exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 116 RSS Feed

Files Date: 2006-10-04 to 2006-10-05

Tenshi Log Monitoring Program
Posted Oct 4, 2006
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: added group_host feature for selective hostname matching
tags | system logging
systems | unix
SHA-256 | 4d729d41b420e1075f78cdd31d2d0302ea9433cea9aae8ec2adc90da8e1f5696
RFIDIOt-0.1e.tgz
Posted Oct 4, 2006
Authored by Adam Laurie | Site rfidiot.org

RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).

Changes: Add ICAO 9303 structures for Machine Readable Passports, New test program: mrpkey.py for ICAO 9303, Move reader config to RFIDIOtconfig.py, Add EM4x05 ID decode
tags | tool, python, wireless
SHA-256 | 2224e975e96199ec9d3e823857585f714421ecf40e2e9cc3342a7d01b58aa29e
rs_aix_host.sh
Posted Oct 4, 2006
Authored by Roman Medina-Heigl Hernandez aka RoMaNSoFt | Site rs-labs.com

Shell exploit for AIX gethostbyname() Buffer Overflow vulnerability circa 1996.

tags | exploit, overflow, shell
systems | aix
advisories | CVE-1999-0101
SHA-256 | 41ef219e5a180e363acc2fdf7a6a7faeaa86b8ffe4c6957941c56bf77efb00b1
UBB.threads-6.txt
Posted Oct 4, 2006
Authored by HACKERS PAL

UBB.threads 6.5.1.1 suffers from multiple input validation flaws which can allow for remote command execution. Exploit provided.

tags | exploit, remote
SHA-256 | 9b5132dec8b4b6f2dcdbc2e05bfd2224e677211efa989160c542e6d11e23ad51
PHProjekt-5.1.1.txt
Posted Oct 4, 2006
Authored by Stefan Esser | Site hardened-php.net

PHProjekt 5.1.1 suffers from a flaw that could allow attackers to include remote php files.

tags | advisory, remote, php
SHA-256 | aa12a2eced2ce5f6ffbf950f407376aa21d5c08203dfc01de189419559e35eb0
PostNuke0.762.txt
Posted Oct 4, 2006
Authored by Omid | Site hackers.ir

The admin section of PostNuke 0.762 suffers from a SQL injection flaw.

tags | advisory, sql injection
SHA-256 | dd55bf22113c3c531036c50e967856be635f87c51799ac2e0f44f24738be9d61
bSpeak1.10.txt
Posted Oct 4, 2006
Authored by Prohibited

bSpeak 1.10 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | a051b6042556b18e103bd30494e88f192c6f2f0e8b2aad5e3d477ef46701493b
Flipv3.0.txt
Posted Oct 4, 2006
Authored by Sp1deR_NeT

Flip v3.0 suffers from a remote file inclusion vulnerability in index.php

tags | exploit, remote, php, file inclusion
SHA-256 | 1d6dd870f666f5ce5594d07a370bc79e2552dfafc4c75759f6c0e72243b315a5
phpBBXS2.txt
Posted Oct 4, 2006
Authored by Solpot | Site nyubicrew.org

phpBB XS 2 spain version remote file inclusion vulnerability in functions_kb.php.

tags | exploit, remote, php, file inclusion
SHA-256 | b11faaba1c574e2d6a5e2787d34e4e6c9ce7f11f44494afd63f81452943889d6
Analysis-of-Microsoft-Windows-Vistas-ASLR.pdf
Posted Oct 4, 2006
Authored by Renaud Lifchitz | Site sysdream.com

Windows Vista includes a new memory protection system called ASLR. Its goal is to escape buffer overflow attacks in vulnerable programs. Ali Rahbar, has made a complete study of this security mechanism, and found a new implementation flaw that allows to bypass this protection.

tags | paper, overflow
systems | windows
SHA-256 | ad6a77fa5b3d6c6bce6fb4adca924de45e844e69503cf4da13df83f15ab40765
wifi-advanced-stealth-patches.tar.gz
Posted Oct 4, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

wifi-advanced-stealth-patches are a set of basic patches for the madwifi-ng driver in order to achieve good stealth at low cost! It can be useful in protecting your own network from wardrivers and attacks (denial-of-service, wep cracking...) as your modified access point and client are the only ones that understand themselves! Some embedded access point like the Netgear WG634U have an Atheros chipset (OpenWRT + madwifi) and thus may be modified to support stealth at low cost. These patches are only a proof-of-concept and may be improved in many ways as possibilities are quite infinite... These patches were released at BlackHat US 2006.

tags | tool, wireless
SHA-256 | eb1c82d15aa2a2817a8f3510a77fa9d8aef7363d7ebb0cc1b2a5206f49b973fd
pyrawcovert-0.1.tar.gz
Posted Oct 4, 2006
Authored by Laurent Butti | Site rfakeap.tuxfamily.org

pyrawcovert is an enhancement of the Raw Covert tool that was released at ShmooCon2006. It is a covert channel over the 802.11 protocol. It uses valid control frames (ACK) for carrying the communication protocol. These frames are usually considered as non malicious and thus are not analyzed by most wireless IDS. This tool enables a full-duplex communication between two pyrawcovert and thus make it possible to perform some interactive communications (ssh...) or file transfers (scp...) thru this covert channel. This version was released at BlackHat US 2006.

tags | tool, protocol, wireless
SHA-256 | 5a623757ddedb3d7b32645a8c8d4e3cf4628b3ccffb931316cc7e12bfe244b6f
FreeBSD-SA-06-23.openssl.txt
Posted Oct 4, 2006
Site freebsd.org

FreeBSD Security Advisory: Multiple problems in crypto(3)

tags | cryptography
systems | freebsd
SHA-256 | 0187927fa4f8bfa1d2e8ed32a2b55c51090ed0b77f08caa6a6f2abc617a0afaf
SAP-ITS-xss.txt
Posted Oct 4, 2006
Authored by ILION Research Labs

A cross site scripting vulnerability has been uncovered in SAP Internet Transaction Server Versions 6.1 and 6.2. This allows an attacker to submit a crafted link to users of the vulnerable Web application in order to abuse their trust and steal their authentication credentials or hijack their sessions when the targeted web site contains a login page.

tags | advisory, web, xss
SHA-256 | 21560d98151152cddf7bbc4f211e0b09df59e16cdf7101d1ea4efa6bfd7420ea
NewswriterSWv1.4.2.txt
Posted Oct 4, 2006
Authored by XORON

Newswriter SW v1.4.2 Remote File Include Exploit

tags | exploit, remote
SHA-256 | 313a6ce7c66064af65de36a0e16933d2acbee5073a4283ce8a1c1cf8765dadf5
Secunia Security Advisory 22188
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ShAnKaR has discovered a vulnerability in phpBB, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 02bf6859fff235649785b0a60fffc1ace3963c43cfb1721933dc1dee7f77ec10
Secunia Security Advisory 22144
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mozi2weed has discovered a vulnerability in phpMyProfiler, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | e6412d69366a0ccdf0c3cea62cd9f7d6cee33d0611865b9fa0bc8ce25aea5ff7
Secunia Security Advisory 22194
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kacper has discovered a vulnerability in Travelsized CMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | a84f21814b40b48581c000166a59f96c441348b0e2adf289b4bd9da579f4a236
Secunia Security Advisory 22204
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Sun JDK / SDK, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 30a91260f5834140f4354508187fba1e25734554d1bba2b8d570ed47ecfd293f
Secunia Security Advisory 22210
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct man-in-the-middle, spoofing, and cross-site scripting attacks, and compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | linux, ubuntu
SHA-256 | 9537c417d7e589c4140c994a3174c6087f761114eaacb35acf72df11d3ac6d1a
Secunia Security Advisory 22216
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Kolab Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | fa91b02287c54e12290d5e8c5f0a2227414d13f4050fc3fc6e656339588c50d1
Secunia Security Advisory 22226
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in various products included in Solaris, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | solaris
SHA-256 | 7213087fea6b3f8a2db6dd31f53836ab2c7f35dd8ec0fa887980961554e6f245
Secunia Security Advisory 22227
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mailman. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 6a169bc975b88ff03c1a88c4a369b32a298de349ae1aa348152d639eed513dfb
Secunia Security Advisory 22229
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CA Unicenter Web Services Distributed Management (WSDM), which can be exploited by malicious people to disclose sensitive information.

tags | advisory, web
SHA-256 | 3c7d35faee9e51410a47fb6c9e470bf2ee421e9902e9d13b80b185f6ec50f2d4
Secunia Security Advisory 22245
Posted Oct 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for openssh. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
SHA-256 | b030d12a73dfe504cd5ff623a8ff9dc36d2e0be6587e723bb4497ab2ddf6a24b
Page 3 of 5
Back12345Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close