what you don't know can hurt you
Showing 1 - 25 of 56 RSS Feed

Files Date: 2010-06-04

Ctunnel Cryptographic Tunnel Program 0.4
Posted Jun 4, 2010
Authored by Jess Mahan | Site nardcore.org

ctunnel is a program for tunneling and proxying TCP or UDP connections via a cryptographic tunnel. ctunnel can be used to secure any existing TCP or UDP based protocol, such as HTTP, Telnet, FTP, RSH, MySQL, VNC, DNS, XDMCP, NFS, etc. You can also chain or bounce connections to any number of intermediary hosts.

Changes: Win32 support was added. Pthread is now used instead of fork(). New options were added. Miscellaneous bugs were fixed.
tags | web, udp, encryption, tcp, protocol
MD5 | 935c58907f510df454444f15ee467533
cryptmount Filesystem Manager 4.1
Posted Jun 4, 2010
Authored by RW Penney | Site cryptmount.sourceforge.net

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

Changes: Support for command-line arguments to fsck was added. Compatibility with LUKS encrypted filesystems was updated to mirror cryptsetup-1.1. Automatic unmounting on system shutdown was improved in the /etc/init.d script.
tags | kernel, encryption
systems | linux
MD5 | 29d4e9ea3f2c4fbf14623d3457c7026c
Debian Linux Security Advisory 2054-1
Posted Jun 4, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2054-1 - Several cache-poisoning vulnerabilities have been discovered in BIND. These vulnerabilities are apply only if DNSSEC validation is enabled and trust anchors have been installed, which is not the default.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-0097, CVE-2010-0290, CVE-2010-0382
MD5 | fe98167d97e37594d929609467e3743f
Joomla DJ Art Gallery 0.9.1 Cross Site Scripting / SQL Injection
Posted Jun 4, 2010
Authored by d0lc3

The Joomla DJ Art Gallery component version 0.9.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | be99d8623ea694379411fe9ccf48ae95
Gigya Socialize 1.1.8 For WordPress Cross Site Scripting
Posted Jun 4, 2010
Authored by MustLive

Gigya Socialize versions 1.1.8 and below for WordPress suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 5b93e0ed50612201957f3281a0999c34
Ceica Groupware 1.5 Shell Upload
Posted Jun 4, 2010
Authored by Ma3sTr0-Dz

Ceica Groupware 1.5 suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | 1ce1a443f3cdc39901f014a001bb3686
umount /media/disk Shellcode
Posted Jun 4, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

33 bytes small forced unmount of /media/disk Linux/x86 shellcode.

tags | x86, shellcode
systems | linux
MD5 | 2223a658888c5178f15c72fc94a6c00f
Ubuntu Security Notice 947-2
Posted Jun 4, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 947-2 - USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for CVE-2010-0419 caused failures when using KVM in certain situations. This update reverts that fix until a better solution can be found.

tags | advisory, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-4271, CVE-2009-4537, CVE-2010-0008, CVE-2010-0298, CVE-2010-0306, CVE-2010-0419, CVE-2010-0437, CVE-2010-0727, CVE-2010-0741, CVE-2010-1083, CVE-2010-1084, CVE-2010-1085, CVE-2010-1086, CVE-2010-1087, CVE-2010-1088, CVE-2010-1146, CVE-2010-1148, CVE-2010-1162
MD5 | 732599174c8b3133353681c6f768ec33
Secunia Security Advisory 40039
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious people to determine valid user names or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | 67b3846ce46a4c4957429ffafe848cb1
Secunia Security Advisory 40038
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for bugzilla. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclosure sensitive information, bypass certain security restrictions, conduct script insertion attacks, and SQL injection attacks, and by malicious people to disclosure potentially sensitive information, conduct cross-site request forgery attacks, and SQL injection attacks.

tags | advisory, vulnerability, sql injection, csrf
systems | linux, gentoo
MD5 | ee71350a763a176267be373851cf5d9e
Secunia Security Advisory 40040
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for sun-jre-bin, sun-jdk, and emul-linux-x86-java. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, disclose potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, java, denial of service, x86, vulnerability
systems | linux, gentoo
MD5 | 241a5000b9534dacf7bcd97b6c1a93d4
Secunia Security Advisory 40051
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Weborf, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | c7aa4f8bbc4881b5096ae2bd77b4cd47
Secunia Security Advisory 40033
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in abcm2ps, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | 62d7e6adb3457539e24f3d4ed96a74dd
Secunia Security Advisory 40065
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi products, which has unknown impacts.

tags | advisory
MD5 | 61b9d01d9c9f2e5a966114c5fd70cedc
Secunia Security Advisory 40067
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a security issue in Hitachi Web Server, which can be exploited by malicious people to bypass certain security restriction.

tags | advisory, web
MD5 | ff48431272e2cbff614f152da6b9c5a5
Secunia Security Advisory 40063
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for gnutls12. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | bc656a465af90a81331f5895eb9e15f1
Secunia Security Advisory 40064
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in eFront, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
MD5 | b2d41d1116c62652d8769d8418d03831
Secunia Security Advisory 40066
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, web, denial of service
MD5 | 9b2d7b01568744dce54af548d24e7d89
Secunia Security Advisory 40060
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Reflection, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or gain escalated privileges and by malicious people to conduct spoofing attacks.

tags | advisory, denial of service, local, spoof, vulnerability
MD5 | 6bc9e3cd38edb43d0a41c65fdd1b7440
Secunia Security Advisory 40023
Posted Jun 4, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in DDLCMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 4ca73702706ad922301ea1f281afc645
FeedDemon 3.1.0.12 Stack Buffer Overflow
Posted Jun 4, 2010
Authored by fl0 fl0w, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in FeedDemon v3.1.0.12. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution. All versions are suspected to be vulnerable. This vulnerability was originally reported against version 2.7 in February of 2009.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2009-0546
MD5 | c9cb7da0d10900ae2c29de20e03a3da5
S.O.M.P.L 1.0 Player Buffer Overflow
Posted Jun 4, 2010
Authored by Rick | Site metasploit.com

This Metasploit module exploits a buffer overflow in Simple Open Music Player version 1.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
MD5 | 6daa54721c502f760887f69573a8501e
Firewall Builder With GUI 4.0.1
Posted Jun 4, 2010
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: This release fixes several minor bugs in the GUI and other components, improves the policy importer for iptables, and introduces support for HP ProCurve ACLs.
tags | tool, firewall
systems | cisco, linux, openbsd
MD5 | 3640c0d200b2a0e2125d0c991e8c7c2c
CA ARCserve Backup Information Disclosure
Posted Jun 4, 2010
Authored by Kevin Kotas | Site www3.ca.com

CA's support is alerting customers to a security risks with CA ARCserve Backup. A vulnerability exists that can potentially allow a local attacker to gain sensitive information.

tags | advisory, local
advisories | CVE-2010-2157
MD5 | a8cbb8fe1525999c2b333a65e1b63c1a
Adobe InDesign CS3 INDD File Handling Buffer Overflow
Posted Jun 4, 2010
Authored by LiquidWorm

Adobe InDesign CS3 INDD file handling local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | 9f5e2e78e3befcacaaff92cd61163546
Page 1 of 3
Back123Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close