exploit the possibilities
Showing 1 - 25 of 33 RSS Feed

Files Date: 2012-12-27

THC-IPv6 Attack Tool 2.1
Posted Dec 27, 2012
Authored by van Hauser, thc | Site thc.org

THC-IPv6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: 4 new tools, features, and bug fixes.
tags | tool, protocol
systems | unix
SHA-256 | c9a8ec278e090c1a11698c6399ae8d21b8d1b1937d18a41f8018cc9fdbbb4aa2
Mandriva Linux Security Advisory 2012-184
Posted Dec 27, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-184 - A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-5581
SHA-256 | 63bb15678f98d3f88c55fc3fd9fdc5b2ab5cde83476b9ca26866d1e2f13c833b
AnonTwi 1.0
Posted Dec 27, 2012
Authored by psy | Site anontwi.sf.net

Anontwi is a tool for OAuth2 applications, such as GNUSocial and Twitter, that provides different layers of encryption, privacy methods and proxy features. It contains a GTk+ interface.

tags | tool, python
systems | unix
SHA-256 | c5703e4d6f26d918675cc3aafcb897b81f3a14dc863e0dcbbd16e2fe4340fc76
Hook Analyser Whitepaper
Posted Dec 27, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a freeware project, started in 2011, to analyse an application during the run-time. The project can be potentially useful in analysing malwares (static and run time), and for performing application crash analysis. This paper breaks down the features and functionality of the tools and provides guidance on usage.

tags | paper
SHA-256 | ed9f551626fc0ef6a9249da2d0f785a54fd706f84324da2698fdb8fd408895f4
Another File Integrity Checker 3.3
Posted Dec 27, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This release continued the rewrite with libraries and unit tests. Afick::Gen, a new library for generic code was added. A bug was fixed in the fix report_url option. The check_update feature was also fixed.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | 09e9674109a70567315f3b473402b481393dff4d7842f9bf2844db43d014279f
Guru Auction 2.0 SQL Injection
Posted Dec 27, 2012
Authored by v3n0m

Guru Auction version 2.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 432bf701264880c31dea851f61f3256e26b800ff0bcebbd2e38fa86eccaabb96
NVidia Display Driver Buffer Overflow
Posted Dec 27, 2012
Authored by Peter Winter-Smith

This is an exploit for a stack buffer overflow in the NVidia Display Driver Service. The service listens on a named pipe (\pipe\nsvr) which has a NULL DACL configured, which should mean that any logged on user or remote user in a domain context (Windows firewall/file sharing permitting) should be able to exploit this vulnerability.

tags | exploit, remote, overflow
systems | windows
SHA-256 | a93753892580d6dad44444623d6355d154269fccaba04b2dcab06daf83d116a5
Debian Security Advisory 2590-1
Posted Dec 27, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2590-1 - Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2012-4048, CVE-2012-4296
SHA-256 | 8358c2231282a77c235e3d741a2b73ed644cb0841106bc049aaebc27be235305
WHM editfilter.html Stored Cross Site Scripting
Posted Dec 27, 2012
Authored by Rafay Baloch

WHM suffers from a persistent cross site scripting vulnerability in editfilter.html.

tags | exploit, xss
SHA-256 | 498c8c6dadd5adfb705f89ba68b3ada04597df8845b2cbf34b67a9eec9df6b9d
Secunia Security Advisory 51688
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Rational Functional Tester, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 20fb5fdb5853535438de4f31e4a7ba5e2d5a87ca5902175ae6bae09b3a4ad71d
Secunia Security Advisory 51651
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cPanel, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | f25333031b6c0a2fe516314619a923ac5a7ec755420487cd7eda2176fdcbaf81
Secunia Security Advisory 51672
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC Data Protection Advisor, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
SHA-256 | 9f4fc1e569b9318d8a4429c477a69c16ac5cb8642b67681951b1ce26e380b1a8
Secunia Security Advisory 51519
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeType, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
SHA-256 | 1c5bc6e202f8040b64fe882300d8e8cab737d0c242b1bc555c13a03c456ff0b9
Secunia Security Advisory 51664
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in multiple products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | a0da1db9b47c414190cab764db59d0be8b281d3fbf51e9f1c249e591901541a1
Secunia Security Advisory 51585
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aung Khant has reported a vulnerability in Open-Realty, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | d3727f37f6894e1377087525084f8bff805ec69d78c2a24fb9084f7c10f2d2d1
Secunia Security Advisory 51666
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in grep, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 4203930f74e8f9e413ed4ba318cf0126857ad31fc57ecdf570ffd6918a03e3e0
Secunia Security Advisory 51624
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a weakness in multiple products, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
SHA-256 | 7899103b1504ff5e6d91017524c3105edbe5bdfdfe4e80a91579dffbf9bdbd91
Secunia Security Advisory 51626
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in multiple products, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | d7e4c60dc4e0adb4b2d1e18f1f2c74102a094d13a7597fbf5210f648fdf47cff
Secunia Security Advisory 51630
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in some Hitachi Collaboration products, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a403e7c817aba13fc7407871c4e9b0dbc84a74d3dab651eb28270892bcc055e7
Secunia Security Advisory 51681
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities in IBM Rational Synergy, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, spoof, vulnerability, xss
SHA-256 | 831aef907d1babac13a69d8692d0b26c09af19e1cb1f664be739fec5eb7bc7ec
Secunia Security Advisory 51685
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for chromium. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 1a9263d4caaacd781c2c2c1f4a4f172df3baa00476b0b32d46f8752bf7f2f4d3
Secunia Security Advisory 51614
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability has been reported in ownCloud, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, xss
SHA-256 | aea82d5bddcdce50365aacf9018fd929d68065c0a329d9b74771c5dca3f27f54
Secunia Security Advisory 51619
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - DigiP has reported a vulnerability in the Clockstone theme for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 8bc956b49533d41c6594fcee43a15244b7d03b9a27df6cf6c2269c01ab1b5c6e
Secunia Security Advisory 51674
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pfSense has acknowledged multiple vulnerabilities in pfSense, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially compromise an application using the library.

tags | advisory, denial of service, local, vulnerability
SHA-256 | da26c3b2a0f733e8b56621c2b7644185c5811a51b6f4989a8da8e8914b7dde21
Secunia Security Advisory 51668
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered multiple vulnerabilities in Hero Framework, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | 55aabaf936a391441bae8fbaf4b07f069fb015921c475a6abcc8c2aef509beca
Page 1 of 2
Back12Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close