exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 77 RSS Feed

Files Date: 2009-01-16

RSBAC 1.4.0 For The 2.6 Kernel
Posted Jan 16, 2009
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions. This version is for the 2.6 kernel. Added VUM (Virtual User Management) support. OTP support for UM. Converted the common code to 2.6 only.

tags | kernel
systems | linux
SHA-256 | 1c57c6b30b0329e7b42d12773eb2672c5c61de5c8d0cdf62145dc1bc870e5360
RSBAC 1.4.0 For The 2.4 Kernel
Posted Jan 16, 2009
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions. This version is for the 2.4 kernel.

Changes: Added VUM (Virtual User Management) support. OTP support for UM. Increase string lengths in user and group items significantly. Add RSBAC memory slab 384 for new user item sizes.
tags | kernel
systems | linux
SHA-256 | e78a45feeab611322bce766966f9547722a70a1fb818137595dd89392aec83b1
Simple SSH Brute Forcer
Posted Jan 16, 2009
Authored by thebug | Site ulissescastro.wordpress.com

Simple multithreaded SSH brute forcing utility written in Python using paramiko.

tags | cracker, python
SHA-256 | 56de15394dbc924a7e7a619264774fae2530f9298094d12926b66dad5c96c890
Syslserver 1.058 Denial Of Service
Posted Jan 16, 2009
Authored by princeofnigeria

Syslserver version 1.058 suffers from a denial of service vulnerability due to a mishandling of malformed UDP packets.

tags | advisory, denial of service, udp
SHA-256 | a6efafa996d39f89733fa58ff0381e0d9c1c6f8bc51e86bdf497ccdd62e2ae30
Windows NTP Time Server Syslog Monitor Denial Of Service
Posted Jan 16, 2009
Authored by princeofnigeria

The Window NTP Time Server Syslog Monitor version 1.0.000 suffers from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 1e3b8bf70a6b7f6bd5f48f6038daa7400c37cab35b9374762a8c5d8b432b238e
WinFail2Ban Open Source IPS For Windows
Posted Jan 16, 2009
Authored by Vittorio Pavesi | Site winfail2ban.sourceforge.net

WinFail2Ban is an open source intrusion protection system that scans log files, looks for SQL failed logins, and analyzes the event viewer banning IPs as needed. This is a port of Fail2Ban from Linux to Windows.

tags | tool, intrusion detection
systems | linux, windows, unix
SHA-256 | d0b458c5ff29225fbe78c0ac5241eca5313621d7407109958ec034e78e4536a9
Linux/x86 PUSH reboot() Shellcode
Posted Jan 16, 2009
Authored by Jonathan Salwan | Site shell-storm.org

30 bytes small linux/x86 PUSH reboot() shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 127695a41b3ba3cfc37f0483973906081e001585bd8dcd0d9c091a3a9b883ee2
MPlayer Stack Buffer Overflow
Posted Jan 16, 2009
Authored by sCORPINo | Site snoop-security.com

MPlayer version 1.0rc2 TwinVQ stack buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 9e304166401ffce8916625dbec9a7a3490a381bb4181d6f97133a9b8f6a0d18f
BibCiter 1.5 SQL Injection
Posted Jan 16, 2009
Authored by nuclear

BibCiter version 1.4 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 2001cbf75e25a58a93d55d535b6717e72b22ad0f8f066f4d87ab9391954b06aa
Simple PHP Newsletter 1.5 Local File Inclusion
Posted Jan 16, 2009
Authored by ahmadbady

Simple PHP Newsletter version 1.5 suffers from local file inclusion vulnerabilities.

tags | exploit, local, php, vulnerability, file inclusion
SHA-256 | 16a9eac6967ae7c80867bc2211fc6c0193eb8bbbeb3dfd869ec25d0f0fc0eda0
ASP Action Calendar 1.3 SQL Injection
Posted Jan 16, 2009
Authored by SuB-ZeRo | Site dz-security.com

ASP Action Calendar version 1.3 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, asp
SHA-256 | dc7ea528bfcbfc48d72b9b6a2f7459976aede6ddb4b205321b9619e2b45609c3
AJ Classifieds - For Sale Shell Upload
Posted Jan 16, 2009
Authored by ZoRLu

AJ Classifieds - For Sale version 3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | 2ecd00ff721f0e57e88303fd3938724754358b98dc064babed8d15b74fc30c02
AJ Classifieds - Personals Shell Upload
Posted Jan 16, 2009
Authored by ZoRLu

AJ Classifieds - Personals version 3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | 389e28d84de00d32316138690db904afd2abd4b7f4a8ca97c5b9ecaccef0179f
AJ Classifieds - Real Estate Shell Upload
Posted Jan 16, 2009
Authored by ZoRLu

AJ Classifieds - Real Estate version 3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | cbffb4cdd89538e23790baa0511a76fa7f580fea2de9ff728b2c9a8d9b14a0dc
Sagem Router F@st 2404 Remote Reset
Posted Jan 16, 2009
Authored by AlpHaNiX

Sagem Router F@st version 2404 remote unauthenticated reset proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | 58bb0619c6d3951ccfd8aa214c710d60ae975280846c86d8fea45ac18d5153f0
Excel Viewer OCX Denial Of Service
Posted Jan 16, 2009
Authored by AlpHaNiX

Excel Viewer OCX versions 3.1 and 3.2 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 23a5708234caf38adac5969acc1d79f827f35fda903d5a0adfcefb4a5f5cdd92
BlogIt! SQL Injection / Database Disclosure / XSS
Posted Jan 16, 2009
Authored by Pouya Server

BlogIt! suffers from remote SQL injection, database disclosure, and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 66d0d3cfa5686ac0a4ffef1bf59d4a4a759d1d302f67c1e8ea87a9da41d363e7
RankEm Databse Disclosure / XSS
Posted Jan 16, 2009
Authored by Pouya Server

RankEm suffers from database disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 3b79950d11158e7ef52fea10741fcdb9db9715203d5d0df7a11eab4e4426b72e
Silentum Boards Cross Site Scripting
Posted Jan 16, 2009
Authored by Pouya Server

Silentum Boards suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6f0098f8cbf6b7cf3c45025d95ca75bdacc3b4937533d6fcfea69278979ad27b
eReservations SQL Injection
Posted Jan 16, 2009
Authored by ByALBAYX | Site c4team.org

eReservations suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 367f329e1fecfe9dd1955270701aa27ae08a99957bf85e63ec900ed125944c9c
Ping IP SQL Injection
Posted Jan 16, 2009
Authored by ByALBAYX | Site c4team.org

Ping IP suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 4f0c2f9ff4168b87f55e4c9e13326449056f9654c0c39c3738a75161a5d369a4
MetaProducts MetaTreeX 1.5.100 File Overwrite
Posted Jan 16, 2009
Authored by H-T Team | Site no-hack.fr

MetaProducts MetaTreeX version 1.5.100 Active-X file overwrite exploit.

tags | exploit, activex
SHA-256 | 76b94b74105888b4488558ce4128ee9977a1a4c8a3f31cc27b63e6b8f0fe4bc3
Virgin Media SQL Injection
Posted Jan 16, 2009
Authored by Rohit Bansal

Virginmedia.com suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 291f205f5342c194347333962f7d5e45d1e6b8449edb438053842ffc58a0a38c
Mandriva Linux Security Advisory 2009-017
Posted Jan 16, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-017 - A vulnerability in KDM allowed a local user to cause a denial of service via unknown vectors. The updated packages have been patched to prevent this issue.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2007-5963
SHA-256 | f9d4977c0b44fbc646423d68752cb186daf71baed2b4903565644669d4b3f16a
Mandriva Linux Security Advisory 2009-016
Posted Jan 16, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-016 - Ian Jackson found a security issue in the QEMU block device drivers backend that could allow a guest operating system to issue a block device request and read or write arbitrary memory locations, which could then lead to privilege escalation. It was found that Xen allowed unprivileged DomU domains to overwrite xenstore values which should only be changeable by the privileged Dom0 domain. An attacker able to control a DomU domain could possibly use this flaw to kill arbitrary processes in Dom0 or trick a Dom0 user into accessing the text console of a different domain running on the same host. This update makes certain parts of xenstore tree read-only to unprivileged DomU domains. A vulnerability in the qemu-dm.debug script was found in how it created a temporary file in /tmp. A local attacker in Dom0 could potentially use this flaw to overwrite arbitrary files via a symlink attack. Since this script is not used in production, it has been removed from this update package. The updated packages have been patched to prevent these issues.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2008-0928, CVE-2008-4405, CVE-2008-4993
SHA-256 | bf0f92b3794ad63079798172dc4b4074c87c0b0c4c4de75dc91b2b558aa648ce
Page 1 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close