«
Expand/Collapse
139 items tagged "node"
Related tags:
forgery [+],
network node manager [+],
manager i [+],
network [+],
openview [+],
third party [+],
safer use [+],
manager toolbar [+],
hacks [+],
exploits [+],
hp openview network node manager [+],
remote buffer overflow [+],
manager nnmrptconfig [+],
manager [+],
protected [+],
manager execution [+],
information [+],
embed [+],
zero [+],
tool [+],
security assessment [+],
potential security vulnerability [+],
number 6 [+],
networking applications [+],
networking [+],
manager. authentication [+],
limit [+],
javascript engine [+],
information messages [+],
information disclosure vulnerability [+],
information assessment [+],
hierarchy [+],
felix geisendrfer [+],
exe component [+],
destination node [+],
code [+],
chaos communication congress [+],
assessment [+],
Wireless [+],
vulnerability [+],
code execution [+],
zero day [+],
workaround [+],
webkit [+],
tom [+],
split flap [+],
packet format [+],
nnmi [+],
module [+],
method [+],
manager cve [+],
linux [+],
gallery [+],
control [+],
arduino [+],
arbitrary code [+],
application [+],
drupal [+],
zabbix [+],
widget [+],
usa [+],
unauthorized access [+],
time [+],
tim caswell [+],
terminal node controller [+],
terminal [+],
system [+],
spinola [+],
service vulnerability [+],
sensors [+],
sensor package [+],
sensor network [+],
sensor [+],
security vulnerabilities [+],
rs485 [+],
router [+],
recommendation [+],
prototyping [+],
protocol [+],
promiscuous [+],
private file [+],
parrot [+],
page [+],
packard [+],
owen [+],
node communications [+],
nibble [+],
news [+],
network sniffer [+],
network node [+],
mozilla [+],
moving [+],
mode [+],
microcontrollers [+],
medical [+],
max ogden [+],
manager ovutil [+],
linux kernel [+],
kernel memory [+],
kernel 2 [+],
kernel [+],
joystick driver [+],
java denial [+],
hsnet [+],
hp ux [+],
home automation system [+],
home [+],
hitachi [+],
hi friends [+],
hardware hacks [+],
file permissions [+],
dsl router [+],
drone [+],
dos vulnerability [+],
dom node [+],
diego spinola [+],
detection [+],
debian etch [+],
custom hardware [+],
cross site scripting [+],
cross [+],
controller. this [+],
cons [+],
command execution [+],
command [+],
colorbox [+],
can [+],
c bindings [+],
bus [+],
bt4 [+],
bof [+],
black hat [+],
arp [+],
arbitrary code execution [+],
andrew [+],
amateur radio operators [+],
adhoc [+],
access security [+],
Hardware [+],
buffer overflow vulnerability [+],
stack buffer [+],
hp network [+],
buffer overflow [+]
-
-
16:00
»
SecuriTeam
HP Network Node Manager i is prone to an unspecified unauthorized-access vulnerability.
-
-
8:25
»
Hack a Day
Wanting to control a split flap display that was not near a computer [Tom] looked to a common solution for communicating over distances not practical for I2C or SPI. He developed his own hardware and packet format using the RS-485 protocol. This is part of a larger project he has been working on to feed [...]
-
8:25
»
Hack a Day
Wanting to control a split flap display that was not near a computer [Tom] looked to a common solution for communicating over distances not practical for I2C or SPI. He developed his own hardware and packet format using the RS-485 protocol. This is part of a larger project he has been working on to feed [...]
-
-
10:01
»
Hack a Day
[Max Ogden] wanted the option to add sensors to his Parrot AR Drone. This a commercially available quadcopter which runs Linux. This makes it rather easy for him to use Node.js to read the sensors from an Arduino board. The use of the Arduino is merely for easy prototyping. It is only needed to bridge the drone’s [...]
-
-
17:00
»
SecuriTeam
A potential security vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows.
-
-
17:00
»
SecuriTeam
The Node Embed module for Drupal is prone to a security-bypass vulnerability.
-
-
5:30
»
Hack a Day
The hardware hacking village at Toorcamp provided space and tools to work on hardware. It was interesting to see what hardware hacks people had brought to work on. One example is [Owen]‘s Nibble Node.js Widget. The widget combines the popular node.js platform and custom hardware to create a node for the “internet of things.” The hardware [...]
-
-
6:01
»
Hack a Day
[Tim Caswell] has been using gamepads and joysticks to demonstrate his node.js hacks for a long time. The thing is, he has been relying on C++ bindings to handle the hardware while trying to herald the praises of node.js. Why not cut out the middle man and write a joystick driver in node.js? It turns out to [...]
-
-
17:00
»
SecuriTeam
The Colorbox Node module for Drupal is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
-
-
17:00
»
SecuriTeam
The Restrict node page view module for Drupal is prone to a security-bypass vulnerability. .
-
21:14
»
Packet Storm Security Tools
ni6 is a security assessment tool that exploits potential flaws in the processing of ICMPv6 Node Information messages.
-
-
21:51
»
SecDocs
Authors:
Felix Geisendörfer Tags:
Javascript Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. This talk explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past. With the rise of node.js, anybody can now trivially write scalable network applications. This talk explains node's event loop and non-blocking I/O machinery and shows how node may become your tool of choice for future networking adventures. There will also be a look at new threats that could arise from the ability of managing thousands of connections with almost no difficulty.
-
-
21:50
»
SecDocs
Authors:
Felix Geisendörfer Tags:
Javascript Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. This talk explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past. With the rise of node.js, anybody can now trivially write scalable network applications. This talk explains node's event loop and non-blocking I/O machinery and shows how node may become your tool of choice for future networking adventures. There will also be a look at new threats that could arise from the ability of managing thousands of connections with almost no difficulty.
-
21:50
»
SecDocs
Authors:
Felix Geisendörfer Tags:
Javascript Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. This talk explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past. With the rise of node.js, anybody can now trivially write scalable network applications. This talk explains node's event loop and non-blocking I/O machinery and shows how node may become your tool of choice for future networking adventures. There will also be a look at new threats that could arise from the ability of managing thousands of connections with almost no difficulty.
-
-
13:01
»
Hack a Day
Here’s one node on the new home automation system on which [Black Rynius] is working. So far he’s testing out the system with just two nodes, but plans to build more as the project progresses. He’s chosen to use the CAN bus for communications; a protocol which is most commonly found in automotive applications. The biggest plus [...]
-
-
18:09
»
SecuriTeam
An Information Disclosure vulnerability was identified in HP Network Node Manager i.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
23:54
»
SecuriTeam
A potential vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
23:49
»
SecuriTeam
A potential vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
23:49
»
SecuriTeam
A potential vulnerability has been identified with HP Network Node Manage.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
13:09
»
SecuriTeam
HP Network Node Manager i (NNMi) contains a remote Information Disclosure vulnerability.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
8:54
»
Packet Storm Security Exploits
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.
-
8:54
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.
-
8:54
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.
-
8:50
»
Packet Storm Security Exploits
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.0 and 7.53. By sending a CGI request with a specially OvOSLocale cookie to Toolbar.exe, an attacker may be able to execute arbitrary code. Please note that this module only works against a specific build (ie. NNM 7.53_01195)
-
8:50
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.0 and 7.53. By sending a CGI request with a specially OvOSLocale cookie to Toolbar.exe, an attacker may be able to execute arbitrary code. Please note that this module only works against a specific build (ie. NNM 7.53_01195)
-
8:50
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.0 and 7.53. By sending a CGI request with a specially OvOSLocale cookie to Toolbar.exe, an attacker may be able to execute arbitrary code. Please note that this module only works against a specific build (ie. NNM 7.53_01195)
-
-
6:06
»
Hack a Day
[Diego Spinola] wrote in to tell us about a node communication system he’s been working on called HsNet. The aim is to build a system of nodes that can be made up of small and inexpensive microcontrollers. The problem is that the least expensive controllers often don’t have a hardware UART. HsNet implements the RS485 [...]
-
10:44
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted Hostname parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
10:44
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted Hostname parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
-
17:02
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted ICount parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
17:02
»
Packet Storm Security Recent Files
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted ICount parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
17:02
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted ICount parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
17:00
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted MaxAge parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
17:00
»
Packet Storm Security Recent Files
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted MaxAge parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
17:00
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted MaxAge parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
-
-
11:20
»
SecuriTeam
Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM).
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
11:20
»
SecuriTeam
A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM) running on Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
11:50
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
11:50
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
11:50
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
11:45
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
21:46
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
21:46
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
21:41
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
21:41
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
19:17
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
17:37
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 11-05 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The flaw exists within the ovas.exe component which listens by default on TCP port 7510. When handling the Source Node or Destination Node name POST variables the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the OVAS service.
-
17:37
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 11-05 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The flaw exists within the ovas.exe component which listens by default on TCP port 7510. When handling the Source Node or Destination Node name POST variables the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the OVAS service.
-
17:37
»
Packet Storm Security Misc. Files
Zero Day Initiative Advisory 11-05 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The flaw exists within the ovas.exe component which listens by default on TCP port 7510. When handling the Source Node or Destination Node name POST variables the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the OVAS service.
-
-
13:26
»
SecuriTeam
A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM).
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
12:16
»
SecuriTeam
A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM).
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
22:10
»
SecuriTeam
A vulnerability related to the execution of arbitrary code has been discovered in HP OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
10:56
»
SecuriTeam
Multiple vulnerabilities were discovered in HP OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
10:51
»
SecuriTeam
An arbitrary code execution vulnerability was discovered in HP OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
12:00
»
Hack a Day
This module is a sensor package for monitoring the electrical activity of the heart. It is the product of an effort to create a Wireless Body Sensor Network node that is dependable while consuming very little electricity, which means a longer battery life. To accomplish this, the microcontroller in charge of the node compresses the data [...]
-
-
20:00
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-188 - Some vulnerabilities were discovered and corrected in the Linux kernel. fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount symlinks, which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW. The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7 does not validate node values, which allows local users to read arbitrary kernel memory locations, cause a denial of service , and possibly have unspecified other impact by specifying a node that is not part of the kernel node set. Various other issues have been addressed.
-
-
16:26
»
SecuriTeam
A vulnerability was identified on HP OpenView Network Node Manager which could lead to the execution of arbitrary code.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
10:00
»
Hack a Day
[Andrew] used a DSL router to make his own Terminal Node Controller. This will become part of an APRS-IS network, an Internet-based network built by amateur radio operators. The router used here is a Dlink DSL-502T with an AVR based TNC module attached to the serial port header. The phone line connector and its accompanying [...]
-
-
18:23
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 10-134 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists due to a workaround that was implemented in order to support recursive cloning of attribute nodes. If an event is added to the first attribute node, the application can be made to free the node, and then later access a reference to it. This can lead to code execution under the context of the application.
-
18:22
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-134 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists due to a workaround that was implemented in order to support recursive cloning of attribute nodes. If an event is added to the first attribute node, the application can be made to free the node, and then later access a reference to it. This can lead to code execution under the context of the application.
-
-
0:31
»
SecuriTeam
Vulnerabilities related to the execution of Arbitrary code were identified on HP OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
0:30
»
SecuriTeam
Potential code execution vulnerabilities have been identified in HP OpenView Network Node Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
2:49
»
remote-exploit & backtrack
Hi friends
This is my setup for adhoc mode wlan
Quote:
NODE A
IP 192.168.1.3
NetMask 255.255.255.0
Ubuntu 9.10
mode adhoc
chipset Atheros9k
|
Quote:
NODE B
IP 192.168.1.2
NetMask 255.255.255.0
Sidux
mode adhoc
chipset BROADCOM4312
|
These two communicate very well
However if i change the scenario to
NodeA having BT4 and Node B sidux ..then NODE A is not putting the card in adhoc mode..i guess the issue with ath9k and ath_pci comes out
if i do this
NODE A sidux and NODE B sidux both go in adhoc mode but do not ping each other
and then i tried this also
NODE A Debian Etch and NODE B sidux both go in adhoc mode but do no ping each other
Please can someone tell me how to make the adhoc mode work o..as of now only ubuntu karmic seems to behave..
thanx