ignore security and it'll go away
Showing 1 - 25 of 178 RSS Feed

Files Date: 2008-07-10

pkd-0.6.tgz
Posted Jul 10, 2008
Authored by eric

ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

tags | tool, kernel, udp, firewall
systems | linux
MD5 | 0afdcf6e8d63aad93be0d9357a8d173b
Secunia Security Advisory 31029
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for openoffice and openoffice-bin. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
MD5 | 93e6aec5a0255c4d2f1c8ea64264dd57
iDEFENSE Security Advisory 2008-07-09.1
Posted Jul 10, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 07.09.08 - Remote exploitation of a heap buffer overflow vulnerability in Novell Inc.'s eDirectory could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability exists due to an incorrect calculation when allocating a heap buffer to store the search parameters. By passing NULL search parameters, it is possible to overflow a heap based buffer with the string "(null)". This can result in the corruption of heap management structures, and depending on the layout of the heap, possibly function pointers. iDefense has confirmed the existence of this vulnerability in eDirectory version 8.8 SP2 for Linux. Other versions may also be affected.

tags | advisory, remote, overflow, arbitrary
systems | linux
advisories | CVE-2008-1809
MD5 | 394dfb4afcb412feb3f9e7d2d0495f4e
Zero Day Initiative Advisory 08-041
Posted Jul 10, 2008
Authored by Tipping Point, Sebastian Apelt | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory. Authentication is not required to exploit this vulnerability. The specific flaw exists within dhost.exe, bound by default to TCP port 524. Flawed arithmetic applied to a user-supplied value results in an integer overflow and subsequently a complete stack smash allowing an attacker to execute arbitrary code via SEH redirection.

tags | advisory, remote, overflow, arbitrary, tcp
MD5 | 9cfa34b6bf73c1a556194e079dd0e523
Secunia Security Advisory 30996
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 3058017ef3b23b9519d331f9520b1fea
Secunia Security Advisory 31023
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, or potentially compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | linux, slackware
MD5 | 5d969ed775e1d09a7ce07bd71a14c485
wpacrack.py.txt
Posted Jul 10, 2008
Authored by d3hydr8 | Site darkc0de.com

Python script that cracks a 256-bit WPA-PSK hash (64 char) using wpa_passphrase and a wordlist.

tags | tool, scanner, python
systems | unix
MD5 | f526e7dcfd3f3a9583738f494b0791d1
msowa-xss.txt
Posted Jul 10, 2008
Authored by Michael Jordon | Site contextis.co.uk

Several cross site scripting vulnerabilities were found in within Outlook Web Access (OWA) 2003/2007. An attacker can craft a malicious email which will trigger within a user's browser. Different version of OWA and different clients (Light and Premium) have different attack vectors which can result in an attacker gaining persistent control over a victim's use of Outlook Web Access.

tags | advisory, web, vulnerability, xss
advisories | CVE-2008-2247, CVE-2008-2248
MD5 | 0592215043fc314dfab9727e7150652a
Secunia Security Advisory 31000
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - k1tk4t has reported a vulnerability in AuraCMS, which can be exploited by malicious people to manipulate certain data.

tags | advisory
MD5 | 60329dad083fed3084001dc169800f96
Secunia Security Advisory 31009
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hussin X has reported a vulnerability in DreamPics Builder, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 049ec6465af4b42d865546d2e4ba7891
Secunia Security Advisory 31020
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for java-1.7.0-icedtea. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, fedora
MD5 | d58cc4aa714055f8d1aad1cc5244655f
Secunia Security Advisory 31022
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
systems | linux, slackware
MD5 | 11ab95722a0fbdb18bdda36a6df884a6
Secunia Security Advisory 31024
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in vbDrupal, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, session fixation, SQL injection, and script insertion attacks.

tags | advisory, vulnerability, xss, sql injection, csrf
MD5 | 0f00c3bee1744f9a61e1117183683e37
Secunia Security Advisory 31025
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for nx. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, gentoo
MD5 | a4381c6ab86956d41f5c19d642d29927
Secunia Security Advisory 31026
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for apache. This fixes a some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, csrf
systems | linux, gentoo
MD5 | 629a25b4874211ba8a668971b9605bb3
Secunia Security Advisory 31028
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Drupal, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, session fixation, SQL injection, and script insertion attacks.

tags | advisory, vulnerability, xss, sql injection, csrf
MD5 | 9a22c95e6c5f08065c23aca61a8c8462
Secunia Security Advisory 31030
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Infoblox NIOS, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
MD5 | b1c6318f25d50ac2c4a9575f73b7ce37
Secunia Security Advisory 31031
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Nixu Secure Name Server, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
MD5 | e9175af2da259aa0539f842754094f0a
Secunia Security Advisory 31037
Posted Jul 10, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in some Sophos products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 6f6d77a2353ff2e4f2f5a7fae3c4704a
gapicms-rfi.txt
Posted Jul 10, 2008
Authored by Ghost Hacker | Site real-hack.net

gapicms version 9.0.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 1f89cc55f20fa8d9dbeb44404bf2aba9
phpdatingclub-lfi.txt
Posted Jul 10, 2008
Authored by Big Ben

phpDatingClub suffers from a local file inclusion vulnerability in website.php.

tags | exploit, local, php, file inclusion
MD5 | 35d8b662d4c71c6be30054a358010dba
dreamnews-sql.txt
Posted Jul 10, 2008
Authored by Hussin X | Site tryag.cc

The DreamNews Manager is susceptible to a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | 80e24950bd83de99d3aa48b61ab9a102
Gentoo Linux Security Advisory 200807-7
Posted Jul 10, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200807-07 - Multiple integer overflow and buffer overflow vulnerabilities have been discovered in the X.Org X server as shipped by NX and NX Node (GLSA 200806-07). Versions less than 3.2.0-r3 are affected.

tags | advisory, overflow, vulnerability
systems | linux, gentoo
MD5 | 1bb2bf12af83d9a3c428c184c6408092
Gentoo Linux Security Advisory 200807-6
Posted Jul 10, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200807-06 - Multiple vulnerabilities in Apache might lead to a Denial of Service. Versions less than 2.2.9 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2007-6420, CVE-2008-1678, CVE-2008-2364
MD5 | 0a066396fce7ab084955ac91003e98bf
Gentoo Linux Security Advisory 200807-5
Posted Jul 10, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200807-05 - Sean Larsson (iDefense Labs) reported an integer overflow in the function rtl_allocateMemory() in the file sal/rtl/source/alloc_global.c. Versions less than 2.4.1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2008-2152
MD5 | aaeba71107fa187514c6444c192de812
Page 1 of 8
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close