3c639d54fcd771ed2be1d2a91d11aefc6fc4696b31de82
Secunia Security Advisory 14611
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 3e58ad013d4bc3e44a921cb403340fbfebfe88b5bc14de646c8886a87f3e3914
Secunia Security Advisory 13674
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Initial Redirect.

tags | advisory
SHA-256 | eba00e223d0fbe84550de71fdbf67b2a8e2424c8976673607423735109fd4c96
Secunia Security Advisory 14616
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Starks has discovered a vulnerability in Servers Alive, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 6a5d8deac4de4d6d500385128f3746c3f86713b7e3ea2996a19d606d4f333234
GDI32dos.txt
Posted Mar 22, 2005
Authored by Felix Zhou

The Windows 200 GDI32.DLL GetEnhMetaFilePaletteEntries() API is susceptible to a denial of service attack via a specially crafted EMF file.

tags | advisory, denial of service
systems | windows
SHA-256 | 78e2a3948f1c55339a125f4f6c9aa0b3d4c43370c7310ab6f84798a227ddd5f7
acsXSS.txt
Posted Mar 22, 2005
Authored by FarhadKey

ACS Blog versions 0.8, 0.9, 1.0, and 1.1b are susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | 9634efdc4bce5f31e9237587c749bc7aa0fdaed90c7aac12c14dda7f5166353e
Secunia Security Advisory 14609
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in LSH, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | f6c2cb39f34752ec1298b55be290a6afbe18b29d84cc60b9217b79bbd396e94e
includercgi.txt
Posted Mar 22, 2005
Authored by cout

The Includer is susceptible to a classic directory traversal flaw.

tags | exploit
SHA-256 | 54583911fad5c3ca95b65240cb846e00bae518d346af5e082ed018982f1ffc47
badroot-mcNews13.txt
Posted Mar 22, 2005
Authored by Jonathan Whiteley

mcNews versions 1.3 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | f9e9ec34c301312d7e617b7e6cf832abe7df9d917c55413d2e0a5d1891281851
Page 3 of 5
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close