what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2006-11-02

0610-exploits.tgz
Posted Nov 2, 2006
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for October, 2006.

tags | exploit
SHA-256 | f6ec553c60f72a7491d855aa1b7654761bfa22d6d856afefefd4c942cde38bc2
nuface-1.0.7.tar.bz2
Posted Nov 2, 2006
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

Changes: Added DNS resolution creation for subjects and ressources. Added research capabilities. Added support for IPy 0.5. Various other enhancements.
tags | tool, web, firewall, protocol
systems | unix
SHA-256 | 5328fe4f3047cd2249e1074c1a43ab7fc5382996d2363bbbdf74137ca32fbc42
Samhain File Integrity Checker
Posted Nov 2, 2006
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 38b9741b81ebaf7b98cddd882333869f2b6ad6ce97e0495b11b6c14b3642d26d
sara-7.0.3.tgz
Posted Nov 2, 2006
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Various bug fixes.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 32b4dec44d7ac00e4544cc45eed115e9a99c7513e9e2bc2d0e1083373a2bb97a
advchk-1.01.tar.gz
Posted Nov 2, 2006
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | 536270dea9354bb0320963b63097be0149f116b999482a58a12ecb6c48e8ec71
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Nov 2, 2006
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: Implementation of ModeConfig push mode via the new connection keyword modeconfig=push allows interoperability with Cisco VPN gateways. The command ipsec statusall now shows "DPD active" for all ISAKMP SAs that are under active Dead Peer Detection control.
tags | kernel, encryption
systems | linux
SHA-256 | 998231c62cc2a27060fe9523c64cfd12f42865a9e3a0bf1a2f27e5a7aa900fa2
foremost-1.3.tar.gz
Posted Nov 2, 2006
Authored by Kris Kendall, Jesse Kornblum, Nick Mikus | Site foremost.sourceforge.net

Foremost is a console program that recovers files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc., or directly on a drive. The headers and footers can be specified by a configuration file, or you can use command line switches to specify built-in file types. These built-in types look at the data structures of a given file format, allowing for a more reliable and faster recovery. It was originally developed by the United States Air Force Office of Special Investigations and The Center for Information Systems Security Studies and Research.

tags | tool, forensics
SHA-256 | 3ea2ddd81247ef114be6f796cca86e1d2920dcb9b0d03212ec11aa71e4684c25
Scapy Packet Manipulation Tool 1.0.5
Posted Nov 2, 2006
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: Various bug fixes and enhancements.
tags | tool, scanner, python
systems | unix
SHA-256 | a8a77854dfdc6cee71344527510e64d1985222d20637c08f0b46b8d709c2e766
snortsms-1.4.6.tar.gz
Posted Nov 2, 2006
Authored by SmithJ108 | Site snortsms.servangle.net

SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.

Changes: Various updates.
tags | tool, web, sniffer
SHA-256 | 453c52e38779345aa2bc93f1fd658903baaa66b0231d8c26b8818a7df9367122
Secunia Security Advisory 22586
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for qt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | d81180655cd5ae798cffcc68f9214805c6557d54cf0f64c6b0bbc749f88805a0
Secunia Security Advisory 22601
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 6a939ecbb3865677ccb4f489b452ce0a0f17f2e26044a01c5610ada10edbac47
Secunia Security Advisory 22624
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, ruby
systems | linux, ubuntu
SHA-256 | a1d867a8285788449863b45c1dbc54541fc91589330f55d6b28550abf2b43b42
Secunia Security Advisory 22649
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for screen. This fixes some vulnerabilities, which can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | a2b574e4daf760bb98180352f4c99833484ee5f805d487f7c9d8d006c8b59f84
Secunia Security Advisory 22658
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in libmodplug, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | 519b9000939c15041d3fc7f71296a727307d8ae15f631267fd9f3f013caf6abe
Secunia Security Advisory 22669
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged some vulnerabilities in VirtualVault and Webproxy, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), or to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 5839cf6364eacedd4bd85721701c1fd49630a01be29e6947700f479c2f81004b
Secunia Security Advisory 22672
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for tshark and wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 4bd904da0026bbde025602e768414ceb637a895c11e72e940521d36b69282a89
Secunia Security Advisory 22673
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Matousec has discovered a vulnerability in Outpost Firewall, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 9a876951fb4f2c67d065fb51cfac13240784b549554828c289d96bc8ffb5f56c
Secunia Security Advisory 22678
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - securfrog has discovered some vulnerabilities in TikiWiki, which can be exploited by malicious people to disclose certain sensitive information and to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 930dd96f6173c4f168bb3c973e1611d14d84287414df05ee7bf3d2f9ddf9c077
Secunia Security Advisory 22680
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for wvWare. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 53012dba480e34b4e2f28aacd45db379a58afd2d7f3bb4cc19217ece9b9d205e
Secunia Security Advisory 22681
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Greg Linares has discovered a vulnerability in Easy Address Book Web Server, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, web
SHA-256 | 1060f3608630cb23995b63739f0470b18190ef1a095bdd1ec0adb96c6596c35d
Secunia Security Advisory 22683
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in WordPress.

tags | advisory, vulnerability
SHA-256 | ec103ff6f96cecb3ca7bf705dbd1e90ed1ef83730c5170bf3c46fc6f17b171fd
Secunia Security Advisory 22684
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Security Agent Management Center (CSAMC), which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | cisco
SHA-256 | 5f3949eba8be933aa94003426e203430448ea5773854a56e287532d24998ea88
Secunia Security Advisory 22686
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mutt. This fixes some vulnerabilities, which can be exploited by malicious people to perform certain actions with escalated privileges.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 8e3b1f62f5250459ddc0fd46b4044a2f3a7d601686b8c09ea9f93c5be1601bc9
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close