what you don't know can hurt you
Showing 1 - 25 of 26 RSS Feed

Files Date: 2007-09-19

Fwknop Port Knocking Utility
Posted Sep 19, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added fwknopd server support for Mac OS X. Various other bug fixes and improvements.
tags | tool, scanner, vulnerability
systems | unix
MD5 | 06219f0e1393a00a4186089fbee30386
fslint-2.24.tar.gz
Posted Sep 19, 2007
Authored by pixelbeat | Site pixelbeat.org

FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

Changes: Added and updated multiple translations. Multiple bug fixes.
tags | tool
systems | unix
MD5 | 30e0c8f962ac012921ce46f981c07208
Tenshi Log Monitoring Program
Posted Sep 19, 2007
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added tail_multiple option, added csv option for comma separated output to custom parser, merged tailargs and filterargs features in tail, filter ones, added FAQ file, another round of rpm spec fixes + fd leak fix.
tags | system logging
systems | unix
MD5 | 7cc328d940d6f6a3f36540d7f16de23d
Ubuntu Security Notice 514-1
Posted Sep 19, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 514-1 - Aaron Plattner discovered that the Composite extension did not correctly calculate the size of buffers when copying between different bit depths. An authenticated user could exploit this to execute arbitrary code with root privileges.

tags | advisory, arbitrary, root
systems | linux, ubuntu
advisories | CVE-2007-4730
MD5 | f84d51fe5ebe137454c39b3057bbb210
MU Security Advisory 2007-09.02
Posted Sep 19, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

There are multiple vulnerabilities where a maliciously-crafted packet can crash Dibbler version 0.6.0. These include packets with options with large lengths (memory allocation failure via integer overflow), invalid lengths (buffer overread), and malformed IA_NA options in a REBIND message (null pointer dereference).

tags | advisory, overflow, vulnerability
MD5 | a589e3d7ea9856fb5a6c6a83328f9b87
Secunia Security Advisory 26799
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Morgan has reported a vulnerability in the Joomla!FlashFun component for Joomla, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 90eea0c692dfb43a0771c6b72e966c79
Secunia Security Advisory 26849
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Morgan has reported a vulnerability in the Joomla!12Pictures component for Joomla, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 25390dc9f80d47024bba2ec4fe84e143
Secunia Security Advisory 26877
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MWR InfoSecurity has reported a vulnerability in Merak Mail Server, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | dbb0d2519c352970c53b6e75d7f66ce9
Gentoo Linux Security Advisory 200709-11
Posted Sep 19, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200709-11 - The result of a g_strsplit() call is incorrectly parsed in the files daemon/gdm.c, daemon/gdmconfig.c, gui/gdmconfig.c and gui/gdmflexiserver.c, allowing for a null pointer dereference. Versions less than 2.18.4 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-3381
MD5 | f49b07b518d79683f8a918ecf59251fa
Gentoo Linux Security Advisory 200709-10
Posted Sep 19, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200709-10 - The PhpWiki development team reported an authentication error within the file lib/WikiUser/LDAP.php when binding to an LDAP server with an empty password. Versions less than 1.3.14 are affected.

tags | advisory, php
systems | linux, gentoo
advisories | CVE-2007-3193
MD5 | c607367dfbb3f4b282cb0aee96f51133
Ubuntu Security Notice 513-1
Posted Sep 19, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 513-1 - Dirk Mueller discovered that UTF8 strings could be made to cause a small buffer overflow. A remote attacker could exploit this by sending specially crafted strings to applications that use the Qt3 library for UTF8 processing, potentially leading to arbitrary code execution with user privileges, or a denial of service.

tags | advisory, remote, denial of service, overflow, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2007-4137
MD5 | acacaa6df6c5f832cadfd25c6d90be13
ttyrpld-2.19.tar.bz2
Posted Sep 19, 2007
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: The kernel interface has been reduced. Various other tweaks and fixes.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | ca4d1473082eb5a38582a626d5b9360d
aqt-exploit.txt
Posted Sep 19, 2007
Authored by Aviv Raff | Site aviv.raffon.net

Apple Quicktime with Internet Explorer .qtl version XAS remote exploit proof of concept.

tags | exploit, remote, proof of concept
systems | apple
MD5 | 2e01952924f7d6177d801dd6fa121cc9
phpbbstyles-sql.txt
Posted Sep 19, 2007
Site inj3ct-it.org

Remote SQL injection exploit for the Ktauber.com StylesDemo module for phpBB version 2.0.xx.

tags | exploit, remote, sql injection
MD5 | b8f456ce25c0f27cc21a6e534f4e8891
airsensor-dos.txt
Posted Sep 19, 2007
Authored by Alex Hernandez

Airsensor M520 httpd remote preauth denial of service buffer overflow proof of concept exploit.

tags | exploit, remote, denial of service, overflow, proof of concept
MD5 | 3266eb65c82294c12865f53eeb262f5f
wifizoo_v1.1.tgz
Posted Sep 19, 2007
Authored by Hernan Ochoa

WifiZoo is a tool to passively gather wifi information. It works much along the lines of Ferret and Dsniff but is written in Python.

tags | tool, python, wireless
MD5 | ae9fe2befde750d5a9f29b0ee974c238
gcaldaemon-dos.txt
Posted Sep 19, 2007
Authored by Luca Carettoni | Site securenetwork.it

GCALDaemon version 1.0-beta13 is susceptible to denial of service attacks via a specially crafted HTTP request.

tags | exploit, web, denial of service
MD5 | e9d5651e414dd28f5609b8ed71e9bd2c
obedit-xss.txt
Posted Sep 19, 2007
Authored by Ishkur

Obedit version 3.03 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 8a845e0e138fc3b654bd8ccc69b31396
Secunia Security Advisory 26791
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for avahi. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, mandriva
MD5 | 1847c62397cb8527e9ac12a5a349c9a8
Secunia Security Advisory 26816
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | a37e916cd8c5e33fa5966e4d9b58ffdd
Secunia Security Advisory 26822
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or bypass certain security restrictions, and by malicious people to cause a DoS, conduct cross-site scripting attacks, or compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, xss
MD5 | 50fce91fad0516010a7c06348116a8bb
Secunia Security Advisory 26832
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - j00ru has discovered a vulnerability in WinImage, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | d921b41b694dd5d2396e1c301c0b767b
Secunia Security Advisory 26835
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Adam Baldwin has reported a vulnerability and a security issue in RemoteDocs R-Viewer, which potentially can be exploited by malicious, local users to disclose sensitive information and by malicious people to compromise a vulnerable system.

tags | advisory, local
MD5 | fa14a0e721422938bca9253ffada9f17
Secunia Security Advisory 26839
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 192924636f23d78fd592dd5643998695
Secunia Security Advisory 26854
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - malibu.r has reported a vulnerability in b1gMail, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 72271bc398a7a32fd201eaac9f8c8e62
Page 1 of 2
Back12Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    1 Files
  • 9
    Aug 9th
    2 Files
  • 10
    Aug 10th
    27 Files
  • 11
    Aug 11th
    11 Files
  • 12
    Aug 12th
    11 Files
  • 13
    Aug 13th
    17 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close