exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2010-12-28

Mongoose 2.11 Denial Of Service
Posted Dec 28, 2010
Authored by AutoSec Tools

Mongoose version 2.11 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 096869f520cafef100004bb289be87002b4e3afae065df699409f5abb0f75702
QuickPHP Web Server 1.9.1 Directory Traversal
Posted Dec 28, 2010
Authored by AutoSec Tools

QuickPHP Web Server version 1.9.1 suffers from a directory traversal vulnerability.

tags | exploit, web, file inclusion
SHA-256 | d37999e37febc0c2505a8fc4996ac4369bd10b0bcb411ec74fe3eafb76bb1534
httpdASM 0.92 Directory Traversal
Posted Dec 28, 2010
Authored by AutoSec Tools

httpdASM version 0.92 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 55fd5686b91769bd5470387d8ce679f661312835161b3fdc62aebdaf85dbecb5
Hydra Network Logon Cracker 5.9
Posted Dec 28, 2010
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Update for the subversion module for newer SNV versions. Mysql module now has two implementations and uses a library when found. Better FTP 530 error code detection and more.
tags | web, cracker, imap
systems | cisco, unix
SHA-256 | 66023f94460abe76e76c1c6b187d44e82bafafb4c517314261bbd34429f913a7
Tor-ramdisk i686 UClibc-based Linux Distribution x86_64 20101227
Posted Dec 28, 2010
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: This release incorporates an important security fix from upstream. Tor was bumped to version 0.2.1.28 to address CVE-2010-1676. Busybox was bumped to 1.18.1 and the kernel to 2.6.32.27 plus Gentoo\'s hardened-patches-2.6.32-34.extras
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 66edca59a0dae98f7f3f1a847e0cbca6457205fe9069f9a1d43ef40f4d8ae598
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20101227
Posted Dec 28, 2010
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Changes: This release incorporates an important security fix from upstream. Tor was bumped to version 0.2.1.28 to address CVE-2010-1676. Busybox was bumped to 1.18.1 and the kernel to 2.6.32.27 plus Gentoo's hardened-patches-2.6.32-34.extras
tags | tool, x86, kernel, peer2peer
systems | linux
SHA-256 | 59b891f81e726ec82421f8e59b9ed29a5a9606b7383a15b8d84b7350865db664
THC-IPV6 Attack Tool 1.4
Posted Dec 28, 2010
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: Added thcping6, fake_mld26, fake_mldrouter6, exploit6, and denial6. Various other changes and improvements.
tags | protocol
systems | unix
SHA-256 | 4e6e5e55c27373dccafb631f98662d47edc81720ae40e8017a40697a3fbf6a13
HOTP Toolkit 1.0.1
Posted Dec 28, 2010
Site nongnu.org

The HOTP Toolkit package contains tools that are useful when deploying the one-time password HOTP technology. It contains a shared library, a command-line tool to generate and validate one-time passwords, and a PAM module (pam_hotp) to make system login or SSH use HOTP one-time passwords for authentication.

Changes: In libhotp, the usersfile logic for '-' passwords now works. A build failure due to a missing sys/stat.h include on FreeBSD 7.2 was fixed. A PDF format GTK-DOC manual was included. Gnulib files were updated. The project is in the process of being renamed to OATH Toolkit in order to make room for OATH TOTP/OCRA in addition to OATH HOTP.
tags | tool
systems | unix
SHA-256 | cdfac5c21da8e0b4b64a832c0ae45bcf108d80f32bc66f8091ee084f5273deb6
Pixie 1.04 Cross Site Request Forgery
Posted Dec 28, 2010
Authored by Ali Raheem

Pixie versions 1.04 and below suffer from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | ac01721cd08e633dd4cd4f9cf891eaaaba0f2e357da8e51dde1f7789771ba7c3
OATH Toolkit 1.2.1
Posted Dec 28, 2010
Site nongnu.org

The OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

tags | tool
systems | unix
SHA-256 | 66fd060c161061371e9c71ee45b94c03dd6e062291ef49bf10512d226e1c7c42
Joomla SQL Injection
Posted Dec 28, 2010
Authored by Zerial

The people.joomla.org site suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bb3fe2470b39010427ead7c7bea95c6c17c1ae1e8d465f23f34a6977c9e9540a
Secunia Security Advisory 42710
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mafya Oyun Scrpti, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | a2e39e82a8baac246c9817e4669741e396b86f9402f80020bca9a1cb14641738
Secunia Security Advisory 42714
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MH Products Download Center, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2a3d6d09081dd13390282a85b5bba3065952ab6439332f9cd3d860e7b6d6a1a8
Secunia Security Advisory 42683
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in AjaXplorer, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | 71d0fa8f07023740e903f454dff0b3a95653c57ef0567c9ceb770fbd2fc3f6be
Secunia Security Advisory 42669
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in MP3 CD Converter, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4e6d3c01ec4db478e8fc4260c2a1710bb5aeebff77d73068ef0ff05a34098669
Secunia Security Advisory 42536
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Tor, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 791556065f714b3b901acce9e4d5e7a3413313f7cd098a847b31603f524914cd
Secunia Security Advisory 42711
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MH Products Projekt Shop, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | c70474d3fe15f80bffdab4975afe69725d5ceca488fc0796d09d22308a8f37aa
Secunia Security Advisory 42762
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | bef061b481db82407c2dec427a276b76dbe23d239d4d3f6390fe23ea6f38e799
Secunia Security Advisory 42703
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and two vulnerabilities have been reported in IBM Lotus Mobile Connect, which can be exploited by malicious people with physical access to bypass certain security restrictions and malicious people to cause a DoS (Denial of Service)

tags | advisory, denial of service, vulnerability
SHA-256 | c3ad8a25f2df52e875fc9a1840ec39e6dc2b1048352aa775113386dbe94c3a3d
Secunia Security Advisory 42761
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for eclipse. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | e260e441fd46bc4427e44aad97ffa2aae770d0843fe4ce0c15b38a71bddaa30a
Secunia Security Advisory 42740
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Pligg, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 9f169e3de2548fd402c9a3362ee250ef006afbdf604b22bd455ed1952a80268e
Secunia Security Advisory 42728
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in CubeCart, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 2d8a7d2c29ebfaa3636f7554f1779d4cee9e234fc62e4401be4213695f188628
Secunia Security Advisory 42721
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
SHA-256 | 6ab8f9edb389f3ff7a076739165bf79b61bec6b1486440052644bf5a15c8f882
Secunia Security Advisory 42732
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Pidgin, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 58bae1ccb01fde571d6e706252f5fb11c49ca676fb680c888cd1ce455158a49b
Secunia Security Advisory 42760
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dbus. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | 9147c50b636324064e33c2e8924c5af0e822866a2e22c44448c032d21fa3d5c2
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close