exploit the possibilities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2005-02-06

Posted Feb 6, 2005
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Mostly bug fixes, large and small with a couple of minor features included.
tags | web
systems | linux
MD5 | e83e4e643785acc3ad91731e87452c4c
NMB Scanner 1.2.4
Posted Feb 6, 2005
Authored by Gregoire Barbier | Site gbarbier.free.fr

NMB Scanner scans the shares of a SMB network, using the NMB and SMB protocols. It is useful for acquiring information on a local area network for such purposes as security auditing. It can obtain such information as NMB/SMB/Windows hostname, IP address, IP hostname, ethernet MAC address, Windows username, NMB/SMB/Windows domain name, and master browser. It can discover all the NMB/SMB/Windows hosts on a local area network by using the hosts lists maintained by master browsers.

tags | tool, local, scanner, protocol
systems | windows, unix
MD5 | 554c3bf829f8f8f91fbb18c73d40fcdf
Posted Feb 6, 2005
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: Support of redundancy protocols (VRRP, HSRP) has been enhanced. Other minor improvements have been made.
systems | unix
MD5 | 875af15b111b3c998fc8776bb835e577
Posted Feb 6, 2005
Authored by Donato Ferrante | Site autistici.org

RaidenHTTPD version 1.1.27 is susceptible to a directory traversal flaw where any file can be extracted from the disk partition where the httpd is installed.

tags | exploit
MD5 | 43f94e3e8371843f56deb595922201ea
Posted Feb 6, 2005
Authored by xouyang

Foxmail server version 2.0 is susceptible to a boundary error condition in the MAIL FROM: directive. Sample denial of service exploit provided.

tags | exploit, denial of service
MD5 | 53745a0a1a685d27bf8cee5bfc21f743
Posted Feb 6, 2005
Site x0n3-h4ck.org

Savant Web Server 3.1 remote buffer overflow exploit. Tested on Windows 2003 Server.

tags | exploit, remote, web, overflow
systems | windows
MD5 | d43f10eb6f2f7530f361c1af4c80561a
Debian Linux Security Advisory 667-1
Posted Feb 6, 2005
Authored by Debian | Site debian.org

Debian Security Advisory 667-1 - John Heasman and others discovered a bug in the PostgreSQL engine which would allow any user load an arbitrary local library into it.

tags | advisory, arbitrary, local
systems | linux, debian
MD5 | 699af5b5ce1a6234cb9b588b652f2046
Debian Linux Security Advisory 667-1
Posted Feb 6, 2005
Authored by Debian | Site debian.org

Debian Security Advisory 667-1 - Several vulnerabilities have been discovered in Squid, the internet object cache, the popular WWW proxy cache.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2005-0173, CVE-2005-0175, CVE-2005-0194, CVE-2005-0211
MD5 | 3f912ffd49b085ea9799a2a2e54d385c
Posted Feb 6, 2005
Authored by Adam Zabrocki | Site pi3.int.pl

Remote proof of concept exploit for the buffer overflow vulnerability discovered in Exim 4.41 by iDEFENSE.

tags | exploit, remote, overflow, proof of concept
MD5 | 324ccf097d26867f28e4b63433a01a59
Posted Feb 6, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit.

tags | exploit, shell, local, root
MD5 | 9b4e98143d6e94b1594d38293eede9a3
Secunia Security Advisory 14135
Posted Feb 6, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PowerDNS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 741592119abd496f295d32f8f5e7c323
Posted Feb 6, 2005
Authored by Jonathan Rockway | Site uic.edu

Apple's Safari web browser ignores the Content-type: sent by the web server. As a result, plain text is rendered as HTML. This is obviously undesirable; a text file could contain HTML and carry out a cross site scripting attack. Version 1.2.4 v125.12 found vulnerable.

tags | advisory, web, xss
systems | apple
MD5 | 97616abec2615a6f697386cb6b742e66
Secunia Security Advisory 14131
Posted Feb 6, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Yiannis Girod has reported a vulnerability in Claroline, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | c319f5120ff735c563774a556f64e4c2
Secunia Security Advisory 14125
Posted Feb 6, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | bc61dc841d3c44ecec40cf200125678b
Ubuntu Security Notice 74-1
Posted Feb 6, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-74-1 - Jean-Samuel Reynaud noticed a programming error in the IPv6 handling code of Postfix when /proc/net/if_inet6 is not available (which is the case in Ubuntu since Postfix runs in a chroot).

tags | advisory
systems | linux, ubuntu
MD5 | 43b1a3fc43e4c357d603af4a8cb16def
Posted Feb 6, 2005
Authored by 1dt.w0lf | Site rst.void.ru

LiteForum version 2.1.1 SQL injection exploit with one char bruteforce.

tags | exploit, sql injection
MD5 | da93868e99ea5cdfc9f0d53edfc536c4
Posted Feb 6, 2005
Authored by Rstack Team | Site rstack.org

Rstack Team Security Advisory RSTACK-200502-02 - The Rstack team has discovered a tiny denial of service flaw in the Linksys PSUS4.

tags | advisory, denial of service
MD5 | 1509f77b40c85e46bee967916cc79787
Secunia Security Advisory 14083
Posted Feb 6, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Niels Heinen has reported two vulnerabilities in newsgrab, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, and potentially by malicious people to compromise a user's system.

tags | advisory, local, vulnerability
MD5 | 1ee3e27f17d4866a24eb89fd1529f157
Posted Feb 6, 2005
Authored by Esteban Martinez Fayo | Site security-papers.globint.com.ar

This presentation explores new methods in exploiting SQL injection vulnerabilities inherent in Oracle Database. It contains a presentation with 37 slides and various exploits that demonstrate examples of flaws.

tags | paper, vulnerability, sql injection
MD5 | ca05f9b7e93a0d18ffbf0046f5a4908e
Posted Feb 6, 2005
Authored by qobaiashi

An integer bug exists in the ipv6 implementation of the Linux 2.4.20 and 2.6.4 kernel series allowing for a local denial of service attack.

tags | advisory, denial of service, kernel, local
systems | linux
MD5 | ec48e1b8ac926d0a0d962da901e87c32
Page 1 of 1

File Archive:

December 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    22 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By