exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 83 of 83 RSS Feed

Files Date: 2006-04-29 to 2006-04-30

linux-cisco-PSIRT.txt
Posted Apr 29, 2006
Site cisco.com

Cisco PSIRT's response to the privilege escalation vulnerability in multiple Linux based Cicso products including: Cisco Wireless LAN Solution Engine (WLSE), Cisco Hosting Solution Engine (HSE), Cisco User Registration Tool (URT), Cisco Ethernet Subscriber Solution Engine (ESSE), CiscoWorks2000 Service Management Solution (SMS)

tags | advisory
systems | cisco, linux
SHA-256 | 5fed5f29f98f68d37f4b0e34a99ad89ec73549e4955eedd56cf3633347bb56be
linux-cisco.txt
Posted Apr 29, 2006
Site assurance.com.au

Assurance.com.au - Vulnerability Advisory: Multiple vulnerabilities in Linux based Cisco products. the "show" application has several vulnerabilities which allow an attacker to "break out" of the shell and execute commands (including /bin/sh) as the root user.

tags | advisory, shell, root, vulnerability
systems | cisco, linux
SHA-256 | ffd7ec925a08321578c4606c7b0a6bde0583a426858c95a75515779c416b030a
SYS.DBMS_LOGMNR_SESSION.txt
Posted Apr 29, 2006
Site red-database-security.com

The package SYS.DBMS_LOGMNR_SESSION contains a SQL injection vulnerability in the procedure DELETE_FROM_TABLE. Oracle fixed this problem by using the package DBMS_ASSERT.

tags | advisory, sql injection
SHA-256 | 1eb412d989006bda131499a0f77fe151a8bbbc7dc287b8e0d7be3dc8c7bd297f
LiveUpdate-mac.txt
Posted Apr 29, 2006
Site symantec.com

Some components of Symantecs LiveUpdate for Macintosh do not set their execution path environment. A non-privileged user can change their execution path environment. If the user then executes one of these components, it will inherit the changed environment and use it to locate system commands. These components are configured to run with System Administrative privileges (SUID) and are vulnerable to a potential Trojan horse attack.

tags | advisory, trojan
SHA-256 | a36f19d2a6ed11d0ffb67d60451dbbfebd2b4a55d7432dc8a62f16c20cc2b9fc
phpListerv.0.4.1.txt
Posted Apr 29, 2006
Site advisory.patriotichackers.com

phpLister v. 0.4.1 suffers from XSS.

tags | advisory
SHA-256 | 8b1f1255e539096abf589d91e29f48549f7c3a9af76ed4ba68514c56be5bde95
Ad-Aware.txt
Posted Apr 29, 2006
Authored by Roy.Batty

A paper discussing the various vulnerabilities in Ad-Aware.

tags | advisory, vulnerability
SHA-256 | 4b6a28f895b49f29af11ab0ad13559dae263a936ed19aedc7e28d7ca632b9ba8
proxytest.pl
Posted Apr 29, 2006
Authored by Andrea Purificato | Site rawlab.altervista.org

proxytest.pl is a perl script that reads in a list of proxies from a text file and checks their state.

tags | web, perl
SHA-256 | 6ee7234a27bb8276b190e57089ec9fe6039dd9086a9ef97adaf4240fcfd66ed9
wnetstat.pl
Posted Apr 29, 2006
Authored by Andrea Purificato | Site rawlab.altervista.org

wnetstat.pl is a small perl wrapper script to hide IPs from netstat.

tags | tool, perl, rootkit
systems | unix
SHA-256 | 02bc906fe5883774a8295c8c29a77175963ce43fbd71869d1fef8126325afe45
Page 4 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close