what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2009-11-24

PPScan Portscanner 0.3
Posted Nov 24, 2009
Authored by aaron conole

ppscan is yet another portscanner. However, it can scan an entire Class C subnet for a range of ports not only using tcp-syn/tcp-connect but also by tunneling through HTTP proxies (either HTTP GET or HTTP CONNECT), or using FTP servers which allow arbitrary connections via PORT bounce method. It is multi-threaded, so it can blaze through connection attempts.

tags | tool, web, arbitrary, scanner, tcp
systems | unix
SHA-256 | 662c1cf506bf0d8bb74216f8ea2f0047e7c33238eb1860284b5d9c9fbb2ccc27
chipTAN Comfort Man-In-The-Middle
Posted Nov 24, 2009
Site redteam-pentesting.de

Whitepaper discussing man-in-the-middle attacks against the chipTAN Comfort online banking system.

tags | paper
SHA-256 | 173c757d24d9c5b57918ebadcbe6919bbbf6f503ff59afc5031181d05111efdd
OpenX 2.8.1 Code Execution
Posted Nov 24, 2009
Authored by Moritz Naumann

OpenX versions 2.8.1 and below are vulnerable to remote code execution.

tags | advisory, remote, code execution
SHA-256 | 6a808fe4a1876118ed275a0f17968d069581aa4e6cb05cf27628827b81ecc0ff
TYPSoft FTP Server Denial Of Service
Posted Nov 24, 2009
Authored by leinakesi

TYPSoft FTP server remote denial of service exploit that makes use of APPE and DELE.

tags | exploit, remote, denial of service
SHA-256 | 150ed27b3194fd15afb4196da0b3242fafea00c033ef3d9bc7a6952922cdb67d
Denial Of Service In harbour.pl
Posted Nov 24, 2009
Authored by dramacrat

The harbour.pl script builds 1941 and below suffer from a remote denial of service vulnerability.

tags | advisory, remote, denial of service
SHA-256 | 6025ad2f20319b92507cebe17960e3c31744c65c9fc8f412d122a8c4b6378d43
Ubuntu Security Notice 861-1
Posted Nov 24, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 861-1 - It was discovered that libvorbis did not correctly handle ogg files with underpopulated Huffman trees. If a user were tricked into opening a specially crafted ogg file with an application that uses libvorbis, an attacker could cause a denial of service. It was discovered that libvorbis did not correctly handle certain malformed ogg files. If a user were tricked into opening a specially crafted ogg file with an application that uses libvorbis, an attacker could cause a denial of service or possibly execute arbitrary code with the user's privileges.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2008-2009, CVE-2009-3379
SHA-256 | eae0d2f3f32cf33000f3d2bc776104ba25f98a9675818118f9d38a10b34071ae
Quick.Cart / Quick.CMS XSRF
Posted Nov 24, 2009
Authored by Alice Kaerast

Quick.Cart version 3.4 and Quick.CMS version 2.4 both suffer from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | a291709208fa14adc1a5eab49ffc15c878c487a510f9d3913c92d128302ffe83
PEAR Security Advisory 20091114-01
Posted Nov 24, 2009
Site pear.php.net

PEAR Security Advisory - Multiple remote arbitrary command injections have been found in the Net_Pingand Net_Traceroute.Net_Ping versions below 2.4.5 and Net_Traceroute versions below 0.21.2 are affected.

tags | advisory, remote, arbitrary
SHA-256 | 1f8e26e5d2a3b7524f9d89fd9fd45aede051f3408d7534eb1f57bbb1ea3b1a36
WP-Cumulus 1.20 Cross Site Scripting
Posted Nov 24, 2009
Authored by MustLive

WP-Cumulus version 1.20 for WordPress suffers from path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 35a4d37e5ffba03af02fb610a6aab2f8fa7fc1f4a0756d7ec716da27b29ecaf2
Tor-ramdisk i686 UClibc-based Linux Distribution 20091124
Posted Nov 24, 2009
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP.

Changes: This is a maintenance release to incorporate changes from upstream. Tor was updated to 0.2.1.20 and busybox was updated to 1.15.2. Users are encouraged to upgrade since the upstream releases fix address issues that may have a serious impact on the tor-ramdisk environment.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 0ef70f47c3adce44a408f33695e621cada2197cc52493bbf25e2fd2bf6891dd4
XM Easy Personal FTP Server 5.8.0 Denial Of Service
Posted Nov 24, 2009
Authored by leinakesi

XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 7e36fe5d6389fdf072223910ed5c194801e09d85b293396f06d2f170cf7c5dde
Whitepaper Called English Shellcode
Posted Nov 24, 2009
Authored by Greg MacManus, Fabian Monrose, Joshua Mason, Sam Small

Whitepaper called English Shellcode. In this paper, they challenge the assumption that shellcode must conform to superficial and discernible representations. Specifically, they demonstrate a technique for automatically producing English Shellcode, transforming arbitrary shell-code into a representation that is superficially similar to English prose.

tags | paper, arbitrary, shell, shellcode
SHA-256 | 520adbcbc20b5b74ff45288dfb818039f329155c76d5816f3314408df708f644
Secunia Security Advisory 37481
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cacti, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 333331899898787e5e5522b4afe7fde7168e219ebf1f38a21893c0fc044c54af
Secunia Security Advisory 37479
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for asterisk. This fixes a weakness, which can be exploited by malicious people to determine valid user names.

tags | advisory
systems | linux, fedora
SHA-256 | d973e210dab9d6f6ce9a5b8513db87c271f2993b9e0179df6771db17bd6322b1
Secunia Security Advisory 37449
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for snort. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | af3da90fe0e352b6521bda8cfada7a29c3da06f3a6c227834f76d83c462e0db1
Secunia Security Advisory 37451
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Net_Ping package, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 9302426d9890da8283b7322863ae0678a1feb2f8edbdf0a275efd1a4c58cba2c
Secunia Security Advisory 37458
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for php-mail. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, php, vulnerability
systems | linux, debian
SHA-256 | f2611540200e590892c4ad0805cc671edd41d827f28e4f5da9f8a799a294fd99
Secunia Security Advisory 37466
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Sage extension for Firefox, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | b299d21d7630f92201c9650e2a3b470d2d5d804146fd6b8f9f691bd303f27541
Secunia Security Advisory 37474
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting and spoofing attacks, and potentially compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | linux, suse
SHA-256 | dc2051888225c1f75fddf90b3733d45b9910a09203a25e8dee2fb8b83a958a81
Secunia Security Advisory 37483
Posted Nov 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a vulnerability in the WP-Cumulus plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 7f54d633d855f7288314e1e9d2dbeea33668ed79918aaf896b82da238544ffa7
W3infotech SQL Injection
Posted Nov 24, 2009
Authored by ViRuS_HiMa

W3infotech suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 01ab51727bf20650b3e60a32cde842a6173b660c8f99728161c18a31b1439908
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close