exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 42 RSS Feed

Files Date: 2011-01-20

ProxBrute - Taking Proxcard Cloning To The Next Level
Posted Jan 20, 2011
Authored by Brad Antoniewicz

This paper describes the basic process of using the proxmark3 to clone Proxcards and then introduces ProxBrute, a new tool for brute forcing valid proxcard values.

tags | paper
SHA-256 | 2d0fd9f79fb7dbb051b1d0d095dea1dd28993622fb07d852518c7f7100181d3b
Hack In Paris 2011 Call For Papers
Posted Jan 20, 2011
Authored by crashfr | Site hackinparis.com

This is the Hack In Paris Call For Papers. Hack In Paris is an international and corporate security event that will take place in Disneyland Paris from June 16th to the 17th of 2011.

tags | paper, conference
SHA-256 | a03bdcb8f815a3595f924d9c2b041947275e5c3f0b76447fda727c9e3cb82fec
xAjax Cross Site Scripting / Path Disclosure
Posted Jan 20, 2011
Authored by MustLive

xAjax suffers from cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 7a508876058333955dd88d1c78ac440125c6293507ea7a7edc0b98a5c780b0e6
Tor-ramdisk i686 UClibc-based Linux Distribution x86_64 20110119
Posted Jan 20, 2011
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Changes: This release addresses a heap overflow in tor, which allowed arbitrary remote code execution. Tor was updated to version 0.2.1.29 to address CVE-2011-0427. Busybox was updated to 1.18.2 and the kernel to 2.6.32.28 plus Gentoo's hardened-patches-2.6.32-37.extras.
tags | tool, x86, kernel, peer2peer
systems | linux
advisories | CVE-2011-0427
SHA-256 | 0dd54025d5415dd66e75bda664adf853adaffc84db1f004b7717ee83500c9cfc
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20110119
Posted Jan 20, 2011
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Changes: This release addresses a heap overflow in tor, which allowed arbitrary remote code execution. Tor was updated to version 0.2.1.29 to address CVE-2011-0427. Busybox was updated to 1.18.2 and the kernel to 2.6.32.28 plus Gentoo's hardened-patches-2.6.32-37.extras.
tags | tool, x86, kernel, peer2peer
systems | linux
advisories | CVE-2011-0427
SHA-256 | c1705b8ca4221622c05503afd114bbf0f1ed7742f4d63abdd99db0b583737fe2
Pixie 1.04 SQL Injection
Posted Jan 20, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Pixie version 1.04 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 9362af9c530193ca27ca87421c241290790494789cc49332301b301e635d2189
DotNetNuke 05.06.00 Command Execution
Posted Jan 20, 2011
Authored by Daniel Niggebrugge

DotNetNuke version 05.06.00 (459) suffers from a remote arbitrary command execution vulnerability.

tags | advisory, remote, arbitrary
SHA-256 | 25213b26bdde73bddc9e208e0873571180f865a7582ddde2aee56a34b6c0487a
DATEV Multiple Applications DLL Hijacking
Posted Jan 20, 2011
Authored by Nikolas Sotiriu

DATEV has multiple pieces of software that are affected by DLL hijacking vulnerabilities.

tags | advisory, vulnerability
SHA-256 | d9d43eccf321d71371184daa9bc3b327b257eb0782c862f082c54e2ce3ff7941
IMMM 2011 Call For Papers
Posted Jan 20, 2011
Site iaria.org

This is the IMMM 2011 Call For Papers. This is an international conference on advances in information mining and management. It runs from July 17th through the 22nd, 2011 in Bournemouth, UK.

tags | paper, conference
SHA-256 | c23936145b4dba275cd2233362354ebb91419350f0013c3a493c25ce5d2b37b0
Secunia Security Advisory 42963
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | b9ea23f926eaa22d074612dfde16d9905c6170909c55c15815fb2e802e2e93b4
Secunia Security Advisory 42919
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle Audit Vault, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6cf2262b54776ee8ceb82948e88959508b0f5283a00b0be40508411f0a9a72d6
Secunia Security Advisory 42982
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Oracle PeopleSoft Enterprise HRMS, which can be exploited by malicious users to disclose sensitive information and manipulate certain data.

tags | advisory, vulnerability
SHA-256 | e1a85e5051fed8fd629f343207abfd428ee987ce24f1c600e84b74c4be095053
Secunia Security Advisory 42962
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | aix
SHA-256 | 4dc61718298a5987b1a32bbab2f1af4949369c8385d04c61bd160cac2b852790
Secunia Security Advisory 43000
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
systems | linux, fedora
SHA-256 | 670a59c888ff4f8760f55112a90da958a7a5a388fa29712ca3bddf1629f69da8
Secunia Security Advisory 43001
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for perl-Convert-UUlib. This fixes a weakness, which can potentially be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, perl
systems | linux, fedora
SHA-256 | b506a5d4d9f2750612924a0fb40c0f07e55a93caa733aa9c56b4be0172d98141
Secunia Security Advisory 42950
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Contents-Mall, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 93e65dfe319a2f90694ed30c65b93758f9c851e7d3a105ce0e9a016e73ec00de
Secunia Security Advisory 42958
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere MQ, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 2f5981aa13e06f7b9ef300bc8583a07e943863d894453330ced1ea2a9e3d679d
Secunia Security Advisory 43002
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for java-1.6.0-openjdk. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory, java
systems | linux, fedora
SHA-256 | e5cbc20be6cb39c5621055884de8d3478ad1270779ea660c42adcf9a9f2977e4
Secunia Security Advisory 42961
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in FUSE, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | cbea29b805faa1b1881f5e5ffe71beeae4456b25234c00d7b3b636a0fc2e7f21
Secunia Security Advisory 42998
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in the Convert::UUlib module for Perl, which can potentially be exploited by malicious people to potentially cause a DoS (Denial of Service) .

tags | advisory, denial of service, perl
SHA-256 | 2799907b3cdce292f749b1f06ae5664568f0f236d3823b2d694ed8821acd3031
Secunia Security Advisory 42965
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for fuse. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, ubuntu
SHA-256 | d3f62e3e9b34160e6b75cc0d782aebd70bbdc914f423660cfbca66a58ba6ea24
Secunia Security Advisory 42980
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Janrain Engage module for Drupal, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 580aeef514e59c4cf1ae0f652058ba03f7709368d08d7817efad648ee0f50e45
Secunia Security Advisory 42997
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | cbfaeef0d1a4efff2c95cd3615da8b56f9d2d0d55679d3b5516d98bd149d393e
Secunia Security Advisory 42947
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in acpid, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 78b0e536132f29242ad8b13f3a1d3a08e96f31d6574dc6967421ae40a75bc084
Secunia Security Advisory 42952
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Ruby Version Manager, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local, ruby
SHA-256 | ba0351e05d24044681e0741d7c6f888484ae432fcd1204fabea45b1ceb698c77
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close