exploit the possibilities
Showing 1 - 25 of 53 RSS Feed

Files Date: 2006-01-27

dazuko-2.1.1.tar.gz
Posted Jan 27, 2006
Authored by John Ogness | Site dazuko.org

Dazuko is a kernel module which provides 3rd-party applications with an interface for file access control. Useful for on-demand virus scanning, as a file-access monitor/logger or external security implementations. It operates by intercepting file-access calls and passing the file information to a 3rd-party application. The 3rd-party application then has the opportunity to tell the kernel module to allow or deny the file-access. The 3rd-party application also receives information about the file, such as type of access, process ID, user ID, etc.

Changes: 2.1.1 has been released and is now the recommended stable version. This release has focused on improving support for various Linux kernels, adding a "make install" for Linux, and some minor changes to improve portability.
tags | kernel, virus
systems | linux
MD5 | 35ff694434dedb25fe43dad8db4eb943
ttyrpld-2.12.tbz2
Posted Jan 27, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Bugfixes for FreeBSD, Doc updates.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | f7f0e2c54bf2c18674394a77eb142b6c
openca-0.9.2.5.tar.gz
Posted Jan 27, 2006
Site openca.org

The OpenCA Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide. OpenCA is based on many Open-Source Projects. Among the supported software is OpenLDAP, OpenSSL, Apache Project, Apache mod_ssl.

tags | encryption, protocol
MD5 | 8181ba08016f8c12a91707e61601cd8d
iwar-0.071.tar.gz
Posted Jan 27, 2006
Authored by Da Beave | Site softwink.com

IWar is a war dialer used for auditing your PSTN (phone) network. Its features include random/sequential dialing, Voice over IP using the IAX2 (Intra-Asterisk eXchange) protocol, ASCII flat file and MySQL logging, a curses-based front end, key stroke marking, multiple modem support, several methods of tone detection, save/load state, banner detections (to determine remote system types) and blacklist support.

Changes: Change "caller id" handling a bit. 0.071 will not allow 'spoofing' as 911. Various bugfixes, updated remote banners.
tags | tool, remote, protocol, wardialer
MD5 | 7ae76557d747f4e759bd6d0feb8dcb9b
multiadm-1.0.4.tbz2
Posted Jan 27, 2006
Authored by Jan Engelhardt | Site alphagate.hopto.org

The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.

tags | kernel, root
systems | linux
MD5 | 2a30e3ea1cd0cbfd96c3b5ee01d5b1bf
grsecurity-2.1.8-2.6.14.6-200601211647.patch.gz
Posted Jan 27, 2006
Authored by Brad Spengler | Site grsecurity.net

A new grsecurity patch has been released for the 2.6.14.6 Linux kernel series. It implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features. It was written for performance, ease-of-use, and security. The RBAC system has an intelligent learning mode that can generate least privilege policies for the entire system with no configuration. All of grsecurity supports a feature that logs the IP of the attacker that causes an alert or audit.

tags | kernel
systems | linux, openbsd
MD5 | 327972c2f4e8fab890f58d67bb69e77f
grsecurity-2.1.8-2.4.32-200601211647.patch.gz
Posted Jan 27, 2006
Authored by Brad Spengler | Site grsecurity.net

A new grsecurity patch has been released for the 2.4.32 Linux kernel series. It implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features. It was written for performance, ease-of-use, and security. The RBAC system has an intelligent learning mode that can generate least privilege policies for the entire system with no configuration. All of grsecurity supports a feature that logs the IP of the attacker that causes an alert or audit.

tags | kernel
systems | linux, openbsd
MD5 | 77e5fd7d8bb0eeb8ed8e9d0a4bff5cde
override.tar.bz
Posted Jan 27, 2006
Authored by Amir Alsbih | Site informatik.uni-freiburg.de

The override Rootkit: A LKM Linux 2.6 rootkit that uses patched systemcalls. Features - Hides pids and automatically hides the pids of child processes - Hides network ports - Hides files which begin with a user-defined prefix - Can show the hidden pids.

tags | tool, rootkit
systems | linux, unix
MD5 | 31a9eb52f4907924ba9fb22287b44996
Secunia Security Advisory 18614
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in nfs-server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | a785ccd3afb640718d03465281d62a1a
Secunia Security Advisory 18628
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a vulnerability in My Little Forum, My Little Guestbook, and My Little Weblog, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | 221e40633545f14ca4f94ae90ad1a21e
Secunia Security Advisory 18629
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco VPN 3000 Concentrator, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
MD5 | 3cbef3d6a982a80370318528d76e6d6c
Secunia Security Advisory 18630
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for drupal. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, and conduct script insertion and HTTP response splitting attacks.

tags | advisory, web, vulnerability
systems | linux, debian
MD5 | f8c7903a60df6156fbb41c1bda4f1035
Secunia Security Advisory 18635
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for net-snmp. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, or by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, mandriva
MD5 | 36c4b7bf262c5433592d3bb1f8884978
Secunia Security Advisory 18638
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for nfs-server. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, suse
MD5 | 314c14a8058584b35de33e527bbe89ed
Secunia Security Advisory 18639
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for perl-Net_SSLeay. This fixes a vulnerability, which can be exploited by malicious, local users to weaken certain cryptographic operations.

tags | advisory, local, perl
systems | linux, mandriva
MD5 | 387c8052bb4b0621d94b22e26268c094
Secunia Security Advisory 18617
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - imei has discovered two vulnerabilities in MyBB, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 2609295c1f4d0ab241efb9e625049ce9
Secunia Security Advisory 18627
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for gallery. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
systems | linux, gentoo
MD5 | 4eae3ce6a7be75e30111ccd8f991c4c7
Secunia Security Advisory 18633
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a vulnerability in AndoNET Blog, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 50fab8c91acf29e900893601421c2844
shareaza_advisory.pdf
Posted Jan 27, 2006
Site hustlelabs.com

Shareaza, a P2P file sharing product, suffers from a remote vulnerability that allows code execution.

tags | advisory, remote, code execution
MD5 | 81d0a720e23809562ec54ccb4b874013
eterm-exploit.c
Posted Jan 27, 2006
Authored by Angelo Rosiello | Site rosiello.org

Eterm LibAST exploit for Ubuntu. Yields utmp GID.

tags | exploit
systems | linux, ubuntu
MD5 | 571f6213c9d31ebb23dbc929ba9f1c3c
evuln-mylittlehomepage.txt
Posted Jan 27, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

my little homepage v2004.04.20 is vulnerable to XSS

tags | advisory
MD5 | b45b86521b12da4c27fd7a66264c044f
AndoNET-2004.09.02.txt
Posted Jan 27, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

AndoNET Blog v2004.09.02 suffers from SQL injection in comentarios.php via the "entrada" variable.

tags | advisory, php, sql injection
MD5 | a7f498b6bc40509b055df87fb29702aa
Cisco Security Advisory 20060126-vpn
Posted Jan 27, 2006
Authored by Cisco Systems, Cisco | Site cisco.com

Cisco Security Advisory: Cisco VPN 3000 Concentrator Vulnerable to Crafted HTTP Attack

tags | advisory, web
systems | cisco
MD5 | 79ebb963f37da2d2fdc2651c86544d31
vis.pl.txt
Posted Jan 27, 2006
Authored by spher3 | Site hackerscenter.com

Vis.pl is a perl script which manages files as part of e-cms. It suffers from a directory transversal vulnerability.

tags | exploit, perl
MD5 | f835573c3d690ce10f395098c3e0078e
SUSE-SA-2006-004.txt
Posted Jan 27, 2006
Authored by Ludwig Nussel | Site suse.com

Stefan Esser discovered a bug in in the register_globals emulation of phpMyAdmin that allowes to overwrite variables. An attacker could exploit the bug to ultimately execute code (CVE-2005-4079). Additionally several cross-site-scripting bugs were discovered (CVE-2005-3787, CVE-2005-3665).

tags | advisory
MD5 | 5540d4c1518e4fd77b1b8597f5b4585c
Page 1 of 3
Back123Next

File Archive:

March 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    2 Files
  • 2
    Mar 2nd
    18 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    12 Files
  • 5
    Mar 5th
    19 Files
  • 6
    Mar 6th
    8 Files
  • 7
    Mar 7th
    1 Files
  • 8
    Mar 8th
    1 Files
  • 9
    Mar 9th
    11 Files
  • 10
    Mar 10th
    15 Files
  • 11
    Mar 11th
    9 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    13 Files
  • 14
    Mar 14th
    10 Files
  • 15
    Mar 15th
    13 Files
  • 16
    Mar 16th
    27 Files
  • 17
    Mar 17th
    15 Files
  • 18
    Mar 18th
    23 Files
  • 19
    Mar 19th
    25 Files
  • 20
    Mar 20th
    10 Files
  • 21
    Mar 21st
    6 Files
  • 22
    Mar 22nd
    1 Files
  • 23
    Mar 23rd
    22 Files
  • 24
    Mar 24th
    15 Files
  • 25
    Mar 25th
    22 Files
  • 26
    Mar 26th
    20 Files
  • 27
    Mar 27th
    15 Files
  • 28
    Mar 28th
    10 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close