exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2006-12-29

plash_1.17.orig.tar.gz
Posted Dec 29, 2006
Authored by Mark Seaborn | Site plash.beasts.org

Plash is a sandbox for running GNU/Linux programs with minimum privileges. It is suitable for running both command line and GUI programs. It can dynamically grant Gtk-based GUI applications access rights to individual files that you want to open or edit. This happens transparently through the Open/Save file chooser dialog box, by replacing GtkFileChooserDialog. Plash virtualizes the file namespace and provides per-process/per-sandbox namespaces. It can grant processes read-only or read-write access to specific files and directories, mapped at any point in the filesystem namespace. It does not require modifications to the Linux kernel.

Changes: Various updates and fixes.
tags | tool, kernel
systems | linux, unix
SHA-256 | 39c171fe00850cdb0a4b825e1842f17f0703d13776f9b5c86f7961d0808dd892
durian-302-exec.txt
Posted Dec 29, 2006
Authored by rgod | Site retrogod.altervista.org

Durian Web Application Server version 3.02 freeware for Win32 buffer overflow exploit.

tags | exploit, web, overflow
systems | windows
SHA-256 | 1ec4bec9b4831edea37252314d1cf5ab292efd79cfee4332f818a0de5267884b
durian-302-dos.txt
Posted Dec 29, 2006
Authored by rgod | Site retrogod.altervista.org

Durian Web Application Server version 3.02 freeware for Win32 denial of service exploit.

tags | exploit, web, denial of service
systems | windows
SHA-256 | 36e7d8607fffd1652b89eac5d8cda415e96ffcc2d435145cc53598d9e824249c
Debian Linux Security Advisory 1244-1
Posted Dec 29, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1244-1 - It was discovered that the Xine multimedia library performs insufficient sanitizing of Real streams, which might lead to the execution of arbitrary code through a buffer overflow.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2006-6172
SHA-256 | e202c237c2787dd791adab6c2a7554e3d822eb7f6f3a850884507adb63dd682f
openser110-sms.txt
Posted Dec 29, 2006
Authored by sapheal

A memory corruption condition has been discovered in the OpenSER SMS handling module. Versions 1.1.0 and below are affected.

tags | advisory
SHA-256 | 484303104de315ea5d9fd85799b9664894e8389db532bc70a191c30073f4389e
openser110-osp.txt
Posted Dec 29, 2006
Authored by sapheal

A buffer overflow vulnerability has been discovered in the OpenSER OSP module. Versions 1.1.0 and below are affected.

tags | advisory, overflow
SHA-256 | 42a4b2aa0f57d83ca91f9994b291e1190eff41754422867b20123ad93fe24821
limboCMS-rfi.txt
Posted Dec 29, 2006
Authored by XORON

The Limbo CMS event module suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 9a79d39c64654ee7d119a0006ecd3be128f7126af8c6d75b09819b71dcfd6e43
Secunia Security Advisory 23465
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Takagi Hiroshi has reported a vulnerability in tDiary, which can be exploited by malicious people to compromise vulnerable systems.

tags | advisory
SHA-256 | 911f7cf7ad2eb5d3423bde92a74448287b2be9b30d5595ca6bbfc27e4762fd87
Secunia Security Advisory 23491
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ruben Santamarta has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
systems | windows
SHA-256 | 87c773946aee7fecc3ce7dabd03d2ef8e8a866a34cf6bb0d23b8e42124504cd5
Secunia Security Advisory 23500
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hack2prison has reported a vulnerability in AlstraSoft Web Host Directory, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory, web
SHA-256 | 1c2ed58843aedb1a9a3f534ec405403a11d337d0e601fda1831ee7052c05e506
Secunia Security Advisory 23504
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | f1313eae21ec52c89115ff9932497453e404968ed9408bf7522eb82ca2908465
Secunia Security Advisory 23528
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered three vulnerabilities in Cacti, which can be exploited by malicious people to bypass certain security restrictions, manipulate data and compromise vulnerable systems.

tags | advisory, vulnerability
SHA-256 | cb51aeea8abaf6070b6543b34052d31774172c46a30ee8212d0a28f84e04670f
Secunia Security Advisory 23545
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox and MozillaThunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of certain information, conduct cross-site scripting attacks and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, suse
SHA-256 | b0eb0fbdebf5d837bc689f73ea81d1dd954f4f8edb77f9c628a8b9a0b6fdefa4
Secunia Security Advisory 23563
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Joomla!, where some have unknown impacts and one can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5ccae12cdcb3f8b0e25eead8a66b49450645a5af78032f03cba03123f7d5ffc5
Secunia Security Advisory 23567
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | a8aed9eafa5f93d4144c11abd9ebb79acf0feb482c147c7751d62ca1bc6ccb12
Secunia Security Advisory 23569
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in AIDeX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ec0f7cedd4c2ba16582e39de2300cac5f814ed2a0b7dfd32d53152e666cf0d6f
Secunia Security Advisory 23571
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ajann has reported two vulnerabilities in While You Were Out and In / Out Board, which can be exploited by malicious people to bypass certain security restrictions and manipulate data.

tags | advisory, vulnerability
SHA-256 | 62064520dda973879aa7b7f0298a06f415f3cb35cf6ea7c683cb4df3bc823877
Secunia Security Advisory 23573
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ajann has reported a vulnerability in ASPTicker, which can be exploited by malicious people to conduct SQL Injection attacks.

tags | advisory, sql injection
SHA-256 | cafee32ff1f13c1bb61aa87d8472b03652edbe3e94b7feea8a8cca1bab8591da
Secunia Security Advisory 23574
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kacper has discovered a vulnerability in WebText CMS, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 3d120cfff72c9b767c3b9b2692e829cd1c1902c1c5c8ae21d84fa74fd592525f
Secunia Security Advisory 23579
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for evince. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 5b9cb63d79f4b84c198ca4bfdf9697ae4ad0ce86eab7426fea83b1de6568984a
Secunia Security Advisory 23580
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for elog. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service), and malicious users to conduct script insertion attacks, cause a DoS, and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, xss
systems | linux, debian
SHA-256 | 400b602bd3a4652f70f20e52f1a09a93849687d7afcd4e4ffbb280ff480a257b
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close