what you don't know can hurt you
Showing 1 - 25 of 71 RSS Feed

Files Date: 2010-02-12

strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux 4.3.6
Posted Feb 12, 2010
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: Starting with the Linux 2.6.33 kernel, the SHA-256/384/512 HMAC ESP data integrity algorithms are now configured by strongSwan with the correct truncation length. Older kernels require a SHA-2 patch. The IKEv2 charon daemon has been ported to the Android platform. DNS and NBNS server information stored in an SQL database can be distributed to VPN clients via the IKEv1 Mode Config or the IKEv2 Configuration payload.
tags | kernel, encryption
systems | linux
MD5 | 54c24f1390b37cc2474b4eb45cd9810f
Openwall tcb Suite 1.0.4
Posted Feb 12, 2010
Site openwall.com

The tcb suite implements the alternative password shadowing scheme on Openwall GNU/*/Linux (Owl) which allows many core system utilities (passwd(1) being the primary example) to operate with little privilege. It is being made available separately from Owl primarily for use by other distributions. This package contains three core components of the tcb suite: pam_tcb (a PAM module which supersedes pam_unix), libnss_tcb (the accompanying NSS module), and libtcb (a library for accessing tcb shadow files, used by the PAM and NSS modules as well as by user management tools on Owl).

Changes: A non-security buffer overflow bug with more than NGROUPS_MAX groups per user has been fixed. The Makefiles have been cleaned up.
systems | linux
MD5 | 842de6e620df19245057d490e447de7c
StatCounteX 3.1 Database Disclosure / Administrative Access
Posted Feb 12, 2010
Authored by Phenom

StatCounteX suffers from database disclosure and administrative access vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | 70c27a8921e129d12bd93b0166840e1b
Nokia Symbian OS Denial Of Service
Posted Feb 12, 2010
Authored by Nishant Das Patnaik

This archive has six denial of service exploits that affect the Nokia Symbian S60v3 web browser.

tags | exploit, web, denial of service
MD5 | 8f6a526c4748e9da0f65d9f2ad4e0a91
BaSiC-CMS SQL Injection / Cross Site Scripting
Posted Feb 12, 2010
Authored by Red-D3v1L

BaSiC-CMS suffers from cross site scripting and blind remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | a8fa00e393323aa92202d08713d52770
Mandriva Linux Security Advisory 2010-036
Posted Feb 12, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-036 - This advisory updates webmin to the latest version 1.500, fixing several bugs and a cross-site scripting issue which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers.

tags | advisory, remote, web, arbitrary, xss
systems | linux, mandriva
advisories | CVE-2009-4568
MD5 | e7b32d031b1d58e4b8252bd4c13817ec
Dachooch SQL Injection
Posted Feb 12, 2010
Authored by Snakespc

Dachooch suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | c4e0d3588005cd860401af7351a5286d
Facebook Cross Site Request Forgery
Posted Feb 12, 2010
Authored by Juan Galiana Lara

Facebook suffered from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 8ccb315a536bce158407b02f1718b648
MRW PHP Shell Upload
Posted Feb 12, 2010
Authored by Phenom

MRW PHP suffers from a shell upload vulnerability.

tags | exploit, shell, php, file upload
MD5 | 2f321132f83ef36a8e3daed07a469905
Dow Group SQL Injection
Posted Feb 12, 2010
Authored by Memati

Dow Group suffers from a remote SQL injection vulnerability in data_desc.php.

tags | exploit, remote, php, sql injection
MD5 | 173e70ceabb6412b0e67de61469cc767
Vito CMS SQL Injection
Posted Feb 12, 2010
Authored by hacker at sr.gov.yu

Vito CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 986f222bb76d292c138a8cccc10758ec
SQL Injection In MS-SQL 2005
Posted Feb 12, 2010
Authored by MCchain | Site hacktimes.com

Whitepaper called SQL Injection in MS-SQL Server 2005. Written in Spanish.

tags | paper, sql injection
MD5 | adadf3429b06139d02f67339b5b3d23b
CMSMadeSimple 1.6.6 Cross Site Scripting / Local File Inclusion
Posted Feb 12, 2010
Authored by Beenu Arora

CMSMadeSimple version 1.6.6 suffers from cross site scripting and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
MD5 | d896c727049f245a6d704b63b4cd0e11
SimplePMS 0.1.4 Local File Inclusion
Posted Feb 12, 2010
Authored by cr4wl3r

SimplePMS versions 0.1.4 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 389996986d2a6ed404f1b99bcae0381f
Infragistics WebHtmlEditor 7.1 Directory Traversal / File Upload
Posted Feb 12, 2010
Authored by jang kyoungchip

Infragistics WebHtmlEditor version 7.1 suffers from arbitrary file upload and directory traversal vulnerabilities.

tags | exploit, arbitrary, vulnerability, file inclusion, file upload
MD5 | 96ff5c79a4087de343864cd31b89872b
Alqatari Group 1.0 Blind SQL Injection
Posted Feb 12, 2010
Authored by R3d-D3v!L

Alqatari Group version 1.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | db3314cb477848e82f5df73eb311f0d5
Izumi 1.1.0 Local File Inclusion / Remote File Inclusion
Posted Feb 12, 2010
Authored by cr4wl3r

Izumi versions 1.1.0 and below suffer from local file inclusion and remote file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
MD5 | d786b97e8ad48bac6a53fa224187e5f5
Google Buzz Cross Site Request Forgery
Posted Feb 12, 2010
Authored by Kristian Hermansen

Google Buzz is reported to have cross site request forgery vulnerabilities.

tags | advisory, vulnerability, csrf
MD5 | 6e905c52fa90664aa2a16d2f25c9e1e8
Anonimato Underground
Posted Feb 12, 2010
Authored by Cooler

Whitepaper called Anonimato Underground.Written in Portuguese.

tags | paper
MD5 | 6e46a781478a042390a6199b87dab107
CastRipper 2.50.70 Stack Overflow
Posted Feb 12, 2010
Authored by Jordi Chancel

CastRipper version 2.50.70 stack overflow exploit that creates a malicious .asx file.

tags | exploit, overflow
MD5 | 13215c395027d55e64c0b3be3f207551
Open And Compact FTPd Pre-Authentication Remote Exploit
Posted Feb 12, 2010
Authored by Lincoln

Open and Compact FTPd pre-authentication remote exploit that binds a shell to port 4444.

tags | exploit, remote, shell
MD5 | 32303e65b7147228aad8736f08543ca8
ChemviewX ActiveX 1.9.5 Stack Overflows
Posted Feb 12, 2010
Authored by Paul Craig | Site security-assessment.com

ChemviewX version 1.9.5 suffers from stack overflow vulnerabilities.

tags | advisory, overflow, vulnerability
MD5 | 22de27c9aee08f5ae2809f12bef4f87e
Secunia Security Advisory 38552
Posted Feb 12, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Vacation Rentals Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | f0f75e3d1498778c8aa236015f0952e8
Secunia Security Advisory 38543
Posted Feb 12, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in multiple Adobe products, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | b21daf9d490dc18d8d164d7c363316dc
Secunia Security Advisory 38568
Posted Feb 12, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a user's system.

tags | advisory, spoof, vulnerability
MD5 | d53f88ac999408b212c631644ccd208a
Page 1 of 3
Back123Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close