what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2011-05-18

Moscrack WPA Cluster Cracker 2.07b
Posted May 18, 2011
Authored by Ryan Babchishin | Site moscrack.sourceforge.net

Moscrack is intended to facilitate the use of a WPA cracker on a cluster. Currently, it has only been used with Mosix (clustering software) and SSH nodes. It works by reading a word list from STDIN or a file, breaking it into chunks and passing those chunks off to separate processes that run in parallel. The parallel processes can then execute on different nodes in your cluster. All results are checked (to a degree) and recorded on your master node. Logging, error handling, etc. are all handled for you. Moscrack is designed to be run for long periods of time (days, weeks, or more).

Changes: A plugin framework and API were created. A dehasher plugin was created to crack SHA256/512, MD5, DES, and *Blowfish Unix password hashes. A bug in hot config was fixed.
tags | cracker
systems | unix
SHA-256 | e066d79a30cdb3c958d794bd619c49b023fc0f43e65b86c4e24c58d6d74e4bdd
Joomla jDownloads 1.0 Shell Upload
Posted May 18, 2011
Authored by Al-Ghamdi

Joomla jDownloads component version 1.0 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 078e6a97c6378ac798fddc253508829bf70f94a103de3ef02d16e043770f8de0
Mandriva Linux Security Advisory 2011-091
Posted May 18, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-091 - The ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

tags | advisory, perl
systems | linux, mandriva
advisories | CVE-2011-1487
SHA-256 | 3634e6a88e6413829938344c137e79d7f109bf855b345e68ed79c1b07e32514e
SUSE Security Announcement 2011.025
Posted May 18, 2011
Site suse.com

SUSE Security Announcement - Flash Player has been updated to version 10.3, fixing bugs and security issues.

tags | advisory
systems | linux, suse
advisories | CVE-2011-0589, CVE-2011-0618, CVE-2011-0619, CVE-2011-0620, CVE-2011-0621, CVE-2011-0622, CVE-2011-0623, CVE-2011-0624, CVE-2011-0625, CVE-2011-0626, CVE-2011-0627
SHA-256 | ed2e3b1bb5da3eb2bf74418147db15007c60a70eccc4191ef22948bc675f3b00
TWiki 5.0.1 Cross Site Scripting
Posted May 18, 2011
Authored by Mesut Timur

TWiki version 5.0.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2011-1838
SHA-256 | be514da136c4360aa19fb8f944b88522d534ec6dd41436c8bc62f7f3e3286402
Cisco Unified Operations Manager XSS / SQL Injection / Directory Traversal
Posted May 18, 2011
Site senseofsecurity.com.au

Cisco Unified Operations Manager suffers from cross site scripting, remote SQL injection, and directory traversal vulnerabilities. Versions 8.0 and 8.5 are affected.

tags | exploit, remote, vulnerability, xss, sql injection
systems | cisco
advisories | CVE-2011-0959, CVE-2011-0960, CVE-2011-0961, CVE-2011-0962, CVE-2011-0966
SHA-256 | d6733640509f4e53a13a0029f841b353ff1086c5280643834acf286ecbf3b8bc
Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service
Posted May 18, 2011
Authored by Lufeng Li

Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit.

tags | exploit, denial of service, kernel, local
systems | windows
SHA-256 | 4c62bc0bdb4613a8d22165e49dbe876c86fa1825bcd8b2047eae3fd7038cecc3
Secunia Security Advisory 44611
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 8fe8c4e110bcbf5794c3c56f10c6816f08de1cbc96563865d0d502177ce64679
Secunia Security Advisory 44612
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | e80bc45344a11a55b1e887a732dfc00a1ee8d88c01036c00435e9d5de8a6b1dc
Secunia Security Advisory 44616
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for vino. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 5a912f6af11c102a82e791f442e1518eee2a26aa5348f78d0eebf7ddb7c5cf61
Secunia Security Advisory 44623
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for postfix. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 558a4d62a76882aadb338cf3987b0c9c610df76f0bc23a239a440ea9e4441efe
Secunia Security Advisory 44594
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mesut Timur has reported a vulnerability in TWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a371fe50fb39f9ced68608f7e12de3cb214453bb6c668c0369cfc2504b6af8bf
Secunia Security Advisory 44614
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the libwww-perl module for Perl, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, perl, spoof
SHA-256 | 68c0d69cb01543d322d2b6409cb6ce401beedaf6631d68f7244df47047bddc8a
Secunia Security Advisory 44618
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for exim. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 2393d77446de787fc8222801d657331c1224f1a78f15655a42bec32d4715b3f9
Secunia Security Advisory 44144
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dejan Levaja has discovered a vulnerability in MDaemon, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | e2d53b9da20dd9b3d0a64429c5897f939fba366d6155d87c2177e78fd1420900
Secunia Security Advisory 44599
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeMarker, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
SHA-256 | 52d9ad600576e66fdcfcef5c128ce443d32860ee2c9998a8c0cbf30c7ad01eda
Secunia Security Advisory 44627
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - neworder has discovered a vulnerability in the is_human() plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 7eff63390da2836c394c8c11dfbf4bb7db2bc89ac0be2140b324fa2f8e0ea61d
Secunia Security Advisory 44515
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Nagios XI, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | aff17372d30882ba1a98263ff516253b60dfe6e18059368bcc066c45e604c6df
Secunia Security Advisory 44596
Posted May 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Network Block Device (nbd), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | bbbbb30ca6238d6eaafa72460db64487ba7e275fe047da6e6fff1792eae8d11c
ZoneMinder Video Camera Security Tool 1.24.3
Posted May 18, 2011
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: This long awaited release brings improved compatibility with a number of updated third party packages. There were many reliability and performance updates plus a number of new features and fixes. A contributed iPhone interface was included.
tags | web
systems | linux, unix
SHA-256 | fa766fe30723a4ead11423eaaadb48810a1c500231d02e5f06181a0e9f4ab51a
Yahoo! Pulse Cross Site Scripting
Posted May 18, 2011
Authored by Thinh Q. Hoang | Site bluemoon.com.vn

Yahoo! Pulse suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | c1c38341d2cb76a8d8f00a598c33bfb95c34ff60780b7f2854abb13af90d322c
Zeacom Chat Server JSESSIONID Weak SessionID
Posted May 18, 2011
Authored by Daniel Clemens | Site packetninjas.net

Usage of weak session management exists within the Zeacom web-chat application versions 5.0 SP4 and below. It enables the bruteforcing of the sessionid which can enable the hijacking of anothers chat session.

tags | advisory, web
advisories | CVE-2010-0217
SHA-256 | 348be816b349ef4e1d9255d24ad8d31f6811c52da8b4a6a86359fe211a3ff443
Apache Tomcat Security Constraint Bypass
Posted May 18, 2011
Authored by Mark Thomas | Site tomcat.apache.org

An error in the fixes for CVE-2011-1088 and CVE-2011-1183 for Apache Tomcat versions 7.0.12 and 7.0.13 meant that security constraints configured via annotations were ignored on the first request to a Servlet. Subsequent requests were secured correctly.

tags | advisory
advisories | CVE-2011-1582
SHA-256 | 5efbd3f498ede2bda6b9290b7f562b7c49af656ee28cd64954d0fd3af57a0e89
PHP Calendar Basic 2.3 Cross Site Scripting
Posted May 18, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

PHP Calendar Basic version 2.3 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 859d07a7a48b8eebcf7677244b25305af4080aa042640c60e9cd38adb092be65
Netcat Rewritten To Bypass AntiVirus
Posted May 18, 2011
Authored by knull | Site leethack.info

rcat is a rewritten netcat replacement for Windows that was created solely to bypass antivirus detection. Source and binary are included.

systems | windows, unix
SHA-256 | 47d99164764aee28c3624162f20e22d0ac53ad72dd130b374cc7444bfc82d0b9
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close