exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 56 RSS Feed

Files Date: 2010-06-04

Ctunnel Cryptographic Tunnel Program 0.4
Posted Jun 4, 2010
Authored by Jess Mahan | Site nardcore.org

ctunnel is a program for tunneling and proxying TCP or UDP connections via a cryptographic tunnel. ctunnel can be used to secure any existing TCP or UDP based protocol, such as HTTP, Telnet, FTP, RSH, MySQL, VNC, DNS, XDMCP, NFS, etc. You can also chain or bounce connections to any number of intermediary hosts.

Changes: Win32 support was added. Pthread is now used instead of fork(). New options were added. Miscellaneous bugs were fixed.
tags | web, udp, encryption, tcp, protocol
SHA-256 | eca3f2bbab7b2f6b9c42f72351d4fc14b0b67bc6714577349739cb743e4a9d3a
cryptmount Filesystem Manager 4.1
Posted Jun 4, 2010
Authored by RW Penney | Site cryptmount.sourceforge.net

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

Changes: Support for command-line arguments to fsck was added. Compatibility with LUKS encrypted filesystems was updated to mirror cryptsetup-1.1. Automatic unmounting on system shutdown was improved in the /etc/init.d script.
tags | kernel, encryption
systems | linux
SHA-256 | 9a3d0961666e5c4bc8b29708fd430aad24a7f2fdbc57c013203e8db4bb1bb260
Debian Linux Security Advisory 2054-1
Posted Jun 4, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2054-1 - Several cache-poisoning vulnerabilities have been discovered in BIND. These vulnerabilities are apply only if DNSSEC validation is enabled and trust anchors have been installed, which is not the default.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-0097, CVE-2010-0290, CVE-2010-0382
SHA-256 | 3f735c4833aeac702aa70117b4ee33364894fa1b8bd7021809591297abc6b061
Joomla DJ Art Gallery 0.9.1 Cross Site Scripting / SQL Injection
Posted Jun 4, 2010
Authored by d0lc3

The Joomla DJ Art Gallery component version 0.9.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 04f25421c3d8574d1937297ab8e50a538cf5ac0bc7d276a21f964a62bfad503d
Gigya Socialize 1.1.8 For WordPress Cross Site Scripting
Posted Jun 4, 2010
Authored by MustLive

Gigya Socialize versions 1.1.8 and below for WordPress suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 512b850d7c94990056a82aa3afcdbc5c294d1afba0c4041504dbea4647728af7
Ceica Groupware 1.5 Shell Upload
Posted Jun 4, 2010
Authored by Ma3sTr0-Dz

Ceica Groupware 1.5 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 7c2449b6938aeeac29ce4504552c5136286ff353d4284b10b676743a0c3629ad
umount /media/disk Shellcode
Posted Jun 4, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

33 bytes small forced unmount of /media/disk Linux/x86 shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 42beef72a7729639551b30bca9f81fd23d0a3e9dc833a28e460538d9fb361582
Ubuntu Security Notice 947-2
Posted Jun 4, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 947-2 - USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for CVE-2010-0419 caused failures when using KVM in certain situations. This update reverts that fix until a better solution can be found.

tags | advisory, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-4271, CVE-2009-4537, CVE-2010-0008, CVE-2010-0298, CVE-2010-0306, CVE-2010-0419, CVE-2010-0437, CVE-2010-0727, CVE-2010-0741, CVE-2010-1083, CVE-2010-1084, CVE-2010-1085, CVE-2010-1086, CVE-2010-1087, CVE-2010-1088, CVE-2010-1146, CVE-2010-1148, CVE-2010-1162
SHA-256 | 21c2ee0fe26dc2ec28a543eaeffce5b4a7c806c118defb8010bd9a9619c49b8c
Secunia Security Advisory 40039
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious people to determine valid user names or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 778e5d350c1e666e07e6a45e4c2749c6027d3b0b98615a01cdc52052e3466fed
Secunia Security Advisory 40038
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for bugzilla. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclosure sensitive information, bypass certain security restrictions, conduct script insertion attacks, and SQL injection attacks, and by malicious people to disclosure potentially sensitive information, conduct cross-site request forgery attacks, and SQL injection attacks.

tags | advisory, vulnerability, sql injection, csrf
systems | linux, gentoo
SHA-256 | a15887d6221d48d3e6b0e1d986db5e99523ac06adb4e6f8d3c2eb4cabff60df6
Secunia Security Advisory 40040
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for sun-jre-bin, sun-jdk, and emul-linux-x86-java. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, disclose potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, java, denial of service, x86, vulnerability
systems | linux, gentoo
SHA-256 | 0ac7d42ae28e38096856e8aba932f843d0e73d74a7eca38c72b2c4037bbda005
Secunia Security Advisory 40051
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Weborf, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 56e4401066ff7afdfeefa30c51aab9013e8ff83ab21a5831607f082221fb79c8
Secunia Security Advisory 40033
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in abcm2ps, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 909db459d6ee0b26da8e199cd263adb332a97fb784dacb624d711269d7122779
Secunia Security Advisory 40065
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi products, which has unknown impacts.

tags | advisory
SHA-256 | 24465c89a27546acd061189ae0ac5fe5ea344c560985bbed2498b4a6ac96d5db
Secunia Security Advisory 40067
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a security issue in Hitachi Web Server, which can be exploited by malicious people to bypass certain security restriction.

tags | advisory, web
SHA-256 | 06c5822046256ce84b48b572416c40e256f9bdfa482f6e1ec796f8a1db5a4be7
Secunia Security Advisory 40063
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for gnutls12. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | dc8e724794d52a721a24e903d2c2ba856ec50d2230c102ec4f33f669f9565080
Secunia Security Advisory 40064
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in eFront, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
SHA-256 | c5c220d293845cf17b07d783c3d3ef09c0c1c50e1b8752a4a923794ba377f36a
Secunia Security Advisory 40066
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, web, denial of service
SHA-256 | 2a1f7d886ad0bdd3309772b4277cc6e073c1d52dace7ef99be8fa59b59116f1d
Secunia Security Advisory 40060
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Reflection, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or gain escalated privileges and by malicious people to conduct spoofing attacks.

tags | advisory, denial of service, local, spoof, vulnerability
SHA-256 | ce7289508301bab7dbb72ac3596db730c7a013cdf3400eaa76fbd3ad3596c1b6
Secunia Security Advisory 40023
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in DDLCMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 474f77b5ad253158a1b685ca13ff4e18a2d9c5c886883dbc0a6aa5db4d5d4a60
FeedDemon 3.1.0.12 Stack Buffer Overflow
Posted Jun 4, 2010
Authored by fl0 fl0w, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in FeedDemon v3.1.0.12. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution. All versions are suspected to be vulnerable. This vulnerability was originally reported against version 2.7 in February of 2009.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2009-0546
SHA-256 | 8afb9bc6b6e5ed13de0b34861110cee4952239ed2ad8726c5bcc1f02b21ecbf8
S.O.M.P.L 1.0 Player Buffer Overflow
Posted Jun 4, 2010
Authored by Rick | Site metasploit.com

This Metasploit module exploits a buffer overflow in Simple Open Music Player version 1.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | ff61fd7b9e078099ead07530144e241ebf1475c5b918f46fc1b891e77fc94f8f
Firewall Builder With GUI 4.0.1
Posted Jun 4, 2010
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: This release fixes several minor bugs in the GUI and other components, improves the policy importer for iptables, and introduces support for HP ProCurve ACLs.
tags | tool, firewall
systems | cisco, linux, openbsd
SHA-256 | d8bb7867df703b30a5d74728a8497a2fa1b1089184bd6d01e974705e5aad766c
CA ARCserve Backup Information Disclosure
Posted Jun 4, 2010
Authored by Kevin Kotas | Site www3.ca.com

CA's support is alerting customers to a security risks with CA ARCserve Backup. A vulnerability exists that can potentially allow a local attacker to gain sensitive information.

tags | advisory, local
advisories | CVE-2010-2157
SHA-256 | 06ddd0ac2e0c6812405ad8e4e65836ebf983a0a9512ec15cb15638b106952ee3
Adobe InDesign CS3 INDD File Handling Buffer Overflow
Posted Jun 4, 2010
Authored by LiquidWorm

Adobe InDesign CS3 INDD file handling local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 33e26d4869c1e6655da1a8bfba18558f124fb581040587524826881bdb3fd22c
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close