exploit the possibilities
Showing 1 - 25 of 34 RSS Feed

Files Date: 2005-08-10

Scapy Packet Manipulation Tool 1.0.0
Posted Aug 10, 2005
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do about the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: Various bug fixes.
tags | tool, scanner, python
systems | unix
MD5 | e4930279664b4651c0b657aeb1a0f195
aircrack-2.21.tgz
Posted Aug 10, 2005
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Multiple bug fixes.
tags | tool, wireless
MD5 | b237bd8bb5119ff5d8085eb63165bf3d
TOR Virtual Network Tunneling Tool 0.1.0.14
Posted Aug 10, 2005
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Various bug fixes.
tags | tool, remote, local, peer2peer
MD5 | a3698218371ed0e647886fef0545bb44
Fwknop Port Knocking Utility
Posted Aug 10, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Various additions and bug fixes.
tags | tool, scanner
systems | linux, unix
MD5 | d062bf97701b910244db34ab332c95ac
Technical Cyber Security Alert 2005-221A
Posted Aug 10, 2005
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA05-221A - Multiple patches have been released for vulnerabilities in the Microsoft operating system. Exploitation of these vulnerabilities may allow a remote, unauthenticated attacker to execute arbitrary code with SYSTEM privileges or with the privileges of the user.

tags | advisory, remote, arbitrary, vulnerability
MD5 | 089788fa0f5e6e31fcb4cbd0623330b5
iDEFENSE Security Advisory 2005-08-09.t
Posted Aug 10, 2005
Authored by iDefense Labs, Peter Vreugdenhil | Site idefense.com

iDEFENSE Security Advisory 08.09.05 - Remote exploitation of an input validation vulnerability in AWStats allows remote attackers to execute arbitrary commands. Versions below 6.4 are affected.

tags | advisory, remote, arbitrary
advisories | CVE-2005-1527
MD5 | bb7a37a149ea11dd344fc6c71e8c7706
Ubuntu Security Notice 163-1
Posted Aug 10, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-163-1 - xpdf and kpdf does not sufficiently verify the validity of the loca table in PDF files, a table that contains glyph description information for embedded TrueType fonts.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2005-2097
MD5 | 28ad376d099ede2dc4b8d4819f277fac
airscannerIE.txt
Posted Aug 10, 2005
Site airscanner.com

Airscanner Mobile Security Advisory #05080501 - Internet Explorer's inability to properly identify a file's contents lends itself to being tricked.

tags | advisory
MD5 | ee82b5ba2ce22952cf0c719419c167ad
xmbNoBueno.txt
Posted Aug 10, 2005
Authored by Heintz

XMB forum version 1.9.1 suffers from a SQL injection and a variable poisoning attack.

tags | advisory, sql injection
MD5 | 52e95c9b7c721fc03877e612d3552fcf
Trustix Secure Linux Security Advisory 2005.1
Posted Aug 10, 2005
Site appsecinc.com

User-defined functions in MySQL allow a user in the database to call binary libraries on the operating system. Creating a user-defined function requires insert privileges on the mysql.func table. The UDF creation functions attempt to filter out directory traversal characters, restricting access to libraries only in system and MySQL directories. The problem exists in the fact that MySQL only uses the forward slash (/) as a path separator. Windows machines use the backslash (\) character to separate directories in paths. This allows an attacker to bypass directory traversal checks and include arbitrary files.

tags | advisory, arbitrary
systems | windows
MD5 | d8cf8e5d6063e3094932ed5105ddfb71
Trustix Secure Linux Security Advisory 2005.2
Posted Aug 10, 2005
Site appsecinc.com

User-defined functions in MySQL allow a user in the database to call binary libraries on the operating system. Creating a user-defined function requires insert privileges on the mysql.func table. The init_syms() function uses an unsafe string function to copy a user specified string into a stack based buffer.

tags | advisory
MD5 | 63e6392703ef89628069e12978c50370
Trustix Secure Linux Security Advisory 2005.3
Posted Aug 10, 2005
Site appsecinc.com

User-defined functions in MySQL allow a user in the database to call binary libraries on the operating system. Creating a user-defined function requires insert privileges on the mysql.func table. By using specially crafted CREATE FUNCTION requests it may be possible for attackers to halt the system or execute remote code on some systems.

tags | advisory, remote
MD5 | ea08c4aafbab684e58faedac82b058d2
syn.html
Posted Aug 10, 2005
Authored by rgod | Site retrogod.altervista.org

Synedit 2.0.1 has a null byte insertion / code obfuscation flaws.

tags | advisory
MD5 | 9fb6aac7d39d885e6af8375e10ef7851
funkboard066.txt
Posted Aug 10, 2005
Authored by rgod | Site retrogod.altervista.org

FunkBoard version 0.66CF suffers from multiple cross site scripting flaws, remote code execution, and more. Full exploitation details provided.

tags | exploit, remote, code execution, xss
MD5 | f4bed4c56ff83694efb27c8e811047bf
openSQL.txt
Posted Aug 10, 2005
Authored by Abducter | Site s4a.cc

Open Bulletin Board is susceptible to multiple SQL injection attacks. All versions are affected. Sample exploitation provided.

tags | exploit, sql injection
MD5 | e05ba222117ffe789e97f548d5aae8e8
syscpExec.txt
Posted Aug 10, 2005
Authored by Christopher Kunz | Site hardened-php.net

SysCP versions 1.2.10 and below suffer from a remote code execution flaw.

tags | advisory, remote, code execution
MD5 | 6b1c782b34102a7b0021d0ba8de5ebee
vegadns-dyn0.txt
Posted Aug 10, 2005
Authored by codeslag | Site 0xdeadface.co.uk

VegaDNS suffers from a cross site scripting flaw, amongst others.

tags | exploit, xss
MD5 | d2a1b335b860cf7775deef38a3410981
gravityBad.txt
Posted Aug 10, 2005
Authored by rgod | Site retrogod.altervista.org

Gravity Board X version 1.1 suffers from multiple vulnerabilities that can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or compromise a vulnerable system.

tags | exploit, vulnerability, xss
MD5 | aa6af3863ba0fbdd0fe94ab03da43d80
Secunia Security Advisory 16339
Posted Aug 10, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in XOOPS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 1ed1349701b6be2b441d2896c84f8295
Secunia Security Advisory 16342
Posted Aug 10, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered some vulnerabilities in Gravity Board X, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or compromise a vulnerable system.

tags | advisory, vulnerability, xss
MD5 | cec93f1b83404d06b9e0269a408586a4
Secunia Security Advisory 16348
Posted Aug 10, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - V[i]RuS has discovered a vulnerability in Invision Power Board, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | f8bd5f5c03824572baf6be7da5d649e8
Secunia Security Advisory 16353
Posted Aug 10, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Calendar Express, which can be exploited by malicious people to conduct SQL injection or cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | 3e8936a3df250180157444dade74dc45
Secunia Security Advisory 16354
Posted Aug 10, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system.

tags | advisory, local
systems | windows
MD5 | d4f4a5915170780a57c4be5e2a071efb
Secunia Security Advisory 16355
Posted Aug 10, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
MD5 | 51224d5478259a43dab4a62c62cedfdc
Secunia Security Advisory 16356
Posted Aug 10, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | windows
MD5 | 46dcb41091e9c009c6d2eb7cad9c9430
Page 1 of 2
Back12Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close