exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 79 RSS Feed

Files Date: 2006-07-20 to 2006-07-21

Ubuntu Security Notice 319-1
Posted Jul 20, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 319-1 - A race condition has been discovered in the file permission handling of the /proc file system. A local attacker could exploit this to execute arbitrary code with full root privileges.

tags | advisory, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2006-3626
SHA-256 | 5f3d92ad959c30a89bf81dbf98acf093ccc125b1767d7b1bd7a8e67d0b344e41
geoauctionsSQL.txt
Posted Jul 20, 2006
Authored by LBDT | Site newangels-team.eu

GeoAuctions Premier version 2.0.3 and GeoClassifieds Basic version 2.0.3 suffer from blind SQL injection flaws.

tags | exploit, sql injection
SHA-256 | c76935fa4653ae91652bb2c25d7cb4ec847848088a52129dc8030e9f35f32c57
RuxCon2006CFP.txt
Posted Jul 20, 2006
Site ruxcon.org.au

RuxCon 2006 Call For Papers - The RuxCon staff would like to announce the call for papers for the fourth annual RuxCon conference. This year the conference will run from the 30th of September to the 1st of October, over the long weekend. As with previous years, RuxCon will be held at the University of Technology, Sydney, Australia.

tags | paper, conference
SHA-256 | 5ce189ddc3eeac2819f6c3aee283455405b4838640c3b3ebb1905f7e4d0ab771
toorconCFP2006.txt
Posted Jul 20, 2006
Site toorcon.org

ToorCon 2006 Call For Papers - Papers and presentations are being accepted for ToorCon 2006 to be held at the Convention Center in San Diego, CA on September 29th through October 1st.

tags | paper, conference
SHA-256 | e02b0ba03e348295eef66d816c9b5560d131f8133d38d5f35d38e611d235fb06
deluxeBB.txt
Posted Jul 20, 2006
Authored by Jessica Hope, Th3 M0ths

DeluxeBB versions 1.07 and below suffer from multiple vulnerabilities including SQL injection and cross site scripting flaws.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | e7b9d8c50687835bc5e05c6edf288fcfbd7f0ef3d44d6ac19bd3a1b312e25ef1
Debian Linux Security Advisory 1112-1
Posted Jul 20, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1111-1 - Several local vulnerabilities have been discovered in the MySQL database server, which may lead to denial of service.

tags | advisory, denial of service, local, vulnerability
systems | linux, debian
advisories | CVE-2006-3081, CVE-2006-3469
SHA-256 | 7e8fdd5e3fa32fce27e25605affba95b2f239b75b54844e27584f2a5a48d78d4
mail2forum12.txt
Posted Jul 20, 2006
Authored by OLiBekaS

mail2forum versions 1.2 and below suffer from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | 5bb66ce5823c22baa2e4fd51d4bd92bef36bd24f8587658c318e8d33ed9ddf43
EEYE-dlink.txt
Posted Jul 20, 2006
Authored by Barnaby Jack | Site eeye.com

A remote stack overflow exists in a range of wired and wireless D-Link routers. This vulnerability allows an attacker to execute privileged code on an affected device. When a specific request is sent to an affected device, a traditional stack overflow is triggered allowing an attacker complete control of the router. With the ability to execute code on the device, it is then possible to apply modified firmware, and ultimately compromise the entire network.

tags | advisory, remote, overflow
SHA-256 | 25d882c6fb0ae5a475f5d6f2351d4ac9dc574a80eed93c6005f7c73dc6e35280
toenda_100_shizouka_xpl.html
Posted Jul 20, 2006
Authored by rgod | Site retrogod.altervista.org

ToendaCMS versions 1.0.0 and below Shizouka stable 'F(u)CKeditor' remote command execution exploit.

tags | exploit, remote
SHA-256 | 4078edb0692788bf72e86e7b49a7f3e7fb493a4be972d72abf20b7fa6618583c
professionalPHP.txt
Posted Jul 20, 2006
Authored by Tamriel

Professional PHP Tools Guestbook suffers from multiple SQL injection vulnerabilities.

tags | advisory, php, vulnerability, sql injection
SHA-256 | 640930a07c780ac17351173383e5b462e04a89e1f67d9d4191f1e37868973c9b
zohoXSS.txt
Posted Jul 20, 2006
Authored by ss_team

Zoho Virtual Office version 3.2 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | f04e06c4a2693acb9dab221b5a1b84dce745609b225f70f60601b367d1ffea6b
Secunia Security Advisory 21118
Posted Jul 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in CS-MARS, which can be exploited by malicious, local users to bypass certain security restrictions and malicious people to gain knowledge of system information and compromise a vulnerable system.

tags | advisory, local, vulnerability
SHA-256 | 34fb5b94d27284768d694017270c4bae8e4332dc9d32448cba47904217e7a66e
Secunia Security Advisory 21126
Posted Jul 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported a vulnerability in PhpLinkExchange, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | da7fac10924fa873be3aaadea52998a1adc3c066006c7cd4584c3a9516bb8569
PacSec2006-CFP.txt
Posted Jul 20, 2006
Site pacsec.jp

PacSec 2006 Call For Papers - The conference will be held November 27th through the 30th in Tokyo. The conference focuses on emerging information security tutorials.

tags | paper, conference
SHA-256 | c8dba8f0dd7e0dcf4eebcc332cd12b1322ddf4cca48580b85f37c7d99d76bfc1
osDate117.txt
Posted Jul 20, 2006
Authored by binaryloc | Site binary.copyleftwriting.org

OSdate versions 1.1.7 and below are prone to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 16af6833a9dfb3853798f4606ad1990864dd9eade7bfd3b117ebb62b00afe622
secunia-IceWarp2.txt
Posted Jul 20, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered two vulnerabilities in IceWarp Web Mail, which can be exploited by malicious users and by malicious people to disclose potentially sensitive information and compromise a vulnerable system. Merak Mail Server version 8.3.8.r with IceWarp Web Mail 5.6.0 is affected.

tags | advisory, web, vulnerability
advisories | CVE-2006-0817, CVE-2006-0818
SHA-256 | ea34c0a33de7ac0c8a3533381aaf94e7d5a0210039b64aa97bdbafdab97a3e5d
secunia-Visnetic2.txt
Posted Jul 20, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered two vulnerabilities in Visnetic Mail Server, which can be exploited by malicious users and by malicious people to disclose potentially sensitive information and to compromise a vulnerable system. Visnetic Mail Server version 8.3.5 is affected.

tags | advisory, vulnerability
advisories | CVE-2006-0817, CVE-2006-0818
SHA-256 | d2398297f500288373c0f6859e9be8e326afb0527008903d4c171dd3f33601b2
secunia-BitZipper.txt
Posted Jul 20, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in BitZipper, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive. BitZipper version 4.1 SR-1 is affected.

tags | advisory, overflow
advisories | CVE-2005-2856
SHA-256 | 7fdb872ca2833cabf09fea315d78509c20750c1c879788b34c7cc8be31075bed
namc10.txt
Posted Jul 20, 2006
Authored by Matdhule

New Article Mambo Component versions 1.0 and below suffer from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | a96106182968428ab29ec9869871a6c2d3e02e4b606f41105f51711cf185d341
boastMachineSQL.txt
Posted Jul 20, 2006
Authored by DarkFig

boastMachine versions 3.1 and below remote SQL injection exploit that also demonstrates a cross site scripting vulnerability.

tags | exploit, remote, xss, sql injection
SHA-256 | 732b0fa3568c40d35435ef55b2e9eef6b65e90306bba137361a2493f1cd0ddb9
outpostSYSTEM.txt
Posted Jul 20, 2006

Outpost Firewall Pro version 3.51.759.6511 and Lavasoft Personal Firewall version 1.0.543.5722 suffer from a privilege escalation vulnerability that leads to SYSTEM access.

tags | advisory
SHA-256 | faabb88abd7c7462e4696e14728468c1dbc0b2d62ce1bedce788c3afe18c5b1c
team-evil-incident.pdf
Posted Jul 20, 2006
Authored by Gadi Evron, Kfir Damari, Ami Chayun | Site beyondsecurity.com

Analysis whitepaper detailing Cyber-terrorism defacement attacks on pro-Israeli servers by Team Evil.

tags | paper
SHA-256 | b5c0b1a8f42634e6f235bab6d79b65c54bd1315b316a4aad456f35821a58aaa9
plesk800.txt
Posted Jul 20, 2006
Authored by INVENT

Plesk control panel versions 8.0.0 and below suffer from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 1940826459537f4a61a1db36f39692d78500639e1bfdbeab4141c8f0091c9f2e
listmessenger093.txt
Posted Jul 20, 2006
Authored by XORON

ListMessenger version 0.9.3 suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 542e818958a613af56f7f6fda483accc6f07546a162465809d34478ca851bd28
keyif.txt
Posted Jul 20, 2006
Authored by XORON

Keyif Portal version 2.0 suffers from a direct download flaw for mdb files.

tags | exploit
SHA-256 | 01488a172f3cbfca69af1b645cba19a5178ce836dfd0244d092f4e7d407d94cd
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close