exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 69 RSS Feed

Files Date: 2005-10-11 to 2005-10-12

Secunia Security Advisory 16973
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in WinRAR, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 261971cc390f0be498350656d91664e1b6b7b58dc9e974ceb40de472ee5d4cae
Secunia Security Advisory 17085
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Erika Mendoza has reported a vulnerability in CA iGateway, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 4413c9e043dcef6beee0f38449da194f4ebc3b0294c9181b0c2c5976b16debcb
Secunia Security Advisory 17099
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ulf Harnhammar has reported a vulnerability in xine-lib, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | fecd5f2386b4fb51b7b5fd26e1920e21a471aba144a2896b395cddc3d536926b
Secunia Security Advisory 17124
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in xli, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3abd717968f8cafe6c146f29f55bf70ff28bf279e12a2e3d9d5742b1f9d34ffa
Secunia Security Advisory 17128
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mazahaquer has reported a vulnerability in OpenVMPS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 22e1b707ba1a41b024fcba247baa3ea2a4f85a76f97b674b6a0e39c84c1ca51a
Secunia Security Advisory 17129
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, ruby
systems | linux, debian
SHA-256 | 67837269728525dc9626c6204db8a97c1653063823001b4e3518487a85b71e09
Secunia Security Advisory 17130
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kaspersky Anti-Virus, which can be exploited by malicious people to cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, virus
SHA-256 | 8144b460e50bf1e444d1307d217542b1b1e2902910bc200d7c0a067b59229f99
Secunia Security Advisory 17133
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun Microsystems has acknowledged a security issue in Sun JDS (Java Desktop System) which potentially can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, java, local
SHA-256 | 4b8e553ca317ed08e333da2f1e0f424b34348f19749291fcfd11a652f860b45a
Secunia Security Advisory 17134
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hamed Bazargani has discovered a vulnerability in PHP Advanced Transfer Manager, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, php
SHA-256 | 98c1ce64641ea3e18449f4063acfe883c4f65799c340f7de9a836dc88770ac15
Secunia Security Advisory 17137
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maksymilian Arciemowicz has discovered a vulnerability in phpMyAdmin, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | e5d7a58356788cfd293ebc6e4e628211072879661d73ab8d5e026338264e32ba
Secunia Security Advisory 17138
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 24 vulnerabilities and security issues have been reported in WebLogic Server and WebLogic Express, where the most critical ones potentially can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting and HTTP request smuggling attacks, cause a DoS (Denial of Service), and bypass certain security restrictions.

tags | advisory, web, denial of service, vulnerability, xss
SHA-256 | c87a14500e69386bb7a1c242318feec7e8c235f3f3470a3ce6321c5f230445fb
Secunia Security Advisory 17139
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xli. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | f0d2f683fc7088b0eb535d1c1155353bfbe6d9792cb0f9667463262b467369c1
Secunia Security Advisory 17140
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xloadimage. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 387a537c1333f5af2b3ad3ef3fcea9d8d6ec799ce02b30616bce4b663fdd598a
Secunia Security Advisory 17142
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for cfengine. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local, vulnerability
systems | linux, ubuntu
SHA-256 | 1ce5469b00a349fbd84c137463f4b7aa4a3a737b92ffe16ea28437ebcc9573fb
Secunia Security Advisory 17143
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for xloadimage. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | ea5954dc54db9e637d467e58ae0a8b404892c4b6dcea760ebc9ef33023b1e3cb
Secunia Security Advisory 17144
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in F-Secure Anti-Virus for Linux, which can be exploited by malicious people to cause a DoS, or compromise a vulnerable system.

tags | advisory, virus
systems | linux
SHA-256 | 42406679ee4cb197820d3bf083d9b96b46e2381d903def8a1529d97ca4a1d0ac
Secunia Security Advisory 17145
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in KOffice, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | dd93194fb53bf1b198ab7504cc71b92e73ac10157bf2ddf256fc6b1bbc1c5669
Secunia Security Advisory 17146
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - FreeBSD has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | freebsd
SHA-256 | 95a826578e926f2bf84a36b74d5c435e92a4ced466759f0ed998baf83afd6b57
Secunia Security Advisory 17148
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for uw-imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, imap
systems | linux, debian
SHA-256 | ed91aa60d41f8fd6239eb3601996102061615aca6e233e55fad475e3c63aaf0b
Secunia Security Advisory 17151
Posted Oct 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenSSL, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 37a959a580948e39df7b54127c719707d4923a8e31529d010a82875894219eac
base-1.2.tar.gz
Posted Oct 11, 2005
Authored by Kevin Johnson | Site sourceforge.net

BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.

Changes: Multiple bug fixes. Added ISC Source/Subnet report. Added TrustedSource IP lookup. Various other additions and tweaks.
tags | tool, web, sniffer
SHA-256 | fe4705414756fd578f3d35133eedcb4c1b83ab545fac366fb928dfbef622ed5c
HITB.gif
Posted Oct 11, 2005

Conference Graphic

SHA-256 | 30455302912fd9fd34f096a73e5b327de00c55efdf0b55caf0b6489354520f49
Keynote-Mikko-Hypponen-Mobile-Malware.pdf
Posted Oct 11, 2005
Authored by Mikko Hypponen

Mobile Malware - How exactly do mobile viruses work? We'll have a look at their code and discuss what factors affect their spreading speeds. Virus writers have always been trying to attack new platforms. What draws them now towards the mobile phone? Are phones as a platform simply widespread enough, or is the possibility of making easy money via phone billing systems driving this development? Where are we now and what can we expect to see in the Mobile Malware of the future?

tags | virus
SHA-256 | 56afb490432ed145ebbbbf494d1700304dc665d4538170e570097ca10dab2e42
TT-Dave-Aitel-Nematodes.sxi
Posted Oct 11, 2005
Authored by Dave Aitel

Nematodes (Beneficial Worms) - This presentation presents concepts for taking expoitation frameworks into the next evolution: solving complex security problems by generating robustly controllable beneficial worms. The Why, How, and What of Nematode creation are discussed, along with some concepts in Mesh routing. Problems discussed include legal issues, controlling your worm, writing an intermediate language, the Nematode Intermediate Language (NIL) for writing robust worms, reliability problems, commications protocols, and future work.

tags | worm, protocol
SHA-256 | 446fdad6f1cbb3d6964e71c5e4b8c7eeb406f2582978a27b2314f9e084849e8d
TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt
Posted Oct 11, 2005
Authored by Fyodor Yarochkin, Meder Kydyraliev

STIFWare Evolution - Meder and Fyodor have been working on their concept of common framework to unify offensive part of heterogeneous security data and security tools into a single unit - security tools framework. The presentation deals with the evolution of STIF framework into what they call now STIF-ware - a set of STIF relevant modules that would allow the computer security hobbists to build, control and monitor the distributed network of automated hacking agents, guided by set of goals and targets, assigned to the system.

SHA-256 | 44117ca91c39d4c41ac5c5a1d266ffce5d633d4eb8ddac4389eee2d5417e9085
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close