exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 774 RSS Feed

Files Date: 2008-08-01 to 2008-08-31

Fwknop Port Knocking Utility
Posted Aug 26, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Mirek Trmac from Red Hat contributed several patches so that fwknop can be bundled within the Fedora Linux distribution. Updated fwknop, fwknopd, and knoptm to import perl modules out of the /usr/lib/fwknop/ directory if it exists. Added module version output for each non-core perl module used by fwknop and fwknopd in --debug mode. Various other additions and fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | c2835d4522a45737392c181df6459fb3db2755b779a246601d66359fd8e12d20
belkin-bypass.txt
Posted Aug 26, 2008
Authored by noensr

Belkin wireless G router and ADSL2 modem authentication bypass exploit.

tags | exploit, bypass
SHA-256 | 8ce8143e597ced9c7dab89d51e2bdb1e108d115ee28193bc7a9dcfe34a4a08be
Pardus Linux Security Advisory 2008.30
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Insufficient sanitization can lead to Vim executing arbitrary commands when performing keyword or tag lookup.

tags | advisory, arbitrary
systems | linux
SHA-256 | 1af038f49dd7be46df684cca00b19f3590775e4fc513b99292bcdeb1e65d3219
Pardus Linux Security Advisory 2008.29
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple vulnerabilities have discovered by g_ which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux
advisories | CVE-2008-3732
SHA-256 | 19543faebfa0c824149c043f1f5ca4914a2d200771201b1afa424f14923c36ef
Pardus Linux Security Advisory 2008.28
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux
advisories | CVE-2008-3281
SHA-256 | 64c355dcce91e0b0f828984ad3723412eb26fdf00f38a5667c4504d985959f28
linux-cbexec.txt
Posted Aug 26, 2008
Authored by militan

149 byte connect back, download a file, and execute shellcode for linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | d67d04dd640e5e8e64dd7aa188fb64ebe0807bf415e57a234d0efcfc60be458c
matterdaddy-sql.txt
Posted Aug 26, 2008
Authored by ~!Dok_tOR!~ | Site antichat.ru

Matterdaddy Market version 1.1 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 11d0b6202382e5eb2f71bc99ef8fd6ac20eeac3dd9fb9eb9604da29c14f31a0c
btitrackerxbtit-sql.txt
Posted Aug 26, 2008
Authored by InATeam | Site inattack.ru

BtiTracker versions 1.4.7 and xbtit versions 2.0.542 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0fa6d573893adc76791d44b0b6f3998218991237eafe5070781528a685b61ed8
IVIZ-08-009.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Grub fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | e6830a2e51a4006859ef717174a6c7a9f4a2c589b17b9d1341a3caf2fa43c057
IVIZ-08-008.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of LILO fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | fbf8278fc9ae31f0953c68b1be7ac5820b419f59c642eb07492b1dd6aec52a2d
IVIZ-08-007.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of DriveCrypt fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | da41629f4200be17b9393f1177cbdb0f388ddd0e70fc1a3520198adf6cf1f5c5
IVIZ-08-006.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of DiskCryptor fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | b652f695c7247a3de587d408a41942c9ef2f1086cbee2fb843197dfa95167721
IVIZ-08-005.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of the IBM Lenovo BIOS firmware fails to sanitize the BIOS keyboard buffer after reading user input, resulting in plain text password leakage to local users.

tags | advisory, local
SHA-256 | a488508939d0aa7156c8686aa75fbaba363e073efc4b44072a2a13c40dde1e04
IVIZ-08-004.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Intel BIOS firmware fails to sanitize the BIOS keyboard buffer after reading user input, resulting in plain text password leakage to local users.

tags | advisory, local
SHA-256 | a3dae1efa2a513a1e4d34e8620de7b40c67b3bd5327e513a672c4257d6bfcb28
IVIZ-08-003.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of TrueCrypt fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | 950b0f2921b089dffd4a9765fff017372c18e363577ea4a7de73517951bc9089
IVIZ-08-002.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Hewlett-Packard 68DTT version F.0D (11/22/2005) fails to sanitize the BIOS keyboard buffer after reading user input, resulting in plain text password leakage to local users.

tags | advisory, local
SHA-256 | 54ba0a5b5b30a41a1774fa59d76509831be07f95f58bd583771d59d208430935
IVIZ-08-001.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Microsoft Bitlocker fails to sanitize the BIOS keyboard buffer after reading passwords, resulting in plain text password leakage to unprivileged local users.

tags | advisory, local
SHA-256 | 0e397b0c05032591101d0eee295e0ee467592b78bde1992f3a0c4f810844bc2c
Secunia Security Advisory 30667
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in Novell iPrint Client, which can be exploited by malicious people to gain knowledge of potentially sensitive information or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 60558b8fb8fe7beb79534e81e5e8699ec200a84f9a29e119d697af54b2c48120
Secunia Security Advisory 30710
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in Calendarix Basic, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 9050f782778b3db65bc00817ddddbeea1e001c4d4d4b6b887ee6d0e91bd59916
Secunia Security Advisory 31564
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ~!Dok_tOR!~ has discovered two vulnerabilities in Matterdaddy Market, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 779955a9fec6979bb6aaab369a75b6a5d92774bc617b8a2182261689fd76d8ff
Secunia Security Advisory 31567
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in xine-lib, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | eea1e8b0aa87eee5577e5ca794c825f718bc3bbcb8b8bfec220dd9960b2cb068
Secunia Security Advisory 31580
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for IBMJava2-JRE and IBMJava2-SDK. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, suse
SHA-256 | fe2de267ec401c118b0497294d23bdcc9db084ccf7e861150d8b6b0d1caf798a
Secunia Security Advisory 31585
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.SQL has reported two vulnerabilities in Five Star Review Script, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | bf1c7ad0d07f751714a017d0270431418adc954403492cfd273b6fd25de58990
Secunia Security Advisory 31586
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for IBM Java. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, suse
SHA-256 | 69ff24bc91fac26f51e2abd03f7acc5f0b6a759523a0f8efa8abf7a1c11f5a76
Secunia Security Advisory 31589
Posted Aug 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tyler Trioxide has reported a vulnerability in Photo Cart, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | e4468c3e7dc6a42644f6bc0584a41ebbd4543cc93495cd2c4398e98c04344ab3
Page 5 of 31
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close