exploit the possibilities
Showing 1 - 25 of 37 RSS Feed

Files Date: 2007-12-07

Tor-ramdisk i686 UClibc-based Linux Distribution 20101207
Posted Dec 7, 2007
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP.

Changes: This release adds scp functionality using openssh-5.6p1 to import or export the configuration file and private RSA key. The build system was reworked to build dynamically linking binaries rather than static binaries. Also, tor was updated to 0.2.1.27, busybox to 1.17.4, and the kernel to 2.6.32.25 plus Gentoo's hardened-patches-2.6.32-30.extras.
tags | tool, kernel, peer2peer
systems | linux
MD5 | cc2897a51a88eedf04746b8b426f7d50
HP Security Bulletin 2006-12.61
Posted Dec 7, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to execute arbitrary code with the permissions of the NNM server.

tags | advisory, arbitrary
advisories | CVE-2007-6204
MD5 | 85e069e026e75fadfb5da36308648a58
Debian Linux Security Advisory 1421-1
Posted Dec 7, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1421-1 - A vulnerability has been discovered in Battle for Wesnoth that allows remote attackers to read arbitrary files the user running the client has access to on the machine running the game client.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2007-5742
MD5 | ae9ba3df00e201222644fe99a887e011
Securing_and_Hardening_Linux_v1.0.pdf
Posted Dec 7, 2007
Authored by Glafkos Charalambous | Site astalavista.com

Security and Hardening Linux - A paper that is a step by step guide to securing a Linux system for home or production use.

tags | paper
systems | linux
MD5 | 3d62d8443da08a5378cd37fd07f1968f
AD20071206.txt
Posted Dec 7, 2007
Authored by Sowhat | Site nevisnetworks.com

Avast! Home/Professional versions below 4.7.1098 suffer from a remote heap corruption vulnerablity when processing tar files.

tags | advisory, remote
MD5 | d8ae0cd83f95804e538540b842699117
NSFOCUS Security Advisory 2007.2
Posted Dec 7, 2007
Authored by NSFOCUS | Site nsfocus.com

The NSFOCUS Security Team has discovered a remote buffer overflow vulnerability in the Cisco Security Agent for Windows which allows remote code execution by sending a malicious SMB request. Cisco Security Agent for Windows versions below 4.5.1.672, 5.0.0.225, 5.1.0.106, and 5.2.0.238 are affected.

tags | advisory, remote, overflow, code execution
systems | cisco, windows
advisories | CVE-2007-5580
MD5 | d2671763fc6dff1909051adc8a6d2a7a
penpals-sql.txt
Posted Dec 7, 2007
Authored by The-0utl4w | Site aria-security.net

The PenPals login and search pages suffer from a SQL injection vulnerability.

tags | advisory, sql injection
MD5 | dceb2c97d715efc0d06d9b2f8cc5365f
SUSE-SA-2007-065.txt
Posted Dec 7, 2007
Site suse.com

SUSE Security Announcement - Secunia Research has reported a bug in function reply_netbios_packet() that allowed remote attackers to execute arbitrary code by sending specially crafted WINS "Name Registration" requests followed by a WINS "Name Query" request packet. The exploitable code in samba can only be reached if the option "wins support" was enabled. Another bug reported by Secunia Research affected the processing of GETDC mailslot request in nmbd. This error can also be exploited remotely to execute arbitrary code, but only if samba was configured as Primary or Backup Domain Controller.

tags | advisory, remote, arbitrary
systems | linux, suse
advisories | CVE-2007-4572, CVE-2007-5398
MD5 | bf30e29987d3f708bc1c72c9e184b784
sendicmp-append.txt
Posted Dec 7, 2007
Authored by bannedit | Site blacksecurity.org

Send ICMP nasty garbage append file logrotate exploit that makes use of sing.

tags | exploit
MD5 | 7c51557fd6fef68a600ffda4cccc400d
mwopen-sql.txt
Posted Dec 7, 2007
Authored by KiNgOfThEwOrLd | Site inj3ct-it.org

MWOpen E-Commerce suffers from a remote SQL injection vulnerability in leggi_comenti.asp.

tags | exploit, remote, sql injection, asp
MD5 | 5b0a6832a26a1f55655f928e7f22557b
serweb-rfilfi.txt
Posted Dec 7, 2007
Authored by GolD_M | Site tryag.cc

SerWeb versions 2.0.0 dev1 2007-02-20 and below suffer from multiple remote and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
MD5 | fe882164e8c8e9c4285283912f6bc8b6
wppict-disclose.txt
Posted Dec 7, 2007
Authored by GolD_M | Site tryag.cc

The Wordpress PictPress plugin versions 0.91 and below suffer from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
MD5 | 5fd1331960c2fc77e318b3afce656fba
Secunia Security Advisory 27889
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the libext2fs library of e2fsprogs, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
MD5 | 1ef263b94e40f777769404d0a05f2a67
Secunia Security Advisory 27898
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - The Madynes research team has reported a vulnerability in Cisco IP Phone 7940, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
MD5 | 32bfc3fff16bac8aa603204479563aea
Secunia Security Advisory 27902
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dave Lewis has reported a vulnerability in CiscoWorks Common Services, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 3bab3262f0d944d164800f2d89afeaf6
Secunia Security Advisory 27914
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org and hsqldb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | e337a414b2ee67267be3d62395287545
Secunia Security Advisory 27916
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | 7c743deb346b784fb625c15b6325e692
Secunia Security Advisory 27918
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Fusion News, which can be exploited by malicious users to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | c39f16b8fea9da94cb2b0110ca789e45
Secunia Security Advisory 27927
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | 452175b7e56e72fb9d5f6b0dcb9775cc
Secunia Security Advisory 27930
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in HTTP File Server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory, web
MD5 | 28e90f8c0b3dad9562c5b8e75fd95a44
Secunia Security Advisory 27931
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openoffice.org and hsqldb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
MD5 | 11e0f63240205595041b2a09b66e8658
Secunia Security Advisory 27932
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Drupal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 79eff5fa87f603aea94f22dfde9e4446
Secunia Security Advisory 27934
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Skype, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | c2ba77deba88c145d561b6aa5c190e0d
Secunia Security Advisory 27938
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mu-b has reported a vulnerability in Apple Mac OS X, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | apple, osx
MD5 | 9600ab03b33e486eec0fdd9bb86b1489
Secunia Security Advisory 27941
Posted Dec 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Lotus Sametime, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 8006793619a4cc6e12ac6281f09f9ecb
Page 1 of 2
Back12Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    12 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close