what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2011-01-19

OATH Toolkit 1.4.2
Posted Jan 19, 2011
Site nongnu.org

The OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

tags | tool
systems | unix
SHA-256 | 1e67c42637f4c7674ed0c0d995d31cfc39ac8c813e2e88c5a4a21e1ac2492d7f
PHP Auctions Blind SQL Injection
Posted Jan 19, 2011
Authored by BorN To K!LL

PHP Auctions suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 14f6e12fa4a43df00b81c99c8c2240e369bf4b3a97aaafe01d82437da60acc91
w3af Web Application Attack and Audit Framework 1.0 RC5
Posted Jan 19, 2011
Authored by Andres Riancho | Site w3af.sourceforge.net

w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more.

Changes: Improvements include new vulnerability checks, more stable code and an approximate 15% performance boost in the overall speed of your scan.
tags | tool, remote, web, local, xss, sql injection, python, file inclusion
SHA-256 | afdd6a37613b8f67cc991a864aeafc32f534399eb0c712a77d8422be363deb32
Mobius Forensic Toolkit 0.5.6.1
Posted Jan 19, 2011
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: A bug in the startup code for release 0.5.6 was fixed.
tags | tool, python, forensics
systems | unix
SHA-256 | 66a3930e270ce3dfd0eabe64b232e0422f037e386013002a79bcd3787ae0d318
Kismet Wireless Network Sniffer 2011-01-R1
Posted Jan 19, 2011
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: GPS logging was added in PPI pcap files. A Ruby network API was added. Several Ruby clients were added, including a network card performance shootout tool. WPA migration mode detection was added. Initial minimal zigbee/802.15.4 plugin support was implemented. Packaging helper scripts were written. Per-capture source per-network signal tracking was added. 802.11d handling, client preferences, mac80211 card configuration, and XML logging were fixed.
tags | tool, wireless
systems | cisco, linux, unix, freebsd, openbsd, apple, osx
SHA-256 | 99e76f8f7684199b9176a7a2f6b1bb5c637d89f6906d6de279794fb1fb22cde1
vsworld.com SQL Injection
Posted Jan 19, 2011
Authored by Sandeep Sengupta, Pradip Sharma

vsworld.com suffered from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 84eee67e143af8a83c441eaf4efd7b902ea28b7af5f029132b65b0e5dd4a2dc8
ALZip 8.12.0.3 Buffer Overflow
Posted Jan 19, 2011
Authored by C4SS!0 G0M3S

ALZip version 8.12.0.3 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 9997cc4beddf2df5f48f2b7afab0a4a6488414397243582c2058cd8273b270d3
Novell iPrint 5.52 ActiveX GetDriverSettings() Exploit
Posted Jan 19, 2011
Authored by Dr_IDE

Novell iPrint versions 5.52 and below active-x GetDriverSettings() remote exploit.

tags | exploit, remote, activex
advisories | CVE-2010-4321
SHA-256 | 86f276924df3584972409a858e2eacedb5fba702c6c79a2304107e139e7b9084
N-13 News 3.4 Cross Site Request Forgery
Posted Jan 19, 2011
Authored by anT!-Tr0J4n

N-13 News version 3.4 suffers from a remote administrator addition cross site request forgery vulnerability.

tags | exploit, remote, csrf
SHA-256 | db9750e361a493b4e2180b3eb9df353cb1dc6c1560955919e0046197e71b8f8e
Secunia Security Advisory 42988
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun GlassFish Enterprise Server and Sun Java System Message Queue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, java, local
SHA-256 | 9ed56853471e8e863c637b4c47f2dfc7b2ab6521e639f4b174cbfa4d9f0af065
Secunia Security Advisory 42970
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a security issue in Oracle Health Sciences - InForm, which can be exploited by malicious people to bypass certain security features.

tags | advisory
SHA-256 | 085e54e3f9014d92f83bd6ef91f5fa52b4223cb90ca8e0ab6f922557d64b8164
Secunia Security Advisory 42993
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle Transportation Manager, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | f8e94edadc882579026ddf3da2622303b55a70d0d54890a921572118893a5725
Secunia Security Advisory 42986
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle OpenSSO / Sun Java System Access Manager, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, or cause a DoS (Denial of Service).

tags | advisory, java, denial of service
SHA-256 | 02c50ef0b03616e0f6057f86d83c41711153313b352e40b77ff2bcc63cb1eaeb
Secunia Security Advisory 42984
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges and by malicious people to disclose system information, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | solaris
SHA-256 | 9c5f7e680ca222ee7185338bffe74a2c483121d9c5fbbcbf1add1b46cd0b3888
Secunia Security Advisory 42936
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | dad49d15c4d17059ad21110fc033e75b04fd4d6f88c93a829acc9779b2e43efd
Secunia Security Advisory 42987
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Java Communications Suite, which can be exploited by malicious people to disclose potentially sensitive information and manipulate certain data.

tags | advisory, java
SHA-256 | 958cd0c8d7a2fb611866c6687854d446a76e95a34c9750a674a7a3595c6195c8
Secunia Security Advisory 42972
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in MyProxy, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 45744cbf8aa4a546829635b93f4fcfe54d09819f5dde14a6a6fefef1e6ef1669
Secunia Security Advisory 42926
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
systems | solaris
SHA-256 | 5832a53316217d6a7ebfde3d40b9a9c494ffd703d28886a84b0bdc7137d3a350
Secunia Security Advisory 42948
Posted Jan 19, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marcell Major has reported a security issue in Apache Derby, which can be exploited by malicious people to bypass certain security features.

tags | advisory
SHA-256 | d57a80a90f3bcf0b47ec8941e13b776675544e08895b9e4a822d8b8f6d19dd4a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close