exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 871 RSS Feed

Files Date: 2008-05-01 to 2008-05-31

kismet-2008-05-R1.tar.gz
Posted May 30, 2008
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: WRT54 fixes, multiple Darwin fixes, GPS rewrite and fixes, Nokia tweaks, and Imagemagick fixes.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | a298d44f8a6ec977021cd492a720987ded81b5c4baf5f68b36f1282a23c9f7d3
nebula-0.2.2.tar.gz
Posted May 30, 2008
Authored by Tillmann Werner | Site nebula.mwcollect.org

Nebula is a data analysis tool that automatically generates intrusion signatures from attack traces. It runs as a daemon that processes data submitted from honeypots. New signatures are published as Snort rules and can be used to defend a network from future intrusion attempts.

tags | tool, sniffer
SHA-256 | a72605776c17e6c7038972b6fcfa0d17f63a693b21e21701518d5f1e328aa4ed
nowsmsmms-overflow.txt
Posted May 30, 2008
Authored by Heretic2

Now SMS/MMS Gateway version 5.5 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | fb10833a3ceda64288a1c504ea3f32181e19fd5494a383d7ac1447d494118766
mambomambads-sql.txt
Posted May 30, 2008
Authored by H-T Team | Site no-hack.fr

Remote SQL injection exploit for the Mambo mambads component version 1.0 RC1 Beta and 1.0 RC1.

tags | exploit, remote, sql injection
SHA-256 | 1371c22c9ff1adf3da246d12be00f789787487914587e621e5db10042902baf5
adv96-K-159-2008.txt
Posted May 30, 2008
Authored by M.Hasran Addahroni | Site advisories.echo.or.id

HiveMaker Professional versions 1.0.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | edecf2cabc9140694b7fe0545b10328ec7fe6f5e9483e279b9184bae6e318ab9
applemail-dos.txt
Posted May 30, 2008
Authored by David Wharton

Apple Mail versions 3.1 and 3.2 suffer from a denial of service vulnerability when reading a specially crafted e-mail.

tags | exploit, denial of service
systems | apple
SHA-256 | ee6c6052c1a8464b7f929eea3c3351ac59de5b64c5f6f924225eee4a43f255de
dotnetnuke-xss.txt
Posted May 30, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Dot Net Nuke versions 4.8.3 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 86cd5f32cd7cd1c3674ce7d617eff9c9047049a44b5d05f092d43848ff71e81a
phpbook-upload.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d arbitrary file upload exploit.

tags | exploit, arbitrary, php, file upload
SHA-256 | 933684b5cca85e8930bf073739a60881ae9474d8a0eca85e813a587ee77c5b2b
cmsscratch-traverse.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

CMS from Scratch versions 1.1.3 and below suffer from a directory traversal vulnerability in image.php.

tags | exploit, php, file inclusion
SHA-256 | 3f4831f4fdb0ddc7de6a97e23e86dec24c92e7b468890d059ed9452891c221d8
phpbook-sql.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d remote SQL injection exploit that retrieves the administrator login and password hash.

tags | exploit, remote, php, sql injection
SHA-256 | 262259f83a4516baf4c9357afa3f71292f7b19b03e75adcd312d3bc801df029a
asus-overflow.txt
Posted May 30, 2008
Authored by Heretic2

ASUS DPC proxy versions 2.0.0.16 and 2.0.0.19 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 95ad9e971e97b7a96c4d56b03b003adcba794f0811d9d05a78b73dd5d0e1c8ef
Secunia Security Advisory 30406
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in RockN Audio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 31bbed62d079085c932940b06b0727c26fad8c80a5e8b277b816edbe81b6fe56
Secunia Security Advisory 30413
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | d65453f648ee2aab6c67431b793b4e19b09ff7a25c6ce05500ae782f3861199c
Secunia Security Advisory 30417
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cbrPager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 24213dc66f50daf5f65733572602a764735d35fd4b52c987bd7c8e731ff991c6
Secunia Security Advisory 30437
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | dafb1543e61b3a1f40a74b4739a670722c03112e39f88520a5e796d243fc650d
Secunia Security Advisory 30446
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Gold Wave Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2947d335e991d9e3e2957d1c9814bf761bf9f8127ac37c4430099438d50444d2
Secunia Security Advisory 30447
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various HiFi products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 894b9968873837b644432f9ac1fd927a52429f99bbfa9eca5fd803b33c4ad8c2
Secunia Security Advisory 30459
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various Color7 Technology products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 740ab8393f2b72a0afb7e2247b30e656cbeeba69587095d2fab42dbf23ac3248
Technical Cyber Security Alert 2008-150A
Posted May 29, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-150A - Apple has released Security Update 2008-003 and OS X version 10.5.3 to correct multiple vulnerabilities affecting Apple Mac OS X and Mac OS X Server. Attackers could exploit these vulnerabilities to execute arbitrary code, gain access to sensitive information, or cause a denial of service.

tags | advisory, denial of service, arbitrary, vulnerability
systems | apple, osx
SHA-256 | 2a0c6c6724f3d08cd9a0fedd681bdcf6249633b3a940b7b48d18ef656097d97d
xerox-xss.txt
Posted May 29, 2008
Authored by DoZ | Site hackerscenter.com

XEROX DocuShare versions 6 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4cba5101d83028f6e81dba72d1b73397aeced0287b02b2f3d13bc8b40f86ef2f
Secunia Security Advisory 30384
Posted May 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Heise Security has reported a security issue in BullGuard Backup, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 300e647b42a1c56282a006212ebafad8bafef3ae5a7db20569d07a2a74131e5e
Secunia Security Advisory 30393
Posted May 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libxslt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 4b716bb0c52eef4e581ffc3822f120f84514189b14f29ad2cec26ee0d1da43e7
Secunia Security Advisory 30399
Posted May 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for system-config-network. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
SHA-256 | e8d8cc195a43d708f6ae489f302ebdb531993670dcb3fdc523ffe59a94023186
Secunia Security Advisory 30401
Posted May 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in imlib2, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | dd57094ff16ab061a3ca2291f920f986c0da3f45cc9f53ea0961e1587cb2eb76
Secunia Security Advisory 30402
Posted May 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libpng10. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 910a422f8190d7ae4c371ba227e9d7df49e9ed9a9fd5d92a59782e5460bdb3f6
Page 1 of 35
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close