exploit the possibilities
Showing 1 - 25 of 33 RSS Feed

Files Date: 2011-01-13

CONFidence 2011 Call For Papers
Posted Jan 13, 2011
Site 2011.confidence.org.pl

CONFidence 2011 Call For Papers - This conference will take place from May 24th through the 25th, 2011 in Krakow, Poland.

tags | paper, conference
MD5 | 09b2c1b1e2e3929aaaacfb0e2bf6768a
RAID 2011 Call For Papers
Posted Jan 13, 2011
Site raid2011.org

RAID 2011 Call For Papers - This symposium, the 14th in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. The Recent Advances in Intrusion Detection (RAID) International Symposium series furthers advances in intrusion defense by promoting the exchange of ideas in a broad range of topics. This event will be held from September 20th through the 21st, 2011 in Menlo Park, California.

tags | paper, conference
MD5 | 219bcdf74b5c96a3c3814b4ca5e4530b
RealNetworks RealPlayer Code Execution
Posted Jan 13, 2011
Authored by Sean de Regge

Proof of concept code that demonstrates the parameter injection bug in Realplayers RecordClip() active-x function and firefox plug-in.

tags | exploit, activex, proof of concept
MD5 | b310641a123029e16de43f8e1c8081c2
Drupal 5.x / 6.x Stored Cross Site Scripting
Posted Jan 13, 2011
Authored by Aung Khant | Site yehg.net

Drupal versions 5.x and 6.x suffer from a stored cross site scripting vulnerability.

tags | advisory, xss
MD5 | b5db5de54511990f34b16bf659069c02
Win32k Keyboard Layout Vulnerability
Posted Jan 13, 2011
Authored by Ruben Santamarta

Demonstration code for the Win32k Keyboard Layout vulnerability as described in MS10-073.

tags | exploit
advisories | CVE-2010-2743
MD5 | f1e986e144d55f6411679f832c025620
Haveged 1.1
Posted Jan 13, 2011
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: The HAVEGE implementation has been improved to better stand up to aggressive compiler optimization and the code has also been reorganized to more cleanly separate the algorithm from its Linux harness. The result is more portable (at least to the point where a proof of concept builds and runs in a pure MSFT environment) and may be of interest to those outside of the usual Linux/gcc environment.
tags | tool
systems | linux, unix
MD5 | f7752f0355a0e89d8f196658db5f6884
Secunia Security Advisory 42823
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Panels module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | ded02d28bc61a01f4fb4f3fef25c8d08
Secunia Security Advisory 42878
Posted Jan 13, 2011
Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Web Gateway, which can be exploited by malicious people to conduct SQL injection attacks.

MD5 | 0907949ab7f3edbcffd1ef0e1495ca57
Secunia Security Advisory 42878
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Web Gateway, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, web, sql injection
MD5 | 0907949ab7f3edbcffd1ef0e1495ca57
Secunia Security Advisory 42898
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP LoadRunner, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | fde126afb980f7e4a4345783edeee2c0
Secunia Security Advisory 42899
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Contao, which can be exploited by malicious people to conduct script-insertion attacks.

tags | advisory
MD5 | 0705835e85ffe6005ba301eccd321568
Secunia Security Advisory 42885
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | solaris
MD5 | 85d04644a82acde08752c2e9259e56e7
Secunia Security Advisory 42855
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - k4shifz has reported a vulnerability in Destoon B2B, which can be exploited by malicious people to conduct SQL Injection attacks.

tags | advisory, sql injection
MD5 | a40970d3c94c74732c08bb07b2f54de5
Secunia Security Advisory 42891
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in libuser, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 655fcb545881f404fc97595b168f77bb
Secunia Security Advisory 42887
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Shibboleth, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
MD5 | 06ae84d772bd6f9601a4affd5d36db39
Secunia Security Advisory 42903
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Advantech Studio, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 8b0a01642444aceb6f8a4d46186a3af5
Secunia Security Advisory 42883
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in InduSoft Web Studio, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, web
MD5 | d38cf5ed46651490da63958d505f4138
Secunia Security Advisory 42884
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose system and potentially sensitive information and cause a DoS (Denial of Service), and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
MD5 | f1b65f12431e195a9a835692e74cea55
Secunia Security Advisory 42850
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to manipulate certain data and potentially compromise a user's system.

tags | advisory, vulnerability
MD5 | cb437e9c1eb5f224ddf5b5d99fb8c56c
Secunia Security Advisory 42888
Posted Jan 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for python. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, python
systems | linux, redhat
MD5 | 01b41bf047916661f6daed1b5b2878f1
SAP Management Console Information Disclosure
Posted Jan 13, 2011
Authored by Jordan Santarsieri | Site onapsis.com

Onapsis Security Advisory - It has been detected that many of the available methods in the sapstartsrv SOAP server in the SAP Management Console do not require user authentication, allowing remote and unauthenticated users to obtain sensitive information from the SAP system, such as the list of log files and their content, profile parameters, developer traces, etc.

tags | advisory, remote
MD5 | c2114cbaeba62b4d66d0f42cc591ca5a
SAP Management Console Unauthenticated Service Restart
Posted Jan 13, 2011
Authored by Jordan Santarsieri | Site onapsis.com

Onapsis Security Advisory - A denial of service vulnerability has been discovered in the processing of administration commands by the SAP MC. This functionality allows the restart of the service without providing authentication information.

tags | advisory, denial of service
MD5 | 39144aaea03618e7d6647941aa04c5c8
Digital Forensics Framework 0.9
Posted Jan 13, 2011
Authored by Christophe M., Solal J. | Site digital-forensic.org

DFF (Digital Forensics Framework) is a simple but powerful tool with a flexible module system which will help you in your digital forensics works, including file recovery due to error or crash, evidence research and analysis, etc. DFF provides a robust architecture and some handy modules.

tags | tool, forensics
systems | unix
MD5 | cfbbd55046b1833424192ed91532bca8
ARP Alert 2.0.11
Posted Jan 13, 2011
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Updated error in man. Minor orthographic correction in doc. Fixed erase of configure when make mrproper is called.
tags | local
systems | unix
MD5 | 4b2b7682b27c7f260716f59ecfa50ecc
pam_shield Null Routing PAM Module 0.9.5
Posted Jan 13, 2011
Site heiho.net

pam_shield is a PAM module that uses null-routing or iptables to lock out script kiddies that probe your computer for open logins or easy guessable passwords. pam_shield is meant as an aid to protect public computers on the Internet.

Changes: shield_purge would delete entries that were still active, causing the delete-rule trigger to never be executed in some cases. This bug has been fixed.
systems | linux, unix
MD5 | cbfcd96fad38943ed78fd4d37307aba2
Page 1 of 2
Back12Next

File Archive:

March 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    2 Files
  • 2
    Mar 2nd
    18 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    12 Files
  • 5
    Mar 5th
    19 Files
  • 6
    Mar 6th
    8 Files
  • 7
    Mar 7th
    1 Files
  • 8
    Mar 8th
    1 Files
  • 9
    Mar 9th
    11 Files
  • 10
    Mar 10th
    15 Files
  • 11
    Mar 11th
    9 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    13 Files
  • 14
    Mar 14th
    10 Files
  • 15
    Mar 15th
    13 Files
  • 16
    Mar 16th
    27 Files
  • 17
    Mar 17th
    15 Files
  • 18
    Mar 18th
    23 Files
  • 19
    Mar 19th
    25 Files
  • 20
    Mar 20th
    10 Files
  • 21
    Mar 21st
    6 Files
  • 22
    Mar 22nd
    1 Files
  • 23
    Mar 23rd
    22 Files
  • 24
    Mar 24th
    15 Files
  • 25
    Mar 25th
    22 Files
  • 26
    Mar 26th
    20 Files
  • 27
    Mar 27th
    15 Files
  • 28
    Mar 28th
    10 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close