what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 149 RSS Feed

Files Date: 2006-08-17 to 2006-08-18

Samhain File Integrity Checker
Posted Aug 17, 2006
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 86f72e8126a73d98c2081a055644ae05da1e9bb0c9ec171a4eabf93ff71b2662
integrit-4.0.tar.gz
Posted Aug 17, 2006
Site integrit.sourceforge.net

Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.

Changes: Updated output format for "new" file checksums to match "removed".
tags | tool, intrusion detection
systems | unix
SHA-256 | b0c09cf90404045759571a768a1f4581c0fc7db9a07bc00fef7356c799b200ec
TOR Virtual Network Tunneling Tool 0.1.1.23
Posted Aug 17, 2006
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Add async dns code from Adam Langley, tweaked to build on OSX. Various other improvements.
tags | tool, remote, local, peer2peer
SHA-256 | a2ac0b10089902c2de8649e07823dc46b8876cd3e0236505e5e7f1f49ee11025
radmind-1.7.0.tar.gz
Posted Aug 17, 2006
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Major changes from 1.6.1 include performance improvements to fsdiff and functionality on Linux.
tags | tool, intrusion detection
systems | unix
SHA-256 | 2600321cbbc9382ce2dd2294f61b52b370f79844263661bd1886817ea198d226
exp_jmp_rand.pl.txt
Posted Aug 17, 2006
Authored by Andrea Purificato | Site rawlab.altervista.org

Exploit solution against Linux kernel 2.6 stack randomization using the jmp *%esp technique.

tags | exploit, kernel
systems | linux
SHA-256 | 50a882d748cd436140df3f15901fee6e21f635b7cf433b54fac79e42d350c913
exp_call_rand.pl.txt
Posted Aug 17, 2006
Authored by Andrea Purificato | Site rawlab.altervista.org

Exploit solution against Linux kernel 2.6 stack randomization using the call *%edx technique.

tags | exploit, kernel
systems | linux
SHA-256 | 16d98d0ba424ee3cc5b8ecf2bce540a7d301dae45c7a1ab48f2ec42703fb7b08
VMware Security Advisory 2006-0004.asc
Posted Aug 17, 2006
Authored by VMware | Site vmware.com

VMware Security Advisory - Three vulnerabilities have been addressed in VMWare ESX.

tags | advisory, vulnerability
advisories | CVE-2005-3618, CVE-2005-3620, CVE-2006-2481
SHA-256 | bbf9b9eec0618eef1cc22c20191021d149ef39888c4f7849cc0823e1fc498e76
Mandriva Linux Security Advisory 2006.135
Posted Aug 17, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-135 - A buffer overflow exists in Freeciv versions 2.1.0-beta1 and below that may allow for a denial of service and arbitrary code execution.

tags | advisory, denial of service, overflow, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2006-3913
SHA-256 | 244983117c61a98882c24d525cda6d380bc07661d036a8c9d4631d5073fdb64a
lhaplus.txt
Posted Aug 17, 2006
Authored by Tan Chew Keong | Site vuln.sg

LHAPlus version 1.52 suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | b1b5d6fe35b827ddc39b6a46190e8a09fed246c2f7a88badeb89caad29dbe617
mynewsgroups06b.txt
Posted Aug 17, 2006
Authored by Philipp Niedziela

MyNewsGroups versions 0.6b and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 8175a43e0e31f083830b21050827c53adecfa12162b693e12058310dacc57902
ocpbof.zip
Posted Aug 17, 2006
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit for buffer overflows in Open Cuber Player versions 2.6.0pre6 and below on DOS/Windows and versions 0.1.10_rc5 and below on Linux and *BSD.

tags | exploit, overflow, proof of concept
systems | linux, windows, bsd
SHA-256 | f57f843087a4645acacbbf04b7849bcb21a566c248bd52d9266ab0c48f513414
ocpbof.txt
Posted Aug 17, 2006
Authored by Luigi Auriemma | Site aluigi.org

Open Cuber Player versions 2.6.0pre6 and below on DOS/Windows and versions 0.1.10_rc5 and below on Linux and *BSD suffer from buffer overflows.

tags | advisory, overflow
systems | linux, windows, bsd
SHA-256 | 9b3a03e61acfd69f03e4cecf4b2ad1662bec2b4aa3d417a8ab4e1587e088f6d2
Corsaire Security Advisory 2006-05-12.1
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a local attacker to gain access to users' (including root's) passwords under certain conditions via a cookie issue.

tags | advisory, local, root
advisories | CVE-2006-2481
SHA-256 | 7d94b30ef247c8df7d87e8885665988e245aa6bdd92034fae2049c0c90a4cc46
Corsaire Security Advisory 2005-11-14.3
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a local attacker to read users' (including root's) passwords under certain conditions.

tags | advisory, local, root
advisories | CVE-2005-3620
SHA-256 | 0496ab765de22a5820ee6012fc38444603ee124876d472340221a100c0ffa212
Corsaire Security Advisory 2005-11-14.1
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a remote attacker to set arbitrary passwords for users under certain conditions.

tags | advisory, remote, arbitrary
advisories | CVE-2005-3618
SHA-256 | ce767781800241562f4b89adcec9e7065422afca428c1e9f89e007b48ae77c10
Powerpoint2003_SP2updated_Exploit_Fr.cpp
Posted Aug 17, 2006
Authored by NSRocket

Microsoft PowerPoint 2003 SP2 updated (french version) exploit that was tested by the author on WinXP SP2.

tags | exploit
systems | windows
SHA-256 | 7ab4ba128e0c6b5267479530004327665aad550c9c0a0d06dc382916edf2a1a9
glsa-2006-05-08-02.txt
Posted Aug 17, 2006
Site security.gentoo.org

Gentoo Linux Security Advisory [UPDATE] GLSA 200605-08:02 - The initial fix for PHP did not fix CVE-2006-1990 on 64 bit systems. Versions less than 5.1.4 are affected.

tags | advisory, php
systems | linux, gentoo
SHA-256 | 8891eaac036139c660f09a25ece0f67696eb9c9290c55970ad80f459b6c12fcf
seirCMS.txt
Posted Aug 17, 2006
Authored by CR | Site svt.nukleon.us

Seir Anphin version 666 CMS suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 7f0dfe1bebb434da8d1a1238005a0d65c224abf957366d525a2456008485aa51
phpauction21.txt
Posted Aug 17, 2006
Authored by Philipp Niedziela

PHPAuction version 2.1 with phpAdsNew version 2.0.5 suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 17600fa4b99327b05ea56d33f4bd926a3024db22c2246766bb69a99281bb84af
firefox15.txt
Posted Aug 17, 2006
Authored by Andrew A

Stacking multiple CSS style attributes across span tags leads to a race condition which can result in denial of service or arbitrary code execution in Mozilla Firefox versions 1.5 and below.

tags | advisory, denial of service, arbitrary, code execution
SHA-256 | 06d527d68ad08abe0aee378d4fc8832a3c634666bb37a31f77cdd8f889606ff5
atutor1531.txt
Posted Aug 17, 2006
Authored by rgod | Site retrogod.altervista.org

ATutor versions 1.5.3.1 and below 'links' blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 744ac1c5b69dbe75ff5e08b1116abdf005ea1862eed261399ccefcf937c59c27
xstatics120.txt
Posted Aug 17, 2006
Authored by Sirdarckcat | Site elhacker.net

X-Statics version 1.20 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 5d6ec55ec926cebe86037a5ac5f9b2975c1a49ba11c9f7ba24256990057acfb8
xprotection110.txt
Posted Aug 17, 2006
Authored by Sirdarckcat | Site elhacker.net

X-Protection version 1.10 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | a2de4b513be1113137fbdd39f0e383ae7ae13ad16f41cc1cc341b155b4c300d2
xpoll110.txt
Posted Aug 17, 2006
Authored by Sirdarckcat | Site elhacker.net

X-Poll version 1.10 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 83019e3c2aa32e402f6e76a402dca0b5fab8033aa9bac7fe2b8e0c41ca689cda
tpf.tgz
Posted Aug 17, 2006
Authored by Sirdarckcat | Site elhacker.net

TinyPHPForum suffers from cross site scripting, directory traversal, and direct administrator creation flaws. Exploit included.

tags | exploit, xss
SHA-256 | 883c87849f8ef65d5b053261e4d55b36caf63da073fbfb5291076622703045fc
Page 4 of 6
Back23456Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close