what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 732 RSS Feed

Files Date: 2005-08-01 to 2005-08-31

Secunia Security Advisory 16521
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Solaris, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | solaris
SHA-256 | ba80317acf61549fa1ba000763d23a0b403e62a851d7b8982c39e7b4813ade85
Secunia Security Advisory 16539
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in SqWebMail, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 1ad053470b349dca87c34c886082a6857433975098d4c7f2896b06ee6da88f8a
Secunia Security Advisory 16542
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kozan has discovered a security issue in ZipTorrent, which can be exploited by malicious, local users to disclose certain sensitive information.

tags | advisory, local
SHA-256 | 4d48c1e0c6bda910f36c4a4f4538715c96741e8f9e61abf28ba30f4eecb14098
Secunia Security Advisory 16550
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for PEAR-XML_RPC / phpxmlrpc. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
SHA-256 | c68ae5c73bb3484b7d9a6f3d08949b59a5b64664207be7b60d3c6fd83f8d4c33
Secunia Security Advisory 16551
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in Ventrilo Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 3a6a5f37464a1d1adb76953ca8d0ace59ac4b5ce50b67a2d15eaef0f1f41c098
Secunia Security Advisory 16552
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sowhat has reported a vulnerability in LeapFTP, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 40c69fba7968cfedf6c107d143706e5d036148efe09574b77c7b9b0bc0fe851c
Secunia Security Advisory 16553
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Josh Bressers has reported a security issue in cvs, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | a6fb98cdc04d87513dd38a94e07cfc54b32a41c483aa656414252fbdaa67bf8a
Secunia Security Advisory 16557
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cvs. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | 605564b0003d332ce1331e5784014d8ae937568029ad6fe3ac5d1bc08d44a5e3
Secunia Security Advisory 16560
Posted Aug 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Igor Franchuk has discovered a weakness in Microsoft Windows, which can be exploited to hide certain information.

tags | advisory
systems | windows
SHA-256 | 81b756e68c6cc1b3f60c7a0ba5571b9b6c6b822b2fb3bc6c998c068642f8f83a
Gentoo Linux Security Advisory 200508-13
Posted Aug 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-13 - Stefan Esser of the Hardened-PHP Project discovered that the PEAR XML-RPC and phpxmlrpc libraries were improperly handling XMLRPC requests and responses with malformed nested tags. Versions less than 1.4.0 are affected.

tags | advisory, php
systems | linux, gentoo
advisories | CVE-2005-2498
SHA-256 | b392e04daac6a3131a159750ecf6640f104e46dc1e949490958e28588b03b917
Debian Linux Security Advisory 783-1
Posted Aug 24, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 783-1 Eric Romang discovered a temporary file vulnerability in a script accompanied with MySQL, a popular database, that allows an attacker to execute arbitrary SQL commands when the server is installed or updated.

tags | advisory, arbitrary
systems | linux, debian
SHA-256 | 0bdaf61278be5abca20b301dac437ae4001a24bd0b9e600a1bd8632d16a251e8
ventboom.zip
Posted Aug 24, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Exploit for the Ventrilo 2.3.0 malformed status packet vulnerability.

tags | exploit
SHA-256 | ad0ab9cf0589c79a21541d14896eedcac439df6ebd2f779645049f293aea60c1
ventboom.txt
Posted Aug 24, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

It is possible to crash Ventrilo 2.3.0 by sending a malformed status packet.

tags | advisory
SHA-256 | 6cb018997e473aaa91fd732430eed0e401f4cd1feee78f164f7540daf14e6263
solaris_lpd_unlink.pm.txt
Posted Aug 24, 2005
Authored by H D Moore, Optyx

This Metasploit module uses a vulnerability in the Solaris line printer daemon to delete arbitrary files on an affected system. This can be used to exploit the rpc.walld format string flaw, the missing krb5.conf authentication bypass, or simple delete system files. Tested on Solaris 2.6, 7, 8, 9, and 10.

tags | exploit, arbitrary
systems | solaris
SHA-256 | 3865e92d6319da6652ab4c7ed8c01bd18db40efa2f58d0e789c6a8a79b4fb63d
Secunia Security Advisory 16531
Posted Aug 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Phuket has discovered some vulnerabilities in PHPKit, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | d82f266f336a74620fb5e0beb194c3a5184abbbc6196aca3831ddab467dc340b
Secunia Security Advisory 16543
Posted Aug 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libpcre3. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
SHA-256 | ff26acd3f887f68ec0a47bcc150cfaf7e28cf56ecefd9c186d683ce6fe3af904
Secunia Security Advisory 16554
Posted Aug 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for elm. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | 3e08750339bfda75bf38c6c8de95a2442dfb29828bcaf345f66061158c428530
Ubuntu Security Notice 173-1
Posted Aug 24, 2005
Authored by Ubuntu, Martin Pitt | Site security.ubuntu.com

A buffer overflow has been discovered in the PCRE, a widely used library that provides Perl compatible regular expressions. Specially crafted regular expressions triggered a buffer overflow. On systems that accept arbitrary regular expressions from untrusted users, this could be exploited to execute arbitrary code with the privileges of the application using the library.

tags | advisory, overflow, arbitrary, perl
SHA-256 | 90dedc2182e9f13fe60b58ffaaf6d0166a5497e077ce7855d8e3d7e2c6b8fd3b
Gentoo Linux Security Advisory 200508-12
Posted Aug 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-12 - Ulf Harnhammar discovered that Evolution is vulnerable to format string bugs when viewing attached vCards and when displaying contact information from remote LDAP servers or task list data from remote servers (CVE-2005-2549). He also discovered that Evolution fails to handle special calendar entries if the user switches to the Calendars tab (CVE-2005-2550). Versions less than 2.2.3-r3 are affected.

tags | advisory, remote
systems | linux, gentoo
advisories | CVE-2005-2549, CVE-2005-2550
SHA-256 | c3c0a5ca715423ba57ad0ed3bb8e8b0cddf7444a0020c4349015ede584102d19
Ubuntu Security Notice 172-1
Posted Aug 24, 2005
Authored by Ubuntu, Martin Pitt | Site security.ubuntu.com

Javier Fernandez-Sanguino Pena noticed that the pwmconfig script created temporary files in an insecure manner. This could allow a symlink attack to create or overwrite arbitrary files with full root privileges since pwmconfig is usually executed by root.

tags | advisory, arbitrary, root
SHA-256 | 376f85a08e46d04bd581a85bbc2d275ce2e2f13f3f55865875c59d8ef2fb241f
ZipTorrent1.3.7.3.txt
Posted Aug 24, 2005
Authored by Kozan | Site spyinstructors.com

ZipTorrent stores proxy server information and password in X:\\[Program_Files_Path]\[ZipTorrent_Path]\pref.txt in plain text. A local user can read passwords and others.

tags | exploit, local
SHA-256 | f17cbabb6214be4b1a15c231b17cecd4ba1bdd923fb0449fab9505b53fb8a0da
IMRadio-4.0-expl.txt
Posted Aug 24, 2005
Authored by Kozan | Site spyinstructors.com

Mercora IMRadio 4.0.0.0 stores username and passwords in the Windows Registry in plain text. A local user can read the values.

tags | exploit, local, registry
systems | windows
SHA-256 | baac3f4238dc50049d9fc04fadf14b5bfe96c656f5abe232e2c22c30f47da2d1
oracle_checkpwd.zip
Posted Aug 24, 2005
Authored by Alexander Kornbrust | Site red-database-security.com

A dictionary based Oracle password checker. This is a useful and fast (150.000 pw/sec) tool for DBAs to identify Oracle accounts with weak or default passwords.

tags | cracker
SHA-256 | 347557ee38aed91ccdfda881256b418152b5fc74c3ede2186cf61ff83fe5f29c
logcheck_1.2.41.tar.gz
Posted Aug 24, 2005
Authored by Todd Troxell | Site logcheck.org

Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.

Changes: Various updates. See changelog.
tags | tool, intrusion detection
systems | unix
SHA-256 | 170d528a300aa2f1792277680a460ba822c427433349e63d2a245318f6e0bfa1
WepDecrypt-0.7.tar.gz
Posted Aug 24, 2005
Authored by icemanf | Site wepdecrypt.sourceforge.net

Wepdecrypt is a wireless LAN tool based on wepattack that guesses WEP keys using an active dictionary attack, a key generator, a distributed network attack, and some other methods.

Changes: Added a gui, some support, and some minor fixes. Documentation also added.
tags | tool, wireless
SHA-256 | 29ae072985616a0141a07e767e667cd33c917605338d37824de96c765a692333
Page 5 of 30
Back34567Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close