what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 2006-02-09

shellter-0.9.5.tar.gz
Posted Feb 9, 2006
Authored by marcos pinto aka markybob

ShellTer is an iptables-based firewall. What sets it apart from the rest is that it has built-in SSH brute force protection. It is easy to configure and has an interactive CLI installer.

tags | tool, firewall
systems | linux
SHA-256 | 57b65bc44ca1669af5ad8ede10cae47a84ccf709703180479007e36ff276485c
WiredRedXSS.txt
Posted Feb 9, 2006
Authored by Adrian Castro

WiredRed EPOP WebConference server version 4.1.0.755 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | f3e8e0574ab17e4c3f798104da79baf6a7b5c08a39a3ee1660311c042a69f832
halfLifeDoS.txt
Posted Feb 9, 2006
Authored by Firestorm

Remote denial of service exploit for Half-Life engines that cause it to fall in an infinite loop and stop processing requests.

tags | exploit, remote, denial of service
SHA-256 | 47b10922cc1fe2a7499cae6d2e6022254c20339cfd77789cfe63b9f4c6ee69da
EV0070.txt
Posted Feb 9, 2006
Authored by Aliaksandr Hartsuyeu

PHP iCalendar versions 2.0.1, 2.1, and 2.2 suffer from a file inclusion vulnerability.

tags | advisory, php, file inclusion
SHA-256 | f639ed07e231474ff50ebb23381c5826750e7ec8e5b2288800689478e498282a
InformationSecurity.pdf
Posted Feb 9, 2006
Authored by Mohammad Heydari

Whitepaper entitled "The Role of Modeling and Simulation in Information Security".

tags | paper
SHA-256 | 5f8856fb2b9965e4af48075871fdccda90ef3461fa0ec709beca8292fca13122
spip_182g_shell_inj_xpl.html
Posted Feb 9, 2006
Authored by rgod | Site retrogod.altervista.org

SPIP versions 1.8.2g and below remote command execution exploit that makes use of an arbitrary local inclusion flaw and SQL injection.

tags | exploit, remote, arbitrary, local, sql injection
SHA-256 | 59a62d80b8dadeee1215c4be9c2ad51fb3504482b5aa036653d700829a4ef5c1
dragonfly9.0.6.1_incl_xpl.html
Posted Feb 9, 2006
Authored by rgod | Site retrogod.altervista.org

CPGNuke Dragonfly version 9.0.6.1 remote command execution exploit that makes use of an arbitrary local inclusion flaw.

tags | exploit, remote, arbitrary, local
SHA-256 | e65fc321596ba35cd34f5b98312c94811bbc295ab5ad13a5d76973b326457761
whompSQL.txt
Posted Feb 9, 2006
Authored by Night_Warrior

Whomp Real Estate Manager XP 2005 is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 8d8fb7f863cb04a9b261a2efc763e7afd8dbf0a312752295af01fa6115b66215
rcovert-0.1.tar.gz
Posted Feb 9, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

Raw Covert is a program that initiates a covert channel over IEEE 802.11 networks thanks to wireless raw injection. It aims at encoding a covert channel in valid ACK frames in the RA address field. This program is a basic proof-of-concept code.

Changes: Public release.
tags | tool, wireless
SHA-256 | c5841ce4e81f8eb059f35f0253eb832ea09516d507b38ba7301dd6b8f12bd765
rglueap-0.1.tar.gz
Posted Feb 9, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

Raw Glue AP is a program that catches wireless stations searching for preferred SSIDs. This tool catches probe requests, send back appropriate probe responses and then tries to catch authentication and association requests. This is a kind of Glue AP which purpose is to catch clients that are actively scanning for any SSID. All this stuff is done in monitor mode and uses raw injection which seems to be required if this method may be implemented in a Wireless IDS (that usually perform detection in monitor mode). This program is a basic proof-of-concept code.

Changes: Public release.
tags | tool, wireless
SHA-256 | 13cce714959056d41627ec9442342d46072f9d72ef57554b9d03ebfb353ed2d1
rfakeap-0.2.tar.gz
Posted Feb 9, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

Raw Fake AP is a program that emulates IEEE 802.11 access points thanks to wireless raw injection. It aims at creating/injecting both beacon and probe response frames in order to emulate valid IEEE 802.11 access points. This program is a basic proof-of-concept code.

Changes: Aded a probe response mode.
tags | tool, wireless
SHA-256 | 4e5f63d8488b0fbd1a709429feb797c8c679de48f47ef93ab4741f8506830667
Secunia Security Advisory 18713
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 3APA3A has discovered a weakness in The Bat!, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | c06ae4eb6925c46d812d2fd38ec917d9b14fde36faf34bd8e3d872e4039ffd7f
Secunia Security Advisory 18728
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kevin Finisterre has reported a vulnerability in Lexmark X1100 Series, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 59109ed7a3ccc402646346d24bb0c7395c8961560ee0a8d819ef2585fa9ef169
Secunia Security Advisory 18729
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 931be7c3c224cd192f2e7716da7c34662c53650a399e2be1324ab39cc342d77c
Secunia Security Advisory 18741
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pierre Betouin has reported a vulnerability in hcidump, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d7debdb296be998c651044e5aa477efa9175407e52f6ba7669c7ed37f0e701bf
Secunia Security Advisory 18744
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Peter Winter-Smith of NGSSoftware has reported a vulnerability in the LexBce Server Service included with various Lexmark printers, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | b2cfca0c56bd61be4474a085d46621610415c466e0cdc072433184e08c82d192
Secunia Security Advisory 18747
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pierre Betouin has discovered a vulnerability in various Sony Ericsson cell phones, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | fbefb9f69cbc4273a9894d7eac91d2fe3026d36d46e0de85f2f2a37b0a92406e
Secunia Security Advisory 18750
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in QNX Neutrino RTOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 8cd90bffb754f5b010d943fed4b567347be58a0ffb37def27d6cd6d2785ff393
Secunia Security Advisory 18754
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - imei addmimistrator has discovered a vulnerability in MyBB, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | c4d0858942468fc62984cfa39a1d2b04a192f9950e0e04af471a589dbc8b18c9
Secunia Security Advisory 18756
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sudhakar Govindavajhala and Andrew W. Appel have reported some security issues in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | efb4280f570a25d41ba764a078fb25a6bbb06ab017995fff96e93bc6c508f60c
Secunia Security Advisory 18758
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered some vulnerabilities in phphg Guestbook, which can be exploited by malicious people to conduct script insertion and SQL injection attacks, and bypass certain security restrictions.

tags | advisory, vulnerability, sql injection
SHA-256 | a25d167ac20d322e9c398d86146e242ecb28906f131775fc9bebbce43aaf6f19
Secunia Security Advisory 18759
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered two vulnerabilities in Unknown Domain Shoutbox, which can be exploited by malicious people to conduct script insertion and SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | e8895802924ce7fe8154d0711cd1bdf73ea68d70bb84c9b2eba1f9538d3d0a11
Secunia Security Advisory 18761
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has reported two vulnerabilities in GuestBookHost, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 9b2df2d609dce85e389ec7fa218fc55a226a50f0ad2583abb00beb040562af30
Secunia Security Advisory 18763
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, php
systems | linux, mandriva
SHA-256 | 6f057f501b4f87884bf4f1453936b51f020c74b37aaf2f46c143a194fefce15e
Secunia Security Advisory 18766
Posted Feb 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel
systems | linux
SHA-256 | af72b17195bc60ac7b46f51c65468cecccf5cdc8a4479fbb2078fec027506125
Page 1 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close