what you don't know can hurt you
Showing 1 - 25 of 38 RSS Feed

Files Date: 2008-09-08

Nmap Scanning Utility 4.75
Posted Sep 8, 2008
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Zenmap - Added a new Scan Topology system. Another exciting new Zenmap feature is Scan Aggregation. Expanded nmap-services to include information on how frequently each port number is found open. Nmap fast scan (-F) now scans the top 100 ports by default in either protocol. Nmap now scans the most common 1,000 ports by default in either protocol (UDP scan is still optional). Various other updates and enhancements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 85d160ccaaa848fcf415681e3349d848
Secunia Security Advisory 31750
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Simple Machines Forum, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 27da521d7bc4f9be9eb828a654fee849
Gentoo Linux Security Advisory 200809-8
Posted Sep 8, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200809-08 - Amarok uses temporary files in an insecure manner, allowing for a symlink attack. Dwayne Litzenberger reported that the MagnatuneBrowser::listDownloadComplete() function in magnatunebrowser/magnatunebrowser.cpp uses the album_info.xml temporary file in an insecure manner. Versions less than 1.4.10 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2008-3699
MD5 | e58611cc55c58c3f2d699de67781c176
Gentoo Linux Security Advisory 200809-7
Posted Sep 8, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200809-07 - Multiple buffer underflow vulnerabilities in libTIFF may allow for the remote execution of arbitrary code. Drew Yao (Apple Product Security) and Clay Wood reported multiple buffer underflows in the LZWDecode() and LZWDecodeCompat() functions in tif_lzw.c when processing TIFF files. Versions less than 3.8.2-r4 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, apple, gentoo
advisories | CVE-2008-2327
MD5 | 5e4c216044402924b6da925253172c0b
wasc_wass_2007.pdf
Posted Sep 8, 2008
Site webappsec.org

The Web Application Security Consortium (WASC) is pleased to announce the WASC Web Application Security Statistics Project 2007. This initiative is a collaborative industry wide effort to pool together sanitized website vulnerability data and to gain a better understanding about the web application vulnerability landscape. The overall statistics includes analysis results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity.

tags | paper, web, vulnerability
MD5 | 86567ab3f61b08ab7690e05b87500656
sagem-dos.txt
Posted Sep 8, 2008
Authored by Zigma

Sagem Router F@ST 2404 remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | ad1fe93bf4a0e58cfb8f2c284984f26d
Secunia Security Advisory 31751
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ams has reported a vulnerability in MemHT Portal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | fea2c64a80ac59db70b7ea87f2193418
Secunia Security Advisory 31758
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James Bercegay has reported two vulnerabilities in Zen Cart, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | c20aeecdd4892fb8061025ea31694232
Secunia Security Advisory 31765
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Edi Strosar has reported a security issue in X-Spam for SMTP Servers, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | 0c653864eec7fb35c2419ebe2e293c49
Secunia Security Advisory 31781
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | ed9b23a933b76fce7e4f0687553e6557
Secunia Security Advisory 31787
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in DB2, where some have an unknown impact and others can be exploited by malicious people to cause a DoS.

tags | advisory, vulnerability
MD5 | 70a0b17fbdb6d2a49a834057146a2716
Secunia Security Advisory 31792
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | 2bbf9db67400a378d5771b54baec235f
Secunia Security Advisory 31793
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Sopas has reported a vulnerability in phpAdultSite CMS, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
MD5 | 40e26a2fb4620045f0e248fd3c02505f
Secunia Security Advisory 31801
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Silentum LoginSys, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 831ba66a5063b001fdd68c5e77b937f7
Secunia Security Advisory 31803
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Beenu Arora has discovered a vulnerability in phpAuction, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | c3a36b0f7bc3f7450c0c7850eb131511
ttyrpld-2.52.tar.bz2
Posted Sep 8, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Updated kernel components for Linux 2.6.27 and updated userspace code for libHX 1.25.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | 322674047f27652702ba35a196ca3c74
Secunia Security Advisory 31785
Posted Sep 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for VLC. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | c9e3660a787ba3e7f087ef32419835b3
ephpb2b-sql.txt
Posted Sep 8, 2008
Authored by r45c4l | Site darkc0de.com

E-PHP B2B Trading Marketplace Scripts suffers from a remote SQL injection vulnerability in listings.php.

tags | exploit, remote, php, sql injection
MD5 | cceb7b553c51129e88d5553fdcb5129d
scip-dlink.txt
Posted Sep 8, 2008
Authored by Marc Ruef | Site scip.ch

The D-Link DIR-100 suffers from a long url filter evasion vulnerability.

tags | advisory
MD5 | 48ccd7532f8a2e18c0f2c36b21b1f0c9
ephpscripts-sql.txt
Posted Sep 8, 2008
Authored by Mormoroth | Site mormoroth.net

E-Shop Shopping Cart Script suffers from a remote SQL injection vulnerability in search_results.php.

tags | exploit, remote, php, sql injection
MD5 | 325fa1f0a415e32875e373deb5919869
seamonkey-dos.txt
Posted Sep 8, 2008
Authored by LiquidWorm | Site zeroscience.mk

SeaMonkey version 1.1.11 remote denial of service proof of concept exploit that makes use of excessive marquee tags being used.

tags | exploit, remote, denial of service, proof of concept
MD5 | 7979820e27787a76389010e82a185477
wordpress261-sql.txt
Posted Sep 8, 2008
Authored by irk4z

WordPress version 2.6.1 suffers from a SQL column truncation vulnerability.

tags | exploit, sql injection
MD5 | 5a242811e3d340896066b9dc88624c7e
informer.txt
Posted Sep 8, 2008
Authored by sm4x

1nf0rm3r is a quick perl script that extracts database information from a website once leveraging a SQL injection vulnerability.

tags | tool, scanner, perl, sql injection
systems | unix
MD5 | 438e6e817a02d453c4c9b61e09cd44cf
alstrasoftforum-sql.txt
Posted Sep 8, 2008
Authored by r45c4l, P47r1ck | Site darkc0de.com

Alstrasoft Forum suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 16c003a9fc6930b42f874283b4402533
arpreply.tgz
Posted Sep 8, 2008
Authored by sm4x

Arpreply is a custom piece of code used to control remote arp caches and can be used for man in the middle attacks.

tags | tool, remote
systems | unix
MD5 | 30748beab0684c4d51227381b16ea8a3
Page 1 of 2
Back12Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    9 Files
  • 26
    Nov 26th
    11 Files
  • 27
    Nov 27th
    15 Files
  • 28
    Nov 28th
    9 Files
  • 29
    Nov 29th
    2 Files
  • 30
    Nov 30th
    17 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close