what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 85 RSS Feed

Files Date: 2006-04-28 to 2006-04-29

TotalCalendar2.30.txt
Posted Apr 28, 2006
Authored by David Vieira-Kurz

TotalCalendar 2.30 suffers from a remote file inclusion vulnerability if register_globals = On.

tags | advisory, remote, file inclusion
SHA-256 | 1b720877142bcc02d5c11e21e8d3e6d589dcd24a3d0aac57eaf94436de1b1030
FileLodgeBolt.txt
Posted Apr 28, 2006
Authored by n0m3rcy

FileLodge Bolt suffers from XSS in showonlineusers.php.

tags | advisory, php
SHA-256 | 53e0689da7ea262cfba9282b818852e6227d5d5d8e3e6766ba4056dbb29e78be
Fenice-1.10.txt
Posted Apr 28, 2006
Authored by Luigi Auriemma | Site aluigi.altervista.org

Fenice - Open Media Streaming Server suffers from a buffer-overflow in parse_url and a crash in RTSP_msg_len.

tags | advisory, overflow
SHA-256 | 97fd1021667245b031e7494691930e013c6617a325f7eb3099dd728b0863d800
vwar-path.txt
Posted Apr 28, 2006
Authored by arko.dhar

The recent exploit provided by aliHackers for VWar (VWar ver 1.21 Remote Code Execution Exploit ) has also another affect on the higher unptached versions of vWAR such as v1.5 and also on versions less than 1.2 . Apart from the successful code execution exploit even if the exploit fails still running the following code on the web browser shows the full path of the installed modules even if the remote php shell is not achieved.

tags | advisory, remote, web, shell, php, code execution
SHA-256 | d98282e373a41ebc4911fdf1334453f7ce03792cd17661405fcdf8ac04983e8a
NSFOCUS Security Advisory 2006.2
Posted Apr 28, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-02): IBM AIX mklvcopy Local Privilege Escalation Vulnerability

tags | advisory, local
systems | aix
SHA-256 | 62545be78e2bdd657ef035511e3d0d122ea36c621b5faa8bea8ca547dd698287
NSFOCUS Security Advisory 2006.3
Posted Apr 28, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-03): IBM AIX rm_mlcache_file Local Race Condition Vulnerability

tags | advisory, local
systems | aix
SHA-256 | b78993d91feb9e19859cc9ecd3706f50c6b1b0f2cba30dad4fbd09d467c5de4c
quick-n-easy.txt
Posted Apr 28, 2006
Site c0d3r.org

Quick 'n Easy FTP Server pro/lite suffers from a stack overflow when logging unicode.

tags | advisory, overflow
SHA-256 | 5d0f58169dc6c03be6787b48959c3c6fb409f2d8fffc8273a09e5e26e90c04c9
win-mailto.txt
Posted Apr 28, 2006
Authored by inge.henriksen | Site ingehenriksen.blogspot.com

Multiple browsers Windows mailto protocol Office 2003 file attachment exploit: Application protocols handling in Microsoft Windows is badly designed, i.e. when someone types mailto:someone@somewhere.com into a browser the protocol is first looked up under HKEY_CLASSES_ROOT\%protocol%\shell\open\command, if it is a protocol that is allowed under the current user context then the value is simply replaced by the contents in the address bar at %1.

tags | advisory, shell, protocol
systems | windows
SHA-256 | e9d335bf8d915cd060f8c111a59da1d0d42a6dbbbd5cadd09f58e5c92e11646f
safari-2.0.3.txt
Posted Apr 28, 2006
Authored by Yannick von Arx | Site yanux.ch

Apple Mac OS X Safari 2.0.3 Vulnerability: A vulnerability exists in Safari 2.0.3 (417.9.2) and perhaps in prior versions which causes the operating system to slow down SRCOD (Spinning Rainbow Cursor Of Death), and therefore, it's not possible to launch any applications like Terminal to kill the process. After several minutes Safari crashes.

tags | advisory
systems | apple, osx
SHA-256 | 1b1b00d7a05322c9df74a0bf3744fc5fa2b4665c1d920ba9ac0ca53cb19b8700
os2a_1005.txt
Posted Apr 28, 2006
Authored by OS2A

A buffer overflow vulnerability exists in the implementation of split() function in NASL. This causes nasl to consume a large amount of CPU and memory resources and stop responding. Execution of arbitrary commands on the vulnerable host may be possible. This affects Nessus 3.0.2, 2.2.7 and prior releases.

tags | advisory, overflow, arbitrary
SHA-256 | 68a5c54fa28164efc323ca5826b72c0f02880ab4074690d5a28896ac257ac42b
DCForumLite.txt
Posted Apr 28, 2006
Authored by Breeeeh

DCForumLite v3.0 suffers from XSS and SQL injection.

tags | advisory, sql injection
SHA-256 | cc138d465fdf4a8e66d3961835ac5dd07e981b0f08d86bf4f50d45f9d68f0e1b
Invision2.1.5.txt
Posted Apr 28, 2006
Site HackThisSite.org

Invision Power Board 2.1.5 and possibly earlier versions suffer from a flaw that could allow for remote code execution.

tags | advisory, remote, code execution
SHA-256 | faceaa034a8ec3401f7b815e0ab17e115e8eea2f2bde4b80846bc9695d108006
NextAge.txt
Posted Apr 28, 2006
Site aria-security.net

NextAge Shopping Cart suffers from XSS.

tags | advisory
SHA-256 | 6ed1ea598389e542615d527b1e1f906d2c62c4f76c2340a4b854259f8e67d2a2
photokorn1.53.txt
Posted Apr 28, 2006
Authored by Dr-Jr7

photokorn 1.53 and 1.542 suffer from SQL injection.

tags | advisory, sql injection
SHA-256 | b6f9cba84ee82a8e0b0806540daf45e32b4d31b9dfffdfd4a37ef8b014a84e95
PhpWebftp.txt
Posted Apr 28, 2006
Site subjectzero.net

PhpWebFtp v2.3 suffers from multiple XSS vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 52c3c9539f9c8c690302211547cb89b2e70d232bf6cb56b17ed896729148ab00
InstantPhotoGallery.txt
Posted Apr 28, 2006
Authored by Qex

Instant Photo Gallery suffers from XSS.

tags | advisory
SHA-256 | cd0f466de4a727ce28cf3b5a9a1ff5c30c20f902e1c76b31d810d24cc4bd0ff3
su.pl.txt
Posted Apr 28, 2006
Authored by obsd staff | Site freeshell.se

su trojan written in perl. It reads the password, logging it to a file and then executes the real su.

tags | tool, trojan, perl, rootkit
systems | unix
SHA-256 | 89ca7aa3ed98d8e1b3d8f8f03e98c74f1253d4a84b02f221c6ed2a6e3c24623c
invvy-v2.pl
Posted Apr 28, 2006
Authored by Javier Olascoaga | Site digitalsec.es

Invision Power Board 2.1.5 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 3314ab197b38625e7111961ab93bcd29a93a4a8eb7dc59b92e70f0d782127031
ietest.html.txt
Posted Apr 28, 2006
Authored by Matthew Murphy

POC for the Internet Explorer Modal Dialog Issue: A malicious user could create content that would request the user to click an object or press a sequence of keys. By delivering a security prompt during this process, the site could subvert the prompting and obtain permission for actions that were not necessarily authorized.

tags | exploit
SHA-256 | 37b851304649abe9415c7b7d8d0de6665b6c40ea7e57d02ef76eb6162b600e0a
Secunia Security Advisory 19612
Posted Apr 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Servant Salamander, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1b9c7df01458b4031763c51fd075eaf5fafbe5918bdd13ad88a526e76329df7c
Secunia Security Advisory 19755
Posted Apr 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported some vulnerabilities in Kamgaing Email System, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5dd59f3263c8e4da4bbbe6fb2f4dc9888aa2ddcd6218affbd87f8a00422bb034
Secunia Security Advisory 19810
Posted Apr 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lipako GmbH has reported a vulnerability in PHP-G

tags | advisory, php
SHA-256 | 71c11d02dbe8e5e4c566f6c00854536aca742aebded1b0f02b4524913f4a2968
Secunia Security Advisory 19814
Posted Apr 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for MySQL. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | f818e5b1263f4a879ecb336ce33f52ed8c44081559b29ac5ed4c459389a520f7
Secunia Security Advisory 19816
Posted Apr 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sowhat has discovered a vulnerability in WinISO, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 48020cb85c2adeb7a4c378be39af0d071af0630830193204a43e1a79161963c9
Secunia Security Advisory 19838
Posted Apr 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tavis Ormandy has reported some vulnerabilities in LibTIFF, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
SHA-256 | 1f04fac8587c458536774072380e08d47934bda6b14f56b57d21d98effbfba8e
Page 3 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close