exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 665 RSS Feed

Files

Core Security Technologies Advisory 2006.0327
Posted Jun 11, 2006
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies - Corelabs Advisory CORE-2006-0327: IAXclient is an open source library that implements the IAX2 VoIP protocol used by the Asterisk IP PBX and several VoIP software phones. Two vulnerabilities have been found in the library that may grant attackers remote execution of arbitrary code on systems using software packages that rely on it to implement the IAX2 protocol support.

tags | advisory, remote, arbitrary, vulnerability, protocol
SHA-256 | 7ba3b346dc7517aff33efbe4dd099cc6f8cbc6b2d7ccdf6c04785dfa56992eef
zdaebof.txt
Posted Apr 1, 2006
Authored by Luigi Auriemma | Site aluigi.altervista.org

Zdaemon version 1.08.01 and below suffer from buffer overflow and invalid memory access flaws.

tags | advisory, overflow
SHA-256 | ca42c2a01e93ec55e3731709577ac5c0c58ca737ac50d934522fa9a0afbf1a5f
windowsHelp.txt
Posted Apr 1, 2006
Authored by c0ntex | Site open-security.org

There is a heap based buffer overflow in the rendering engine of .hlp files in winhlp32.exe which will allow some attacker the possibility of modifying the internal structure of the process with a means to execute arbitrary and malicious code.

tags | advisory, overflow, arbitrary
SHA-256 | c4259db39f4aff91e94ff092f7458b43487c81c6812534536180b76496dff498
monalbum087.txt
Posted Apr 1, 2006
Authored by undefined1_

Mon Album version 0.8.7 is susceptible to SQL injection attacks.

tags | advisory, sql injection
SHA-256 | fe5e18716a851acd0cc695631dbe5d0dc32318b01f999c2a83e44eeba27933e1
SSRT5953.txt
Posted Apr 1, 2006
Authored by HP | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running /sbin/passwd which could be locally exploited to create a Denial of Service (DoS).

tags | advisory, denial of service
systems | hpux
SHA-256 | 7c17b6cc01ae0a20082aabb86030b27f7e1394d1c5f1e4ffa2118d14fcbd8573
sambaExpose.txt
Posted Apr 1, 2006
Site samba.org

Samba versions 3.0.21 through 3.0.21c expose passwords in clear text in debug logs.

tags | advisory
advisories | CVE-2006-1059
SHA-256 | 9c66ac379d91a26c3d07b4b4b4b901a1c696d52cb2e7dcbea7bea13a3a3d89b4
Mandriva Linux Security Advisory 2006.061
Posted Apr 1, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Scrubber.py, in Mailman 2.1.5 and earlier, when using email 2.5 (part of Python), is susceptible to a DoS (mailman service stops delivering for the list in question) if it encounters a badly formed mime multipart message with only one part and that part has two blank lines between the first boundary and the end boundary.

tags | advisory, python
systems | linux, mandriva
advisories | CVE-2006-0052
SHA-256 | 131e517125070d0b20804c718b15fce3c70f0f2894aaf5487a22def7cb089f4a
xfocus-SD-060329.txt
Posted Apr 1, 2006
Site xfocus.org

The XFOCUS team has discovered multiple integer overflows in MPlayer version 1.0.20060329 and below.

tags | advisory, overflow
SHA-256 | 63e762c39c00d599fa0d7e78eb9ca9d54e84981185e128bb6f6230abf893bf4d
Debian Linux Security Advisory 1021-1
Posted Apr 1, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1021-1 - Max Vozeler from the Debian Audit Project discovered that pstopnm, a converter from Postscript to the PBM, PGM and PNM formats, launches Ghostscript in an insecure manner, which might lead to the execution of arbitrary shell commands, when converting specially crafted Postscript files.

tags | advisory, arbitrary, shell
systems | linux, debian
advisories | CVE-2005-2471
SHA-256 | c805afd688bd7387640c3694a50b68d7630757d17cd7512253e04e23bcfd57c8
secunia-Blazix.txt
Posted Apr 1, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Blazix, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to a validation error of the filename extension supplied by the user in the URL. This can be exploited to retrieve the source code of JSP files from the server via specially crafted requests containing dot, space, and slash characters. Version 1.2.5 is affected.

tags | advisory
SHA-256 | 3604e084018ebac5c828858ccaf9a13fdb6c16dd20d3d34b1392abab5ccb8b31
Zero Day Initiative Advisory 06-06
Posted Apr 1, 2006
Authored by Tipping Point, Sebastian Apelt | Site zerodayinitiative.com

ZDI-06-006: A buffer overflow exists in the Symantec VERITAS NetBackup Database Manager. Version 6.0 is affected.

tags | advisory, overflow
SHA-256 | 3ee80a9ae01e2332c684f620224e12f3b480e4050910a21ee5244747047484ba
Zero Day Initiative Advisory 06-05
Posted Apr 1, 2006
Authored by Tipping Point, Sebastian Apelt | Site zerodayinitiative.com

ZDI-06-005: A buffer overflow exists in the Symantec VERITAS Volume Manager. Version 6.0 is affected.

tags | advisory, overflow
SHA-256 | 8045b164de5ac478c3478881b5766a46f7f5e995c71a48f91d4b1b1c3423b0dc
TSRT-06-01.txt
Posted Apr 1, 2006
Site tippingpoint.com

The vnetd from Symantec VERITAS NetBackup is susceptible to a buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2006-0991
SHA-256 | ef4439486547f9aa6fb960c33becf5f8298bf4fe6c434df61972569b93ac47f1
movilnetCaptcha.txt
Posted Apr 1, 2006
Authored by Ruben Recabarren, Leandro Leoncini

Movilnet's Web SMS Captcha implementation is weak and it is possible to recognize its patterns 100% of the time.

tags | advisory, web
SHA-256 | 6efa607accbecb5b0c7fb26469c490a0223aff141c4b3fff76e00a9740d8632f
PHPADSNEW-SA-2006-001.txt
Posted Apr 1, 2006
Authored by Matteo Beccati | Site phpadsnew.com

phpAdsNew and phpPgAds versions 2.0.7 and below suffer from multiple html injection and cross site scripting flaws.

tags | advisory, xss
SHA-256 | a793dcd9aecab47b9733118eb9d5787b238bd31ae7895adab51cebd13368c481
akocomment.txt
Posted Apr 1, 2006
Authored by Stefan Keller

AkoComment version 2.0, a well known add-on for Mambo and Joomla CMS systems, is susceptible to SQL injection attacks.

tags | advisory, sql injection
SHA-256 | bf01ec751a48a024bb4dcaca4218246f7eb86d675ee49c62c47b88bc6f691cb8
rainXSS.txt
Posted Apr 1, 2006
Authored by Dimitry Snezhkov

Raindance Web Conference Pro suffers from a cross site scripting flaw in its browser compatibility checking code.

tags | advisory, web, xss
SHA-256 | 833178f68b0b4fd8a568af43eae92e51e16b373c623642b7f2d52839b3cf3d91
secunia-Quick.txt
Posted Apr 1, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Quick 'n Easy/Baby Web Server, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory, web
SHA-256 | a4646bf09910c4c5191f80718f1eda87923398b1f7af7ff7fd3ef391e20c87d6
HP Security Bulletin 2006-11.34
Posted Apr 1, 2006
Authored by Hewlett Packard, HP | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified in HP-UX running swagentd. The vulnerability could be exploited remotely by an unauthenticated user to cause swagentd to abort resulting in a Denial of Service (DoS).

tags | advisory, denial of service
systems | hpux
SHA-256 | 8aa4bb0ea65e9b510124329f1a26548a6ecad919053b932d5696fe03840d0ee2
xpFireConvince.txt
Posted Apr 1, 2006
Authored by Eduardo Braun Prado

By naming a file without a name, the Windows XP firewall may inadvertently trick a user into allowing a malicious application to run.

tags | advisory
systems | windows
SHA-256 | cad8f6954428ca2eddfad293271e4550156b0d16a95b58c6520d7938abb972b8
passwordsafe30.txt
Posted Apr 1, 2006
Site elcomsoft.com

PasswordSafe 3.0 has a weak random number generator.

tags | advisory
SHA-256 | 954e83279ee35055656c5f3c8533f0e6ef3820b4533a07b2d5c91e78d3510be2
Hardened-PHP Project Security Advisory 2006-03.115
Posted Apr 1, 2006
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

KisMAC versions below 73p and development versions below 113 suffer from a stack overflow when handling specially crafted 802.11 management frames.

tags | advisory, overflow
SHA-256 | a6f4fdecd7231d6ebfdad685575d72676300a2933903cc1aa6d21407c8be0a02
Gentoo Linux Security Advisory 200603-25
Posted Mar 31, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-25 - OpenOffice.org includes libcurl code. This libcurl code is vulnerable to a heap overflow when it tries to parse a URL that exceeds a 256-byte limit (GLSA 200512-09). Versions less than 2.0.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 91ec66d028f97ec1dbc9c37bb6db384b20311bf5c53dc1ae56fe4771115b3813
Gentoo Linux Security Advisory 200603-24
Posted Mar 31, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-24 - RealPlayer is vulnerable to a buffer overflow when processing malicious SWF files. Versions less than 10.0.7 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | f1ecd0235d6ab8df272076739a383d0e2edf0a65355aedd9a8d4a332060a7cee
Gentoo Linux Security Advisory 200603-23
Posted Mar 31, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-23 - NetHack, Slash'EM and Falcon's Eye have been found to be incompatible with the system used for managing games on Gentoo Linux. As a result, they cannot be played securely on systems with multiple users. Versions less than or equal to 3.4.3-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 7310e9b67babcdb8a5457ee2240fc46c6306bea7f13f8fefd19f9e156a25fc93
Page 1 of 27
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close