exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files Date: 2006-10-18

rsbac-common-1.3.0.tar.bz2
Posted Oct 18, 2006
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: Various updates and code fixes.
tags | kernel
systems | linux
SHA-256 | 49564170333dbf003f860c1e66e5f5f83f678fceffa79f6f9f053ff7448ddbf5
Samhain File Integrity Checker
Posted Oct 18, 2006
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | fa4abecef011ef5cfdfe399a4ecf6b2dc32640b138c06f647f8f52c4f090a614
mnews20-rfi.txt
Posted Oct 18, 2006
Authored by Le CoPrA

MNews versions 2.0 and below suffer from a remote file inclusion vulnerability in noticias.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 5bf3332aef8d47a1e8a14859281205cea337241a4bd48d867a0f1a48d941c43f
phptopwebs-rfi.txt
Posted Oct 18, 2006
Authored by Le CoPrA

PHP Top Webs suffers from a remote file inclusion vulnerability in config.php.

tags | exploit, remote, web, php, code execution, file inclusion
SHA-256 | 8dbde60397810df248578bf6d573be47cc9158d78af6a1bf3598ee63aeeb0921
news7-rfi.txt
Posted Oct 18, 2006
Authored by Mohandko

news7 suffers from a remote file inclusion vulnerability in news.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | b436c06f5cb959369bd2cbb5dc7b6347e2f0a400277a7e44c95b794bb566b81b
phpbbsecurity-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

phpBB Security version 1.0.1 remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 9c2eb50451fc7a93ebb29ffccc3b66a961cf91fca90aa028782187dcc84e2726
phpbbprillian-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

PhpBB Prillian French remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | fd9484a0febfca129b470d85c7b3573d0d6befd745aa874c7030ff2f540d6465
phpbbarchive-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

PHPBB archive remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 1c4c90539c745f2f8547c8a356a0f59f87f03be0137e29fa3a639984277a20b2
phpbbrpg-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

PHPBB RPG Events version 1.0.0 remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 630f7884372362928c6072514aaeee79319cbfa9f3b0ca9a080cff400fda25b0
spamoborona-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

SpamOborona PHPBB plugin remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | ff6156212d8eb391943cabc693717a3f93db6a69820b5b3e8a55050b001a167e
phpbbaddname-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

phpBB Add Name remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | e870de7881a35b8f100c62cd93907ef47538046eb503ee6d3da4f26d12cf7a90
phpbblat2cyr-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

phpBB lat2cyr versions 1.0.1 and below remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | a20aa14ea0a9b2302776f27615e262378567bfb23b452e2500e880f87518d96c
phpbbplusxl-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

phpBB PlusXL version 2.x build 272 remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 802a207dafb96eb76a2428818f9b5381bd996dc1febb6d6173fcddcefee2604a
newsdefilante-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

news defilante horizontale FR remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 8032a1a872af4c36acf492825b660e5303e9064cd02311d1c5f56323b35e1576
buzlas-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

Buzlas version 2006-1 Full remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | c6df5c81e07522dde7c9dac2dddc4a6e6e0417b0fd025d849eed0f4422644e2b
PHPht-rfi.txt
Posted Oct 18, 2006
Site biyosecurity.org

PHPht Topsites suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2e5509b8c2d894b48ebbce6787031cdfbe19a6a504cabcf86f274ecdbf5bcb17
amazonia-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

AMAZONIA MOD remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | e0827858c300294cfe3268b03b7a31cee73e027d48263dfab5c75acfdc88c630
mauinfo-rfi.txt
Posted Oct 18, 2006
Authored by nima salehi | Site Ashiyane.ir

maluinfo version 206.2.38l remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 841a02f67112fdccaba9d20958b8276bcc25a2ded40705b3e7180f80429dfc66
bloq054-rfi.txt
Posted Oct 18, 2006
Site biyosecurity.org

Bloq version 0.5.4 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 5384bb7970c88222253f4f3167c83cc4a50d25abf761cb416ddc1109021b8fdf
SyscalltableAMD64EN.txt
Posted Oct 18, 2006
Authored by pouik

Whitepaper titled "How to get sys_call_table on amd64 under Linux".

tags | paper
systems | linux
SHA-256 | 11d6399ff6d685f568357529150b4e34ee0ce5665b5ae70367a50f78b5f900af
adv10-xeobook.txt
Posted Oct 18, 2006
Authored by Tamriel

Xeobook versions 0.93 and below suffer from multiple SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
SHA-256 | 5795b955058af528726994b032f50a36358db861e2b5d25c49bdcbbe7ca123cc
adv11-xeoport.txt
Posted Oct 18, 2006
Authored by Tamriel

XeoPort versions 0.81 and below suffer from a SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | 7e26950fde6db7410f8f6fa4b1687a9dbfd2d44996f45ff638bff625940efdf9
AD20061010.txt
Posted Oct 18, 2006
Authored by Sowhat | Site nevisnetworks.com

This vulnerability allows remote attackers to execute arbitrary code in the context of the logged in user. An array boundary condition may be violated by a malicious Microsoft Office (DOC/PPT/XLS) file in order to redirect execution into attacker-supplied data. Exploitation requires that the attacker coerce or persuade the victim to open a malicious Microsoft Office file.

tags | advisory, remote, arbitrary
SHA-256 | 557ac5b561185b4409b354703022b4e5b04b1b7d390dcc2fe8ee31074e5ded9d
Secunia Security Advisory 19537
Posted Oct 18, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a security issue in IBM Lotus Notes, which can be exploited by malicious, local users to manipulate arbitrary files.

tags | advisory, arbitrary, local
SHA-256 | 33ea0db6b17e1a37a52015f88018d278149c244d3c6c71b6ccf41808beacd056
Secunia Security Advisory 22142
Posted Oct 18, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in the BSQ Sitestats component for Joomla, which can be exploited by malicious people to conduct script insertion or SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 6ee7fafb73025694178d1c9408f5b6c48d6180c4d97db18b40651123a3be5ac7
Page 1 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close