what you don't know can hurt you
Showing 1 - 25 of 37 RSS Feed

Files Date: 2009-06-17

Entropy Broker RNG
Posted Jun 17, 2009
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: sever_stream now also supports serial devices, Added FIPS 140-2 test.
tags | encryption
MD5 | a98d2a260e7972da04ea75a81b704031
Firewall Builder With GUI
Posted Jun 17, 2009
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: This is a bugfix release that improves program stability.
tags | tool, firewall
systems | cisco, linux, openbsd
MD5 | 3832bde394c35fba04ad8a02012b8804
Linux IPTables Firewall 1.4.4
Posted Jun 17, 2009
Site iptables.org

iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.

Changes: This release includes updates for new extensions in kernel 2.6.30, bugfixes, and documentation updates.
tags | tool, firewall
systems | linux
MD5 | 08cd9196881657ea0615d926334cb7e9
Command Execution Shell Generator
Posted Jun 17, 2009
Authored by Beenu Arora | Site beenuarora.com

Command execution shell generator tool. Written in Python.

tags | shell, shellcode, python
MD5 | b1895176acd20d8adb2411a60a998add
PhpPortal Insecure Cookie Handling
Posted Jun 17, 2009
Authored by KnocKout | Site cyber-warrior.org

PhpPortal version 1.0 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
MD5 | 3bfddbbe09ff978aaaadd4d2e0b0bbcb
compface 1.5.2 Buffer Overflow
Posted Jun 17, 2009
Authored by metalhoney

compface versions 1.5.2 and below buffer overflow proof of concept exploit that creates a malicious .xbm file.

tags | exploit, denial of service, overflow, proof of concept
MD5 | 75a1f11e27ebf2c61b01a67cd0c73ec9
Mandriva Linux Security Advisory 2009-135
Posted Jun 17, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-135 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2009-1184, CVE-2009-1337, CVE-2009-1192, CVE-2009-1265, CVE-2009-0029, CVE-2009-1360, CVE-2009-1961, CVE-2009-1385, CVE-2009-1630
MD5 | a1a6ca97bc9edea08a39776c1edf46f1
Mandriva Linux Security Advisory 2009-134
Posted Jun 17, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-134 - Security vulnerabilities have been discovered and corrected in Mozilla Firefox 3.x. These range from race conditions to various denial of service issues.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1834, CVE-2009-1835, CVE-2009-1836, CVE-2009-1837, CVE-2009-1838, CVE-2009-1839, CVE-2009-1840, CVE-2009-1841, CVE-2009-2043, CVE-2009-2044, CVE-2009-2061, CVE-2009-2065
MD5 | 59827c06acbe521f9116c8b263e644c5
FretsWeb 1.2 SQL Injection
Posted Jun 17, 2009
Authored by YEnH4ckEr

FretsWeb version 1.2 remote blind SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 5f59240b2b8be3a0f196a73d58cc6b76
FretsWeb 1.2 Local File Inclusion
Posted Jun 17, 2009
Authored by YEnH4ckEr

FretsWeb version 1.2 suffers from multiple local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
MD5 | f9fdca1ebfa9d698242afc7e9534c340
FuzzyLime CMS 3.03a Local File Inclusion
Posted Jun 17, 2009
Authored by StAkeR

FuzzyLime CMS versions 3.03a and below suffer from local file inclusion and file corruption vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
MD5 | 975d753b19444b0b622e5aba0a0eb372
TekBase All-In-One 3.1 SQL Injection
Posted Jun 17, 2009
Authored by n3wb0ss

TekBase All-In-One version 3.1 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | f3bcbc315cef5f48d89de52fab9b13c1
phpFK 7.03 Local File Inclusion
Posted Jun 17, 2009
Authored by ahmadbady

phpFK version 7.03 suffers from a local file inclusion vulnerability in page_bottom.php.

tags | exploit, local, php, file inclusion
MD5 | a82759bd3e1374033cae98262bd97190
Slowloris Denial Of Service Tool
Posted Jun 17, 2009
Authored by RSnake

Slowloris helps identify the timeout windows of a HTTP server or Proxy server, can bypass httpready protection and ultimately performs a fairly low bandwidth denial of service. It has the added benefit of allowing the server to come back at any time (once the program is killed), and not spamming the logs excessively. It also keeps the load nice and low on the target server, so other vital processes do not die unexpectedly, or cause alarm to anyone who is logged into the server for other reasons.

tags | web, denial of service
systems | windows
MD5 | 0c56003d7749e9dc4b95a83ce92c0b54
Secunia Security Advisory 35444
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for apr-util. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, slackware
MD5 | 805cdb1e6b1513f1ef5ca18761d196b3
Secunia Security Advisory 35456
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses and vulnerabilities have been discovered in TorrentTrader Classic, which can be exploited by malicious users to conduct script-insertion and SQL injection attacks, and by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | 81bebc9522952c1b0882d2457059c286
Secunia Security Advisory 35453
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for apache2. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, debian
MD5 | 33c7392b4a70d98747c1ac42eea6b2e2
Secunia Security Advisory 35494
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, and disclose potentially sensitive information, and by malicious people to potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
MD5 | eff1db098425a31bd4c643f2d9c27e8e
Secunia Security Advisory 35487
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for httpd. This fixes some vulnerabilities, which which can be exploited by malicious users and malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 00cf98275b0936d11a37df179f6c3a1b
Secunia Security Advisory 34724
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for apr-util. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 58b710e65760c6e7e74147130deec0b8
Secunia Security Advisory 35491
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM WebSphere Application Server, where some have unknown impacts and others can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
MD5 | 61e5b30456aec1da0b0a821d8bdfbed4
Secunia Security Advisory 35488
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and disclose potentially sensitive information, and by malicious users and malicious people to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
MD5 | 7375c72d10a85e86b25da6288f580e3e
Secunia Security Advisory 35496
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | fac25fb95748bfa810cd5601d2b30939
Secunia Security Advisory 35498
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for icu. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
MD5 | 5a180c4eb03fe4a0f88460499275f04b
Secunia Security Advisory 35436
Posted Jun 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in International Components for Unicode, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | ee2f4d3a971f98b646d13373d89aada0
Page 1 of 2
Back12Next

File Archive:

March 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    2 Files
  • 2
    Mar 2nd
    18 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    12 Files
  • 5
    Mar 5th
    19 Files
  • 6
    Mar 6th
    8 Files
  • 7
    Mar 7th
    1 Files
  • 8
    Mar 8th
    1 Files
  • 9
    Mar 9th
    11 Files
  • 10
    Mar 10th
    15 Files
  • 11
    Mar 11th
    9 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    13 Files
  • 14
    Mar 14th
    10 Files
  • 15
    Mar 15th
    13 Files
  • 16
    Mar 16th
    27 Files
  • 17
    Mar 17th
    15 Files
  • 18
    Mar 18th
    23 Files
  • 19
    Mar 19th
    25 Files
  • 20
    Mar 20th
    10 Files
  • 21
    Mar 21st
    6 Files
  • 22
    Mar 22nd
    1 Files
  • 23
    Mar 23rd
    22 Files
  • 24
    Mar 24th
    15 Files
  • 25
    Mar 25th
    23 Files
  • 26
    Mar 26th
    20 Files
  • 27
    Mar 27th
    15 Files
  • 28
    Mar 28th
    10 Files
  • 29
    Mar 29th
    1 Files
  • 30
    Mar 30th
    18 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close