exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 1,045 RSS Feed

Files Date: 2006-11-01 to 2006-11-30

Secunia Security Advisory 23088
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LMH has reported a vulnerability in Mac OS X, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.

tags | advisory, denial of service, local
systems | apple, osx
SHA-256 | 14b44b4282b4511880339e32f2dfa93b4aca58fd94f0522266e4954845629baf
Secunia Security Advisory 23092
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in tDiary, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 957017bce1af3a4b6ee2d0710eafe336b7be3640ccd58336db9e6ab06d06e5c8
Secunia Security Advisory 23099
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for kile. This fixes a security issue, which can be exploited by malicious, local users to gain knowledge of certain information.

tags | advisory, local
systems | linux, gentoo
SHA-256 | 2c1d4810fc4b5b830f2fbaba336be75bd560798203756547754dd8ea9e990c92
Secunia Security Advisory 23123
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in iNews Publisher, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | c116735372f60748f3eb43c00cdb3f1c9c059b1bfc6bcf10e9ce195bd9106a7e
Secunia Security Advisory 23133
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for openldap2-client. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
SHA-256 | eaf39529c724a4aed329426ca9f7734a8a6b086d310cee6356066de9cc0998e2
Secunia Security Advisory 23102
Posted Nov 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bolivar has reported a vulnerability in Basic Forum, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | fcd7da2d00375d71e550f0ebbcb17cadb0061af1351c5a2babc051f3201c9359
Secunia Security Advisory 23132
Posted Nov 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions, expose sensitive information, and manipulate data.

tags | advisory, denial of service, vulnerability
systems | linux, suse
SHA-256 | 395dca194f8e14bbe83479a5b94c0a5dfd91198737956f23b8efd191a73793b9
apb-rfi.txt
Posted Nov 27, 2006
Authored by ThE-LoRd-Of-CrAcKiNg

Active PHP Bookmarks version 1.1.02 suffers from a remote file inclusion flaw in apb.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 562d5f36a0c1bd8997400a8490dc46e6ab7b2cebdb0163d553a3a8be4304e364
javacrack.pdf
Posted Nov 27, 2006
Authored by Subere

Whitepaper entitled Cracking String Encrypting in Java Obfuscated Bytecode.

tags | paper, java
SHA-256 | b3a054932b76ff48af0039a46178eecf584bc4eb5e4ead1c864b310c0394d2cb
wbblite_102_sql.html
Posted Nov 27, 2006
Authored by rgod | Site retrogod.altervista.org

Woltlab Burning Board Lite version 1.0.2 Zend_Hash_Del_Key_Or_Index / blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | e295471bd99cd36e304cd10cd62404b9cf790413f6c6c2cb855454e1081f5dae
mmgallery.txt
Posted Nov 27, 2006
Authored by Al7ejaz Hacker

mmgallery suffers from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 9071003c6c8c1532702c2c247b28c4daeac7626488b311cb717aa5891fb9d8e1
spg-xss.txt
Posted Nov 27, 2006
Authored by Al7ejaz Hacker

Simple PHP Gallery version 1.1 suffers from a cross site scripting flaw.

tags | exploit, php, xss
SHA-256 | 88944544a16e9dac6f26da14d3579629367896361d5b17fc7edc2343e17c0520
Gentoo Linux Security Advisory 200611-20
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-20 - GNU gv does not properly boundary check user-supplied data before copying it into process buffers. Versions less than 3.6.2-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | cba70d2adfa77dcfee4ffb28520f3196f74302f716f95d1c81f203f31885df44
Gentoo Linux Security Advisory 200611-19
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-19 - M. Joonas Pihlaja has reported that a boundary error exists within the ReadDCMImage() function of coders/dcm.c, causing the improper handling of DCM images. Pihlaja also reported that there are several boundary errors in the ReadPALMImage() function of coders/palm.c, similarly causing the improper handling of PALM images. Versions less than 6.3.0.5 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | eb03626dd75b41e22a1dd7f7a4714a958ea8b46bf360b20cc7dd3bc65b5c01c3
Gentoo Linux Security Advisory 200611-18
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-18 - Urs Janssen and Aleksey Salow have reported multiple buffer overflows in TIN. Additionally, the OpenPKG project has reported an allocation off-by-one flaw which can lead to a buffer overflow. Versions less than 1.8.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 54a3d42518a6830f76d715e26380c993a23bf54dd68182b9f2c763505bd6af74
katsnoop.tbz2
Posted Nov 27, 2006
Authored by Kris Katterjohn

Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.

tags | tool, web, sniffer
SHA-256 | d1f498ffeccaf405d1c5eee02b9059c9c967af99640fa813e9ef92cb76640102
NCISACIS-2007-CFP.txt
Posted Nov 27, 2006
Authored by Jeimy J. Cano

The Seventh National Computer and Information Security Conference ACIS 2006 (NCIS 2006) invites all researchers and practitioners to submit research papers in security topics.

tags | paper, conference
SHA-256 | 09c5aa8aba24e5120087a319fd1f2bb90073b2247fc71df14537ec118f6c09f4
googleInclusion.txt
Posted Nov 27, 2006
Authored by Noam Rathaus

The Google Crawler could be leveraged as an anonymizer for launching remote file inclusion attacks.

tags | advisory, remote, file inclusion
SHA-256 | 1d9ac034caee1ce402b242faeef52d03b033b705d33d2a8ceee4d07f61800070
nvidia.c
Posted Nov 27, 2006
Authored by Hessam-x | Site hessamx.net

NVIDIA nView suffers from a local denial of service condition in keystone.exe.

tags | exploit, denial of service, local
SHA-256 | 7d22bcb7b9a88dbe9a3472b1ef5dd826c7ed3ca88845ae22ac72ae2da4defc87
Mandriva Linux Security Advisory 2006.218
Posted Nov 27, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-218-1 - An off-by-one error in the der_get_oid function in mod_auth_kerb 5.0 allows remote attackers to cause a denial of service (crash) via a crafted Kerberos message that triggers a heap-based buffer overflow in the component array.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2006-5989
SHA-256 | 0c1995f891f62c93e82e5908e9f4bed81d74128b3655271258f0fd6d3aae1a46
Gentoo Linux Security Advisory 200611-17
Posted Nov 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-17 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that fvwm-menu-directory does not sufficiently sanitise directory names prior to generating menus. Versions less than 2.5.18-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | a29fbbf065020f67e0cb941dece13bd9270433aa7c319d93804e113250a8c44c
Echo Security Advisory 2006.61
Posted Nov 27, 2006
Authored by Echo Security, Matdhule

a-ConMan versions 3.2beta and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | f2f33d994fb8037fec0cf26a435839baad586e6b8bc79ad45b8903cf389f4922
ihd231-xss.txt
Posted Nov 27, 2006
Authored by SwEET-DeViL

InverseFlow Help Desk version 2.31 is susceptible to multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | c08a060f103f26ab6d295cf63923f15878ff996977a02b623f4ee05bbd07eb90
confidence-2007-cfp.txt
Posted Nov 27, 2006
Site 2007.confidence.org.pl

Call for papers for the 3rd edition of the best Polish IT security conference, CONFIDENCE 2007, which is taking place on May 12 and May 13, 2007.

tags | paper, conference
SHA-256 | c50cc19809dd09df77eec2315f1b8f91c5e09015007d5559a93fe2cc50f5f35b
secunia-passgosso.txt
Posted Nov 27, 2006
Site secunia.com

Secunia Research has discovered a security issue in PassGo SSO Plus version 2.1.0.32, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
advisories | CVE-2006-5965
SHA-256 | 55aae3eff1047ad72eec9e6d3d4305f55fa93d17b367dcf51e780830d77ce244
Page 3 of 42
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close