exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2005-03-01 to 2005-03-02

issue_4_2004.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 4 Astalavista Security Newsletter

SHA-256 | 492d751f3c31d4d620033abe24b48776691a16ffa121f0ead0a34a4f41ea635e
issue_2_2003.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 2 Astalavista Security Newsletter

SHA-256 | 01bd7d5eebd974150d38e3b2387b71a7ba51ca405ed452364211f6e35746f523
issue_3_2003.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 3 Astalavista Security Newsletter

SHA-256 | e646d451cfb1e653e4174de5a96977b584656490f329d4382924d45586b829e6
issue_12_2004.txt
Posted Mar 1, 2005
Authored by astalavista | Site astalavista.com

Featured articles - Can our 5k firewall tell us if we're really under attack? ; Will my PC ever be secured? Part 1 - basic security concepts - Interview with Mitchell Rowton from SecurityDocs.com

SHA-256 | ff7a6004fcd9cbf41371a09977a34aff81bdd511a32a67b3f1da4e91ad82c6c0
issue_1_2003.txt
Posted Mar 1, 2005
Authored by astalavista

Issue 1 Astalavista Security Newsletter

SHA-256 | 4bfc66b4cc7969e00e63d3503f22f5de7786e39c2fb562bb813e5c3e32c2801e
issue_11_2004.txt
Posted Mar 1, 2005
Authored by astalavista | Site astalavista.com

Featured articles - Company's best practices on anti-spam prevention ; How to effectively fight spam - pratical tips - Interview with Dave Wreski from LinuxSecurity.com

SHA-256 | a2781cc386867d81a71d62326e91d202b477ee4063ec51bd329b77fbef0d0dc4
issue_10_2004.txt
Posted Mar 1, 2005
Authored by astalavista | Site astalavista.com

Featured articles - Passwords - Common Attacks and Possible Solutions - Interview with Anthony Aykut from Frame4.com

SHA-256 | d210bc4442e08b4f2b9a5c4c6e9a108b32e645ade65554176fb17e7d5f8940a0
0502-exploits.tgz
Posted Mar 1, 2005
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for February, 2005.

tags | exploit
SHA-256 | 191da9ffce9c9d89dc8e51895a6ec83a809653dcc1b497f0d0af65dc61cfbda4
Gentoo Linux Security Advisory 200502-32
Posted Mar 1, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-32 - Ulf Harnhammar discovered that UnAce suffers from buffer overflows when testing, unpacking or listing specially crafted ACE archives. He also found out that UnAce is vulnerable to directory traversal attacks, if an archive contains ./.. sequences or absolute filenames.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-0160, CVE-2005-0161
SHA-256 | ae4a4c5c890780d64193effa07efc6176d68f843d0ba2cc2659c08cbd16090df
Gentoo Linux Security Advisory 200502-31
Posted Mar 1, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-31 - Takumi Asaki discovered that uim insufficiently checks environment variables. setuid/setgid applications linked against libuim could end up executing arbitrary code. Versions below 0.4.5.1 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2005-0503
SHA-256 | 96ef48c9a6a658e8af62e64b7d27c3a85a1dc6cdb6a33aa95d9b0b3ce8ea6cb4
022805.txt
Posted Mar 1, 2005
Authored by Amit Klein | Site webappsec.org

This paper describes several techniques for exposing file contents using the site search functionality. It is assumed that a site contains documents which are not visible/accessible to external users. Such documents are typically future PR items, or future security advisories, uploaded to the website beforehand. However, the site is also searchable via an internal search facility, which does have access to those documents, and as such, they are indexed by it not via web crawling, but rather, via direct access to the files. Therein lies the security breach.

tags | paper, web
SHA-256 | 95d07a72940beb4eb7d8ef7e8dce89e68ae8dd623e9569d62e531063c6e241f1
Page 2 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close