what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 226 - 250 of 744 RSS Feed

Files Date: 2009-06-01 to 2009-06-30

OpenNHRP NBMA Next Hop Resolution 0.11
Posted Jun 19, 2009
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: A custom extension was added to allow dynamic detection of next hop servers. Configurability of multicast traffic handling was improved. Various performance improvements were made all over the code. Most notably, libev is now used internally.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | b57b19b45d8c47e3a9a667c1f75f52eca219be77a4cfc9222b2b2a63234908fb
NetBSD x86 Kill All Processes Shellcode
Posted Jun 19, 2009

NetBSD/x86 kill all processes shellcode.

tags | exploit, x86, shellcode
systems | netbsd
SHA-256 | a7ffee5d6b2d5960b4ea4ee717bfddb99b166c9e763cae77072218cfa897e251
CMS Buzz Cross Site Scripting
Posted Jun 19, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

CMS Buzz suffers from cross site scripting and password changing vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | fb5939b64b85e8a19fc9f6065e7cf9e789deab9259dcf2bef236805d64e3b6d9
DESlock+ 4.0.2 Code Execution
Posted Jun 19, 2009
Authored by mu-b | Site digit-labs.org

DESlock++ version 4.0.2 local kernel SYSTEM exploit. Affects dlpcrypt.sys version 0.1.1.27.

tags | exploit, kernel, local
SHA-256 | 8ff07a4da72ac1297bb179ba6e2d9a8a8cd03398d6c137b28d4494419fe7e1ef
Edraw PDF Viewer Component Code Execution
Posted Jun 19, 2009
Authored by Jambalaya

The Edraw PDF Viewer component suffers from an Active-X related remote code execution vulnerability. Versions below 3.2.0.126.

tags | exploit, remote, code execution, activex
SHA-256 | 5577e778cc8e8cb1e505491e8a8f69f363de5890ef2f4d4147cf2a67eb8b4860
Secunia Security Advisory 35449
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), disclose sensitive information, conduct cross-site scripting and cross-site request forgery attacks, or compromise a user's system.

tags | advisory, denial of service, vulnerability, xss, csrf
systems | apple, iphone
SHA-256 | 79a50c234995e4d20d01755bd75c0b07e4f8d17fe83afc1b3e0335e321bf064e
Secunia Security Advisory 35499
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ctorrent. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | ff20cc6e21a10539ae21b0f15cef5751b8918cf972537e40e1c5b86ab4dbaac7
Secunia Security Advisory 35503
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | c1831fb10b814f2e29f3c6ca0846319926d039300ecfe6bf0a756aee558ed672
Secunia Security Advisory 35359
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in IrfanView, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | af2c4b283af5d23b7c711876b92fc9a9fd87b235e3651a29219c97be5c0036f6
Secunia Security Advisory 35509
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the EDraw PDF Viewer ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
SHA-256 | 5957f81954af6b4700084f9aa2392162184fcedaf8a811df1cdb0a5c5bd84af4
Secunia Security Advisory 35506
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
systems | linux, fedora
SHA-256 | 322d8ea9899ac516d7d1d2ffb5b6ef4e70beff9017f0b227ffd780f3ac517e32
Secunia Security Advisory 35505
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | aix
SHA-256 | fba665e40eba98953e7994424bb9ae518492f2bd25b02a2f2c8029f3b5304606
Secunia Security Advisory 35429
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in CAE LMS, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 120948a2703cdd1d471b1427bcbe0ab1fac8b5c8e411a7e338c0f21038461edc
Secunia Security Advisory 35489
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - staker has discovered some vulnerabilities in fuzzylime (cms), which can be exploited by malicious people to disclose sensitive information or manipulate certain data.

tags | advisory, vulnerability
SHA-256 | 89ebde60a6e2179ad70d1ff2ace8104f9d0681443387ca7feeea332620e82a6c
Secunia Security Advisory 35492
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Fretsweb, which can be exploited by malicious people to disclose potentially sensitive information or conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 4f0dc78fdd2611ffe34e0b849fca2d30eb53ab3fb0a5e2cf816019efd7028721
Secunia Security Advisory 35502
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for moin. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 5df01eb98001fb04138929e275cc3fa6bcbcdfaba2e0cd086769b73e9250db92
Secunia Security Advisory 35490
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 05a0c0b338b630ea9fbdd2dcd588685adb86e66a633d71920c5fb885d7f65567
Secunia Security Advisory 35415
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, slackware
SHA-256 | c7ca853805599a66c01dc5a90dc052f39af0b16db2a1e7865d68991ca24d2f14
Entropy Broker RNG
Posted Jun 17, 2009
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: sever_stream now also supports serial devices, Added FIPS 140-2 test.
tags | encryption
SHA-256 | c68e6ab998d7d10dd7bce408eaedebe892edbbef698e989d26b1322e22aebf91
Firewall Builder With GUI
Posted Jun 17, 2009
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: This is a bugfix release that improves program stability.
tags | tool, firewall
systems | cisco, linux, openbsd
SHA-256 | b8efbec32786f3e213f68fe3d79d4bc51924a83a98149789f552c67ad5b33dcc
Linux IPTables Firewall 1.4.4
Posted Jun 17, 2009
Site iptables.org

iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.

Changes: This release includes updates for new extensions in kernel 2.6.30, bugfixes, and documentation updates.
tags | tool, firewall
systems | linux
SHA-256 | f38274d992d16220373422c33ba39247b154cd1f4fe5245950596b1602185b6f
Command Execution Shell Generator
Posted Jun 17, 2009
Authored by Beenu Arora | Site beenuarora.com

Command execution shell generator tool. Written in Python.

tags | shell, shellcode, python
SHA-256 | 828c701b00076ac4f63ae3894e75be3a6cc014b089f9abf03cfbf5f23e382da1
PhpPortal Insecure Cookie Handling
Posted Jun 17, 2009
Authored by KnocKout | Site cyber-warrior.org

PhpPortal version 1.0 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | ed7afbb754e9ee7059925029e381b2b3d79ebaf83331bb638b729868cad1c969
compface 1.5.2 Buffer Overflow
Posted Jun 17, 2009
Authored by metalhoney

compface versions 1.5.2 and below buffer overflow proof of concept exploit that creates a malicious .xbm file.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | c5838f4bfa2530ad67e8a1af408fac4fd213d1e6d3faba21b6139a093e4a2f4e
Mandriva Linux Security Advisory 2009-135
Posted Jun 17, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-135 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2009-1184, CVE-2009-1337, CVE-2009-1192, CVE-2009-1265, CVE-2009-0029, CVE-2009-1360, CVE-2009-1961, CVE-2009-1385, CVE-2009-1630
SHA-256 | 32c7abde9b4bd40456f7f6c69ffe4e46116ae7060c2adaf72eb4cbdc29c92fb2
Page 10 of 30
Back89101112Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close