exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 53 RSS Feed

Files Date: 2006-01-27

dazuko-2.1.1.tar.gz
Posted Jan 27, 2006
Authored by John Ogness | Site dazuko.org

Dazuko is a kernel module which provides 3rd-party applications with an interface for file access control. Useful for on-demand virus scanning, as a file-access monitor/logger or external security implementations. It operates by intercepting file-access calls and passing the file information to a 3rd-party application. The 3rd-party application then has the opportunity to tell the kernel module to allow or deny the file-access. The 3rd-party application also receives information about the file, such as type of access, process ID, user ID, etc.

Changes: 2.1.1 has been released and is now the recommended stable version. This release has focused on improving support for various Linux kernels, adding a "make install" for Linux, and some minor changes to improve portability.
tags | kernel, virus
systems | linux
SHA-256 | 120a967d446d552ad485f6197f5c9d9cd8b5369ae74104c98641c8e3492031ce
ttyrpld-2.12.tbz2
Posted Jan 27, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Bugfixes for FreeBSD, Doc updates.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 93b8c3b9cf5b61b20a8a949d338ebdfa0f2c8b7781df5c5ecd27ca269e152fb8
openca-0.9.2.5.tar.gz
Posted Jan 27, 2006
Site openca.org

The OpenCA Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide. OpenCA is based on many Open-Source Projects. Among the supported software is OpenLDAP, OpenSSL, Apache Project, Apache mod_ssl.

tags | encryption, protocol
SHA-256 | 7b356b26e455471fe2dcac6c03c95e4ab29b400e8b21ced9691f485baca59f6a
iwar-0.071.tar.gz
Posted Jan 27, 2006
Authored by Da Beave | Site softwink.com

IWar is a war dialer used for auditing your PSTN (phone) network. Its features include random/sequential dialing, Voice over IP using the IAX2 (Intra-Asterisk eXchange) protocol, ASCII flat file and MySQL logging, a curses-based front end, key stroke marking, multiple modem support, several methods of tone detection, save/load state, banner detections (to determine remote system types) and blacklist support.

Changes: Change "caller id" handling a bit. 0.071 will not allow 'spoofing' as 911. Various bugfixes, updated remote banners.
tags | tool, remote, protocol, wardialer
SHA-256 | fac7b4801ad91e478e31f5da3b1feb7d3e2e09c6e281b0476f8c4adf42e52e6a
multiadm-1.0.4.tbz2
Posted Jan 27, 2006
Authored by Jan Engelhardt | Site alphagate.hopto.org

The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.

tags | kernel, root
systems | linux
SHA-256 | e230d05121b93e48db1cedcdc60023126e1672458257223a7e065e75221f888f
grsecurity-2.1.8-2.6.14.6-200601211647.patch.gz
Posted Jan 27, 2006
Authored by Brad Spengler | Site grsecurity.net

A new grsecurity patch has been released for the 2.6.14.6 Linux kernel series. It implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features. It was written for performance, ease-of-use, and security. The RBAC system has an intelligent learning mode that can generate least privilege policies for the entire system with no configuration. All of grsecurity supports a feature that logs the IP of the attacker that causes an alert or audit.

tags | kernel
systems | linux, openbsd
SHA-256 | eaa8d0841c436461c0a8176a81ccbfc192d61cc0a8137702536776b170a512d3
grsecurity-2.1.8-2.4.32-200601211647.patch.gz
Posted Jan 27, 2006
Authored by Brad Spengler | Site grsecurity.net

A new grsecurity patch has been released for the 2.4.32 Linux kernel series. It implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features. It was written for performance, ease-of-use, and security. The RBAC system has an intelligent learning mode that can generate least privilege policies for the entire system with no configuration. All of grsecurity supports a feature that logs the IP of the attacker that causes an alert or audit.

tags | kernel
systems | linux, openbsd
SHA-256 | 1af16f854a638f22bea48ff17e65d41cf97929628d2f1efb3730faf0a5ed0be0
override.tar.bz
Posted Jan 27, 2006
Authored by Amir Alsbih | Site informatik.uni-freiburg.de

The override Rootkit: A LKM Linux 2.6 rootkit that uses patched systemcalls. Features - Hides pids and automatically hides the pids of child processes - Hides network ports - Hides files which begin with a user-defined prefix - Can show the hidden pids.

tags | tool, rootkit
systems | linux, unix
SHA-256 | 04c076c58c76e17bab712708d97f482bcfca9fe65f29cad03d4b68cabbe13393
Secunia Security Advisory 18614
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in nfs-server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | fbca3d6ee86bbcfbddc7f8c6ba9a720c21b94869788de4359d9e8a7cbbed5645
Secunia Security Advisory 18628
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a vulnerability in My Little Forum, My Little Guestbook, and My Little Weblog, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 344d3fb945bd3946f912f84232a8917390b808ff9e765e9e606fb2d98c73b444
Secunia Security Advisory 18629
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco VPN 3000 Concentrator, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | 4568d050e5cfefb96e48d76ba5d84c33e6158ef076bf79f0b804ec3582976dab
Secunia Security Advisory 18630
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for drupal. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, and conduct script insertion and HTTP response splitting attacks.

tags | advisory, web, vulnerability
systems | linux, debian
SHA-256 | 47721504723aafd407f6fb93d45d5980d9b8de189f6090026b86f68a4fa3cf69
Secunia Security Advisory 18635
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for net-snmp. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, or by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, mandriva
SHA-256 | 2bc09eb6f72bb160255b32ea3674458c8e32283a9db1ea05b6e7a1f08ce38916
Secunia Security Advisory 18638
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for nfs-server. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | 16043c0ade4414add7ee0fdd67efa41f1f01b0ce10a39c794a690ea73b29f98d
Secunia Security Advisory 18639
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for perl-Net_SSLeay. This fixes a vulnerability, which can be exploited by malicious, local users to weaken certain cryptographic operations.

tags | advisory, local, perl
systems | linux, mandriva
SHA-256 | d87e25d0023e1938a8cfcd5290126201c0ad35971f9029ae395aca8cdeab484d
Secunia Security Advisory 18617
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - imei has discovered two vulnerabilities in MyBB, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 49f482d71066c4671746d0f62f37379eb5b9ac5d0595562ccdb48a98cacc84e3
Secunia Security Advisory 18627
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for gallery. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
systems | linux, gentoo
SHA-256 | 762f514b6ccc9b6e308cb7534e19ef95dd6b73ab96553f10faae573f32cf687f
Secunia Security Advisory 18633
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a vulnerability in AndoNET Blog, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d6e421f5c2a2c168a0a74bb597c32eb3d8b86027941b2ff4b6fc7bc2261168b8
shareaza_advisory.pdf
Posted Jan 27, 2006
Site hustlelabs.com

Shareaza, a P2P file sharing product, suffers from a remote vulnerability that allows code execution.

tags | advisory, remote, code execution
SHA-256 | 558bf79d1a63a228c41dc5ef9d31ba2a50943261248d81c328532ac0382442f9
eterm-exploit.c
Posted Jan 27, 2006
Authored by Angelo Rosiello | Site rosiello.org

Eterm LibAST exploit for Ubuntu. Yields utmp GID.

tags | exploit
systems | linux, ubuntu
SHA-256 | 368fbf62bd1bd1c27f952c1154970ef9c400e0b7dae8aa841163e6e10ef4ebb6
evuln-mylittlehomepage.txt
Posted Jan 27, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

my little homepage v2004.04.20 is vulnerable to XSS

tags | advisory
SHA-256 | 1f4add3286c8cddc52e3bf32b4fb4eed5aed6a45025b94327903ae42cb12bf55
AndoNET-2004.09.02.txt
Posted Jan 27, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

AndoNET Blog v2004.09.02 suffers from SQL injection in comentarios.php via the "entrada" variable.

tags | advisory, php, sql injection
SHA-256 | 35de2be590011ca4ae3c5500ad351361ba23ea930ca874bfa319fda0c05cf41e
Cisco Security Advisory 20060126-vpn
Posted Jan 27, 2006
Authored by Cisco Systems, Cisco | Site cisco.com

Cisco Security Advisory: Cisco VPN 3000 Concentrator Vulnerable to Crafted HTTP Attack

tags | advisory, web
systems | cisco
SHA-256 | 461ce98665d8f47f2c4e32ab8228adbebd8310fd525df37e500bbe1acc7a7692
vis.pl.txt
Posted Jan 27, 2006
Authored by spher3 | Site hackerscenter.com

Vis.pl is a perl script which manages files as part of e-cms. It suffers from a directory transversal vulnerability.

tags | exploit, perl
SHA-256 | 9fdc7050f5b45aecc2181212ddce45de932feeee80a7d300792bc90d14fede25
SUSE-SA-2006-004.txt
Posted Jan 27, 2006
Authored by Ludwig Nussel | Site suse.com

Stefan Esser discovered a bug in in the register_globals emulation of phpMyAdmin that allowes to overwrite variables. An attacker could exploit the bug to ultimately execute code (CVE-2005-4079). Additionally several cross-site-scripting bugs were discovered (CVE-2005-3787, CVE-2005-3665).

tags | advisory
SHA-256 | b64f32086896128a7524972310d015e83c678f8cf9b97ebf8fd1a79eba34f537
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close