exploit the possibilities
Showing 1 - 25 of 27 RSS Feed

Files Date: 2011-06-20

cryptmount Filesystem Manager 4.2
Posted Jun 20, 2011
Authored by RW Penney | Site cryptmount.sourceforge.net

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

Changes: This release adds protection against accidental formatting of encrypted swap partitions. Compatibility with cryptsetup-1.2 has been improved. Extended use of pkg-config within the build system.
tags | kernel, encryption
systems | linux, unix
MD5 | bb6163336044b3da679678fe633dcd4d
Botan C++ Crypto Algorithms Library 1.10.0
Posted Jun 20, 2011
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release adds SSL/TLS (both client and server mode, up to TLS v1.1), the GOST 34.10-2001 signature scheme, the Keccak hash function, the XSalsa20 stream cipher, bcrypt password hashing, AES key wrapping, dynamically loaded engines, and a number of other features. New optimizations for AES, Serpent, ECDH, ECDSA, and SHA-2 are also included.
tags | library
systems | linux
MD5 | 1f03a6a84f402a12e50665868dddae99
GrokEVT Scripts 0.5.0
Posted Jun 20, 2011
Authored by Tim Morgan | Site sentinelchicken.org

GrokEVT is a collection of scripts for reading Windows event log files on Unix. The scripts work together on one or more mounted Windows partitions to extract all information needed (registry entries, message templates, and log files) to convert the logs to a human-readable format.

Changes: This is a major code refresh release to catch up with the times. grokevt-builddb has been redesigned to use RegLookup's pyregfi library instead of executing the command line tools. A work-around has been added for the fact that many Linux distributions no longer make case-insensitive filesystem mounts easy. Support jas been added for Python 3. The license has been changed to the GPLv3. There are various Unicode fixes and other bugfixes.
tags | registry
systems | windows, unix
MD5 | 787a28d5d253e07522305208ca65bc96
XnView 1.98 Denial Of Service Proof Of Concept
Posted Jun 20, 2011
Authored by BraniX

XnView version 1.98 proof of concept denial of service exploit.

tags | exploit, denial of service, proof of concept
MD5 | 871bd007765bd0a613b4a01fac5e3ae0
Debian Security Advisory 2265-1
Posted Jun 20, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2265-1 - Mark Martinec discovered that Perl incorrectly clears the tainted flag on values returned by case conversion functions such as "lc". This may expose preexisting vulnerabilities in applications which use these functions while processing untrusted input. No such applications are known at this stage. Such applications will cease to work when this security update is applied because taint checks are designed to prevent such unsafe use of untrusted input data.

tags | advisory, perl, vulnerability
systems | linux, debian
advisories | CVE-2011-1487
MD5 | ebb7170862c406a88729f0ea12216d53
WordPress WPTouch 1.9.27 URL Redirection
Posted Jun 20, 2011
Authored by MaKyOtOx

WordPress WPtouch plugin version 1.9.27 suffers from a URL redirection vulnerability.

tags | exploit
MD5 | 93476f7f42499d616be7e5be1382eb2e
Netclues Script SQL Injection
Posted Jun 20, 2011
Authored by HeRoTuRK

Netclues Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 249ecf3605ccf7a8e823ce67eb8c4da1
RegLookup Registry Parser 1.0.0
Posted Jun 20, 2011
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: SK records and security descriptors are now accessible in pyregfi. Key caching was added to regfi, and SK caching was reintroduced. Minor API simplifications were made and documentation was improved. Numerous bugs were fixed.
tags | registry
systems | windows, unix, nt
MD5 | 1fb1eea7435d368a91ade8c4016b5be6
WiRouter KeyRec 1.0.6
Posted Jun 20, 2011
Authored by Salvatore Fresta | Site salvatorefresta.net

WiRouter KeyRec is a powerful and platform independent piece of software that recovers the default WPA passphrases of the supported router's models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley).

Changes: A small bug has been fixed in agpf.c (a floating point exception).
tags | tool, wireless
MD5 | 38b1cf213be8c9912d3bd9acc7c1de09
Black Ice Cover Page ActiveX Control Arbitrary File Download
Posted Jun 20, 2011
Authored by mr_me | Site metasploit.com

This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0).

tags | exploit, remote, arbitrary, activex
MD5 | b539337d6dc304b3cce1aafe3e5fdf14
Black Ice Fax Voice SDK 12.6 Code Execution
Posted Jun 20, 2011
Authored by mr_me

Black Ice Fax Voice SDK version 12.6 remote code execution exploit.

tags | exploit, remote, code execution
MD5 | c481a1e286553252256a8c841a357bad
Websitesforless SQL Injection
Posted Jun 20, 2011
Authored by N[-m0]

Sites design and developed by Websitesforless suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e52158552e5512311003b9137e4e519f
KievShina Designs SQL Injection
Posted Jun 20, 2011
Authored by Xecuti0N3r

KievShina Designs suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b285e868030b141d46bbac2ebf55f4f5
Time Warner SQL Injection
Posted Jun 20, 2011
Authored by Xecuti0N3r

It seems that sites owned by Time Warner all seem to suffer from the same remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 1ae04f0086e9c27477656370449271a3
EssentialSoft Sales Force Automation SQL Injection
Posted Jun 20, 2011
Authored by Xecuti0N3r

EssentialSoft Sales Force Automation Systems suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 62025c4a99b54452ae264bc506445477
Joomla Calc Builder Blind SQL Injection
Posted Jun 20, 2011
Authored by Chip D3 Bi0s

The Joomla Calc Builder component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 86c1558703b154c37053acfa41bd77ca
Joomla Team SQL Injection
Posted Jun 20, 2011
Authored by CoBRa_21

The Joomla Team component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a2c7b2160a3782d2f424544b3ff1fdf0
Burning Board 3.1.5 Path Disclosure
Posted Jun 20, 2011
Authored by linc0ln.dll

Burning Board version 3.1.5 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 0c8dd339e7cf383ebe7e362c3840b686
SmartFTP Saved Password Extraction
Posted Jun 20, 2011
Authored by The Light Cosine | Site metasploit.com

This Metasploit module finds saved login credentials for the SmartFTP FTP client for windows.

tags | exploit, info disclosure
systems | windows
MD5 | 7fb5a0eb38fe57a19b7a2fb857fedcf8
DATAC RealWin SCADA Server 2 On_FC_CONNECT_FCS_a_FILE Buffer Overflow
Posted Jun 20, 2011
Authored by Luigi Auriemma, MC | Site metasploit.com

This Metasploit module exploits a vulnerability found in DATAC Control International RealWin SCADA Server 2.1 and below. By supplying a specially crafted On_FC_BINFILE_FCS_*FILE packet via port 910, RealWin will try to create a file (which would be saved to C:\Program Files\DATAC\Real Win\RW-version\filename) by first copying the user-supplied filename with a inline memcpy routine without proper bounds checking, which results a stack-based buffer overflow, allowing arbitrary remote code execution. Tested version: 2.0 (Build 6.1.8.10).

tags | exploit, remote, overflow, arbitrary, code execution
MD5 | 005a85c098def3da5120c20ac4f1c492
Secunia Security Advisory 44990
Posted Jun 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sunway pNetPower, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 40451776cc1ab99f3b189c81af313b1f
Secunia Security Advisory 45010
Posted Jun 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for SUSE Manager. This fixes a weakness and a vulnerability, which can be exploited by malicious people to conduct spoofing and cross-site request forgery attacks.

tags | advisory, spoof, csrf
systems | linux, suse
MD5 | 65ea331255aa8cd68adcaf08d7dc8be7
Secunia Security Advisory 44951
Posted Jun 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 5up3rh3i has discovered a vulnerability in the Firebug extension for Mozilla Firefox, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 533933439a407bab729c288a1724e293
Secunia Security Advisory 44989
Posted Jun 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for unixODBC. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, suse
MD5 | 15ea9b0faf4b4cd29815ddea02579b35
Secunia Security Advisory 45026
Posted Jun 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the vBExperience module for vBulletin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 7d24de34bf14d1cdaf50852e00b4666e
Page 1 of 2
Back12Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close