what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 60 RSS Feed

Files Date: 2006-03-09 to 2006-03-10

HYSA-2006-005.txt
Posted Mar 9, 2006
Authored by Illuminatus | Site h4cky0u.org

h4cky0u.org Advisory 014 - WordPress 2.0.1 Remote DoS Exploit. Written in perl.

tags | exploit, remote, perl
SHA-256 | 02ba0469933f275bae61bcfc64283efe4e6cbd2a029b9fa87cf2f1f3988f185b
EV0088.txt
Posted Mar 9, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

EKINboard v1.0.3 suffers from XSS and SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 5c695afffd1db10633bdd50a5e027ff01f49e6cd189a3c4e0941798cbf0c5f1c
HP Security Bulletin 2005-09.79
Posted Mar 9, 2006
Authored by Hewlett Packard, HP | Site hp.com

HPSBTU02100 SSRT050979 rev.1 - HP Tru64 UNIX IPSEC/ISAKMP Remote Denial of Service (DoS) - Multiple potential vulnerabilities have been identified on HP Tru64 UNIX operating systems running IPSEC, which uses the Internet Security Association and Key Management Protocol (ISAKMP). The vulnerabilities could be exploited remotely to cause Denial of Service (DoS) .

tags | advisory, remote, denial of service, vulnerability, protocol
systems | unix
SHA-256 | 6100ddbdea9a59ead60393d36f621af5ee8ba249152d43dc4363ed05eecf530e
kapda-32.txt
Posted Mar 9, 2006
Authored by imei addmimistrator | Site KAPDA.ir

KAPDA advisory #32 - d2kBlog versions less than or equal to 1.0.3 suffer from SQL and script insertion vulnerabilities.

tags | advisory, vulnerability
SHA-256 | ea16ede83a644cb8b087aa3d7240db2a63d760e9224fe9628fe7c385ee52095b
nabi2.c
Posted Mar 9, 2006
Authored by x90c

Nabi version 2.0 - Advanced /var log wiper for Linux.

Changes: One bug fixed, Added program arguments parser.
tags | tool, rootkit
systems | linux, unix
SHA-256 | 3175ecc780a2ee290ceb3a3342888b516b60e5a84aeeef6d9dd90f9d1ef14df4
EV0087.txt
Posted Mar 9, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

ShoutLIVE v1.1.0 is vulnerable to PHP code execution.

tags | exploit, php, code execution
SHA-256 | 8effbf35e363d8623acf78d3cbca368b3e3ce6b04c14377a8eb9c7907224befe
arh200601-1.txt
Posted Mar 9, 2006
Authored by Arhont Ltd - Information Security | Site arhont.com

Arhont Ltd - Information Security - Cisco PIX embryonic state machine 1b data DoS

tags | advisory
systems | cisco
SHA-256 | 7735b1217ce1bae77e2202f899ac545b69f8fe4ddf73ae628bb235760438a51b
arh200511-1.txt
Posted Mar 9, 2006
Authored by Arhont Ltd - Information Security | Site arhont.com

Arhont Ltd - Information Security - Cisco PIX embryonic state machine TTL(n-1) DoS

tags | advisory
systems | cisco
SHA-256 | 2525621088661a80576367751e899187ebefdd642592aaa2400d79d815fb44e1
HYSA-2006-004.txt
Posted Mar 9, 2006
Authored by Illuminatus | Site h4cky0u.org

h4cky0u.org Advisory 013 - phpBannerExchange 2.0 Directory Traversal Vulnerability

tags | advisory
SHA-256 | 7e17b5f76603261dbba449703cbfdf042d33e1d0046a2ddb04cf4e1dd5f4fc5d
Mandriva Linux Security Advisory 2006.053
Posted Mar 9, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A Denial of Service vulnerability was discovered in the civserver component of the freeciv game on certain incoming packets.

tags | advisory, denial of service
systems | linux, mandriva
SHA-256 | d0a01dc667dcea2cbf8ac02d9aa7c29981e6c5fae13306f3ce3f26251e871c09
Mandriva Linux Security Advisory 2006.054
Posted Mar 9, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Marcelo Ricardo Leitner discovered the official published kpdf patches for several previous xpdf vulnerabilities were lacking some hunks published by upstream xpdf. As a result, kpdf is still vulnerable to certain carefully crafted pdf files.

tags | advisory, vulnerability
systems | linux, mandriva
SHA-256 | 7feb47977b9ac7fc2ff864c5a1ac61f9053117f4b0d4838947107c4ed0a48f2b
Debian Linux Security Advisory 988-1
Posted Mar 9, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 988-1 - Several vulnerabilities have been discovered in Squirrelmail, a commonly used webmail system.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | e5ff871fa8d86d411ef7175c10b9746eedae28f1dd6702cddc0d546beb38c963
FLSA-2006-176751.txt
Posted Mar 9, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory - A flaw was discovered in gpdf. An attacker could construct a carefully crafted PDF file that would cause gpdf to consume all available disk space in /tmp when opened.

tags | advisory
systems | linux, fedora
SHA-256 | 85980e8849751bd6f2a4ee216c0aaaad656510fc117cae3a67ba11d12cd13bb1
FLSA-2006-168516.txt
Posted Mar 9, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory - An integer overflow flaw was found in PCRE, triggered by a maliciously crafted regular expression. On systems that accept arbitrary regular expressions from untrusted users, this could be exploited to execute arbitrary code with the privileges of the application using the library.

tags | advisory, overflow, arbitrary
systems | linux, fedora
SHA-256 | 2d0185cd0adbabd7e60cfab09c85c5584dfaf5babbaa85af29297a1ff815e76c
FLSA-2006-168264-2.txt
Posted Mar 9, 2006
Site fedoralegacy.org

Several integer overflow bugs were found in the way X.org parses pixmap images. It is possible for a user to gain elevated privileges by loading a specially crafted pixmap image.

tags | advisory, overflow
SHA-256 | c946ec66c36cdf996ea697a6c2c104946da411c0599be8bf22c0b5b90d1e4fc3
FLSA-2006-168264-1.txt
Posted Mar 9, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory - An integer overflow flaw was found in libXpm, which is used by some applications for loading of XPM images. An attacker could create a malicious XPM file that would execute arbitrary code if opened by a victim using an application linked to the vulnerable library.

tags | advisory, overflow, arbitrary
systems | linux, fedora
SHA-256 | 640719045c29b1e088687186b4d7cd38f81655a30b3b5eebbd6c60e9e54239c3
Secunia Security Advisory 19086
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Predictive Dialing System (PDS), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 60f08c966f8d68d03671eae1d78f80e36569a5a15dca4f373e2a8a749ee505a7
Secunia Security Advisory 19121
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - uid0 has discovered a vulnerability in m-phorum, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 16ac7c96b474325404d8f9ac6e6c9d18bdd70c01f3a44e25d350070d8824a268
Secunia Security Advisory 19144
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in Alien Arena 2006 Gold Edition, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 7ec0bcd7c72b64c6b0a757570d67736e44288d4c023c5aab6c9b674d1df449af
Secunia Security Advisory 19151
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kiki has discovered multiple vulnerabilities in sBlog, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
SHA-256 | f92819625eb6aece89cf061df23b2a593c2c14ec8621837d257d781311e2c27a
Secunia Security Advisory 19152
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for tar. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a user's system.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 89fca376235a3d97f11790bd4112b76fa083a81c3e4ad8929ffbaa681629b0db
Secunia Security Advisory 19154
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - retard has discovered two vulnerabilities in Link Bank, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 30fee83d59c8a14bdffd5c50c47b0a848eb144579c9e857744966d82dfde47e4
Secunia Security Advisory 19155
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - retard has discovered two vulnerabilities in HitHost, which can be exploited by malicious people to delete empty directories and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 8162570c657f7224ee12bfef1fcee7d6768be7756add68cee1626c2dad7a7804
Secunia Security Advisory 19156
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Syst3m_f4ult has discovered two vulnerabilities in manas tungare Site Membership Script, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | f7a6da414d8a289dc89ac8e52e45f4f9400d5d4d1733a04c500f2decb56a6b33
Secunia Security Advisory 19157
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mustafa Can Bjorn has discovered a vulnerability in Cilem Haber, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1ea4bd091f9f29d3f612638ca2f94e0fc8b88e74d77ffff7f753153e84811855
Page 2 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close