exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2006-10-05

Secunia Security Advisory 22233
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has issued an update for the Apache 2 mod_ssl module. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 5b475f19209959e0af9e7203cabf482f82f7f9fe88f6417858af6dd444fc9e0d
Secunia Security Advisory 22237
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mono, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 2cbe9fef1a30c41f66b977a3505939f88a42a205f030593654f12a6eb46fb5f9
Secunia Security Advisory 22252
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Xerox WorkCentre Pro and Xerox WorkCentre, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | cabaaeead8cbe7d64247e8a7b383b268653686bcd22181e081494af1d678c898
Secunia Security Advisory 22258
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Armorize Technologies has discovered some vulnerabilities in GOOP Gallery, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 35660388818ae4140785a56b6fa9456e4f55d83a3aa4ac6a68a300536e3005f8
Secunia Security Advisory 22268
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for netscape-flash. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 0ec1cb148b7c84f23318e1ea2c94dc20c5f2cfd9801b7d2513a47a400ae80641
Secunia Security Advisory 22269
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kw3[R]Ln has discovered a vulnerability in the Nivisec Static Topics module for phpBB, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 503efd4bb90da382e98c9bd45eb9f679a337249428db0f83a9e4f55727ed46b2
Secunia Security Advisory 22270
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openssh-krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | c3e47f65e984d80478ab7dc6bb880f3adf6b1cebf2b527edd35810c4915396be
Secunia Security Advisory 22274
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct man-in-the-middle attacks, bypass certain security restrictions, and potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | cc73e97b8e664269471d1a283237e040c6e37d149f41f05d8ce45788faa4b258
Secunia Security Advisory 22275
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in osCommerce, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 0a1d5ff516dc299db7819af384d15ae51cdc3fde08fe89586c2726c20b4b4c62
Secunia Security Advisory 22277
Posted Oct 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mono. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local, vulnerability
systems | linux, ubuntu
SHA-256 | e69daa4361298821e4fba2e2cd66ea89f15cf86e8b7206fda5176c595efde119
0609-exploits.tgz
Posted Oct 5, 2006
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for September, 2006.

tags | exploit
SHA-256 | f8578a2f475ce08af04784b4f8a45787c471d1a39ea39f91c53cefca2b76d727
nufw-2.0.9.tar.gz
Posted Oct 5, 2006
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Multiple memory leaks fixed.
tags | tool, remote, firewall
systems | unix
SHA-256 | 90d8e9b16117e6068af47c1ab1e7be5edb2e121870b4bf928be15aa11ec5e9dd
advchk-0.92.tar.gz
Posted Oct 5, 2006
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | 3b0a45e1c28c4ec7e8daa6104c43b6514e974cc5cb2f3f15b1871c741e8ce724
rkhunter-1.2.9.tar.gz
Posted Oct 5, 2006
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Please note this is a non-critical re-release due to fixing tracker issues.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | 64d21cef13574338f49015127d369e1f02515fe4eb81cbda716d885ff4cd1278
aircrack-ng-0.6.2.tar.gz
Posted Oct 5, 2006
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: Applied patch to inject packets with an ipw2200. Added ipw3945 detection. Various bug fixes.
tags | tool, wireless
SHA-256 | 94d505cd469b2b66481dc6ab1f9fa3c9e5967baf012ff28a471d9dfcc44ce892
ndisc6-0.7.1.tar.bz2
Posted Oct 5, 2006
Authored by Remi Denis-Courmont | Site people.via.ecp.fr

ndisc6 consists of three command line tools (ndisc6, rdisc6, and traceroute6) that perform ICMPv6 Neighbor Discovery, ICMPv6 Router Discovery, and IPv6 tcptraceroute/traceroute respectively. It is primarily meant for IPv6 networking diagnostics and monitoring.

Changes: Minor portability fixes.
tags | tool, scanner
systems | unix
SHA-256 | bc18856cd0b915d61b5100c5ca465ab01dce671b09e2d8e5881a0a1c6e08afa3
stone-2.3c.tar.gz
Posted Oct 5, 2006
Authored by Hiroaki Sengoku | Site gcd.org

Stone is an application layer TCP/IP packet repeater. It repeats TCP and UDP packets from the inside of a firewall to the outside or vice versa. It is simple, supports OpenSSL for encrypting and decrypting packets, performing client and server verifications, and sending a substring of the subject of the certificate to the destination, can operate as an HTTP proxy, and performs POP to APOP conversion. It also supports IPv6 and can convert between IPv4 and IPv6 each other.

tags | web, udp, tcp
systems | unix
SHA-256 | 2ef3f63f1ccdb86f00251ca40cb3f99fefa1cbe21858fbc3af92b5c2b0d8ef3f
radmind-1.7.1.tar.gz
Posted Oct 5, 2006
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: fsdiff does not checksum files that are going to be deleted. Added additional wildcard patterns for config file. Using updated DNSServiceDiscovery APIs.
tags | tool, intrusion detection
systems | unix
SHA-256 | 24e5a12bb3d6d94d3587a1ed5c31df97da168d765507b4ec33ab212403542bdd
nsat-1.5-ia64-port.tgz
Posted Oct 5, 2006
Authored by Mixter | Site 1337.tsx.org

Nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. Unlike many other auditing tools, nsat can collect information about services independently of vulnerabilities, which makes it less dependent on frequent updates as new vulnerabilities are found.

Changes: Ported to ia64.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | d0b2a6b6ed3c4b0c04621b3ebab08786234a03ea8f86bb3d5d8e50771411f6c7
openct-0.6.9.tar.gz
Posted Oct 5, 2006
Authored by Andreas Jellinghaus | Site opensc-project.org

OpenCT is a library for accessing smart card terminals. It provides a rich set of functions for driver writers, protocol drivers for T=0 and T=1, serial and USB functionality, including USB hotplugging. The main user of OpenCT is the OpenSC smart card framework, but OpenCT can of course be used by other applications as well. OpenCT provides a native OpenCT, CT-API and PC/SC Lite IFD interface with an OpenCT ifdhandler resource manager.

tags | protocol, library
SHA-256 | 878703c82cbc1caac996063f1efc54d1adc2b2b94a03dad97d813ca6691a6ef0
p0f-2.0.8-db-20060921.tar.gz
Posted Oct 5, 2006
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris. This particular version is modified by Nerijus Krukauskas to store the data in a database.

Changes: p0f 2.0.8 was released.
tags | tool, remote, local, scanner
systems | linux, netbsd, unix, solaris, freebsd, openbsd
SHA-256 | 831a4b6a39b33de014871382233112437df138ac0b88113a1f9b944299087f23
sysmask-1.08.tgz
Posted Oct 5, 2006
Authored by XIAO Gang | Site wims.unice.fr

Sysmask is a security package for Linux systems that can prevent arbitrary malicious codes from causing permanent damage. It protects the system against daemon exploits and user accounts against viruses and worms, whether known or unknown, without requiring the recompilation of existing software.

Changes: Kernel patch update for 2.6.17.13 and 2.4.33.3. Fixed malformed kernel patch problem.
tags | worm, arbitrary
systems | linux
SHA-256 | f82e69f16be11017058cec85631b2a4a7ff659f7f6aa7888ef96daeb0029b2a2
Fwknop Port Knocking Utility
Posted Oct 5, 2006
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various enhancements and improvements.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 8cb35d6f95e9757abe80d2a141a661e06aa63c8b219f0c70cbe8ab5799d90762
bubblegum-1.12.tar.gz
Posted Oct 5, 2006
Site cyclic.sourceforge.net

Bubblegum is a daemon written in C which watches a file's access, modification, and inode change times, logging the changes. It can run an external command, read files from a filelist, and more.

Changes: Build fix for RedHat. Support for directory recursion. Port to Solaris.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0ca449d02976a0d27e1d819318f86b0e021e1a61adbac824d5f8a49f4dc0ab42
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close