«
Expand/Collapse
1040 items tagged "version"
Related tags:
source code [+],
security advisory [+],
proof of concept [+],
overflow [+],
injection [+],
execution [+],
vulnerability [+],
wordpress [+],
service vulnerability [+],
denial [+],
buffer [+],
remote [+],
quicktime [+],
pre authentication [+],
pacer [+],
null pointer [+],
null [+],
midori browser [+],
midori [+],
memory corruption [+],
gallery [+],
edition [+],
code [+],
authentication [+],
apple [+],
digital [+],
control [+],
suffers [+],
maxforum [+],
buffer overflow vulnerability [+],
buffer overflow [+],
active x [+],
active [+],
inclusion [+],
zip file [+],
zip [+],
youtube [+],
yoast [+],
windows version [+],
webadmin [+],
weaknesses [+],
vworkspace [+],
vtiger crm [+],
uploads [+],
u playlist [+],
traversal [+],
tool [+],
swf files [+],
swf [+],
string [+],
stack overflow [+],
sql server version [+],
spo [+],
soapbox [+],
simpliscms [+],
security design [+],
script version [+],
scanner [+],
scada [+],
safari [+],
rssh [+],
root code [+],
root [+],
robots [+],
rips [+],
remote desktop connection [+],
released [+],
razor [+],
ratbox [+],
quest [+],
public tools [+],
privacy event [+],
pragyan [+],
portix [+],
player [+],
piwik [+],
personal version [+],
parser [+],
panel version [+],
opera version [+],
opera [+],
network [+],
netcat [+],
n webadmin [+],
multiple file [+],
ms version [+],
microsoft sql server [+],
microsoft [+],
metasploit [+],
media [+],
mbbs [+],
manipulation [+],
manhali [+],
mail gateway [+],
linux kernel [+],
kingview [+],
kernel version [+],
ircd [+],
ios [+],
integer overflow [+],
information disclosure vulnerability [+],
information [+],
imagemagick [+],
ian clarke oskar sandberg [+],
horde [+],
gallery 3 [+],
free [+],
flynax [+],
flickr [+],
fileman [+],
file deletion [+],
fckeditor [+],
ez shopwner [+],
export plugin [+],
export [+],
enumeration [+],
empirecms [+],
efront [+],
easy [+],
e pre [+],
drupal [+],
directory traversal vulnerability [+],
directory [+],
design implementation [+],
defcon 13 [+],
crash proof [+],
crash [+],
course ms [+],
course [+],
corruption [+],
cool [+],
control panel [+],
contact forms [+],
communication [+],
cms systems [+],
classifieds software [+],
classifieds [+],
cinema version [+],
cinema 1 [+],
charybdis [+],
chaos communication congress [+],
cameras [+],
buffer overflows [+],
buffer overflow exploit [+],
beta implementation [+],
beta [+],
backdoor [+],
b sql [+],
avira [+],
attacker [+],
asp source code [+],
arbitrary code execution [+],
apple quicktime player [+],
apple quicktime [+],
apple itunes [+],
airdroid [+],
active x control [+],
disclosure [+],
tutorial [+],
thc hydra [+],
thc [+],
target [+],
simon [+],
raspberry [+],
privilege [+],
portuguese [+],
poc [+],
pcb version [+],
patch [+],
openssh [+],
news [+],
modified version [+],
magic [+],
m3u file [+],
local privilege escalation [+],
lightweight version [+],
hydra [+],
file upload [+],
exploits [+],
destiny player [+],
auto focus [+],
auto [+],
audio [+],
aes edition [+],
adrian [+],
acmlmboard [+],
Hardware [+],
from [+],
cms [+],
zero day [+],
x exploit [+],
wpmanager [+],
world [+],
wire loops [+],
webapps [+],
web applications [+],
web [+],
waiting rooms [+],
vuplayer [+],
vulnerabilities [+],
vpndownloader [+],
vpn [+],
visual diff [+],
viewer [+],
vbsedit [+],
vbs files [+],
update [+],
ultrasonic sensors [+],
txt [+],
toy [+],
teleduc [+],
symlink [+],
stylophone [+],
stripboard [+],
speaker projects [+],
simple computer [+],
simon inns [+],
simon clone [+],
ruubikcms [+],
rover [+],
robot [+],
rig [+],
repository manager [+],
repository [+],
regional science [+],
raspis [+],
ram [+],
printcontrol [+],
previous version [+],
potential security vulnerability [+],
porridge [+],
pong [+],
phplist [+],
pete [+],
pcb [+],
pair [+],
original cost [+],
operation [+],
open source hardware [+],
onsen [+],
ondrej stanek [+],
obstacle avoidance [+],
nomis [+],
new feature [+],
new [+],
nator [+],
musicbox [+],
musical [+],
music from the 80s [+],
mp3 [+],
moritz simon geist [+],
misc [+],
microcontrollers [+],
memory exhaustion [+],
mechanical version [+],
mbb [+],
marco perry [+],
machine [+],
lord vetinari [+],
local buffer overflow [+],
local [+],
little simon [+],
little [+],
line following robot [+],
line follower [+],
lazy man [+],
laser pointer [+],
lansing [+],
keepon [+],
kayak [+],
julian [+],
jeremy blum [+],
jeremy [+],
jamming [+],
iterations [+],
isn [+],
irregular intervals [+],
ioio [+],
hp version [+],
hijacking [+],
hardware version [+],
hardware peripherals [+],
hand [+],
hadoop [+],
grocery store [+],
gripper [+],
google translation [+],
google [+],
gist [+],
freestyle kayak [+],
freestyle [+],
freenac [+],
foxplayer [+],
focus [+],
flint [+],
fignition [+],
eyebrows [+],
exponent [+],
escalation [+],
electronic board [+],
eduard ros [+],
easton [+],
dslr cameras [+],
dslr [+],
downloader [+],
dos [+],
dll [+],
diy [+],
diwire [+],
discussion boards [+],
dim the lights [+],
detroit [+],
dark subjects [+],
dance moves [+],
dance [+],
dale [+],
crystal reports [+],
component count [+],
coin cells [+],
cnc [+],
clock [+],
classic [+],
clapper [+],
cisco anyconnect [+],
chris [+],
camera rig [+],
camera [+],
cain and abel [+],
cain and [+],
cain [+],
buzz [+],
briefcase [+],
breadboard [+],
boombox [+],
board game [+],
bladder [+],
bender [+],
autonomous rover [+],
autistic kids [+],
attiny [+],
arduino [+],
arcade version [+],
arcade [+],
arbitrary code [+],
animatronic [+],
android [+],
andrea [+],
aluminum [+],
adrian onsen [+],
abel [+],
Software [+],
808 drum machine [+],
hacks [+],
code execution [+],
denial of service [+],
version 6 [+],
sql [+],
source [+],
component version [+],
apple security [+],
advisory [+],
service [+],
day [+],
zykecms,
zippho,
zimplit,
zeuscms,
zeus,
zervit disclose,
zervit,
zenphoto,
zeematri,
zeeadbox,
yukle,
yplay,
yourarcadescript,
yaws,
yassl,
yapig,
yamamah,
xt commerce,
xss,
xsrf,
xplico,
xmyplay,
xbtitracker,
xbmc,
x snow,
x cart,
wvx file,
wp useronline,
workstation version,
workstation,
worksimple,
wolf cms,
wizard version,
wizard,
wireshark,
winamp version,
winamp,
win,
wikyblog,
wikiwebhelp,
wiccle,
whiteboard,
wftpd,
wftp,
webmatic,
webmail version,
webid,
webessence,
weberp,
web server version,
way,
warning,
wanewsletter,
wampserver,
w agora,
vro file,
vkplayer,
videosearchscript,
videodb,
version numbers,
velbox,
vbulletin version,
vbulletin,
vbshout,
vbseo,
varicad,
usbsploit,
uploader,
upload,
unrealircd,
ultraiso,
ultrabb,
ufoalieninvasion,
ufo alien invasion,
uebimiauwebmail lfi,
ucenter crossdomain,
txt mp3,
turkojan,
tuniac,
ttcms,
truc,
trforum,
traidnt,
tradese,
tr forum,
tomatocart,
tiny computer,
timesheet,
thengine,
thehostingtool,
tgz,
tftpdwin,
tftgallery,
teamviewer,
tcexam,
target id,
tar gz,
syntaxcms,
symphony,
swingette,
sunjavawebserver,
studio,
stephen martin,
stack frame,
stack buffer,
stack,
squirrelcart,
sqli,
sql server 2005,
sql injection,
spotify,
spirit,
spherecms,
sopcast,
sonique,
somtimes,
software version,
softsaurus,
socialware,
soap,
snackamp,
smodcms,
smartpc,
smartftp,
smartermail,
smart pc,
smart,
smallftpd,
slooze,
simpnews,
simple,
sim utility,
siestta,
shellcode,
shell,
sheevaplug,
sharetronix,
sfilemanager,
session fixation,
service pack 1,
server version,
server,
serials,
serendipity,
seh,
sef,
security recommendations,
security problems,
security,
seamonkey,
scripti,
schoolmation,
schematics,
scanning tunneling microscope,
scanning,
sapgui,
sap,
sandbox,
samihttp,
sami,
samba client,
sahana,
runcms,
routerdefense brucon,
ronny cms,
ronny,
rmi connection,
river,
rfi,
reservelogic,
request function,
repairshop,
remote shell,
remote file include vulnerability,
remote buffer overflow vulnerability,
remote buffer overflow,
release candidate,
reader plugin,
rc3,
rc1,
rapidwarex,
rapidcms,
quickzip,
quickplayer sehoverwrite,
quick player,
qtweb,
puntal,
punbb,
psnews,
prototyping hardware,
prosshd,
proper location,
propeller,
prometeo,
privilege escalation vulnerability,
pre,
pphlogger,
powered,
powerdvd,
pov,
pluxml,
plugin version,
plugin,
pluck,
pls file,
pls,
playstation,
play station 3,
play station,
platnik,
platform version,
platform,
planet,
pl version,
pl v2,
pixie,
pithcms,
pimcore,
pigalle,
phreebooks,
phpwind,
phptroubleticket,
phpmyshopping,
phpmylogon,
phpmyfaq,
phpmyadmin,
phpliteradmin,
phpcheckz,
phpcdb,
phpbugtracker,
phpbb,
phpauthent,
php nuke,
php,
philweb,
phenix,
peripheral controller,
pdf plans,
pdf,
pc recorder,
pbx,
pbboard,
pargoon,
packet,
package,
pack,
pacific,
overwrite,
ovbb,
ossim,
oscss,
oscommerce,
orangehrm,
opml,
opera2,
openvas,
openpresse,
opendchub,
opencominterne,
opencimetiere,
opencatalogue,
opencart,
open source version,
open source implementation,
onyx,
onehttpd,
onecms,
ollydbg,
old version,
old software,
ocportal,
nuke,
nubuilder,
novellzenworks,
nosgba,
nodesforum,
nnm,
ninkobb,
nick,
nginx,
ngenuity,
networx,
netstumbler,
netstartenterprise,
netscape,
nessus,
nds file,
ncp solutions,
ncp,
nagios,
myvideoconverter,
mysql,
myphpauction,
myhobbysite,
mycart,
music version,
music,
muse,
multiple buffer overflow,
multiple,
mullti,
mp3cutter,
mp3 studio,
mp3 file,
mp3 cutter,
movielibrary,
mongoose,
mollify,
mirandamitm,
miranda im,
miranda,
miniwebsvr,
minishare,
migascms,
microscope,
metinfo,
metasploit framework,
menu version,
memory consumption,
mediamonkey,
mediacoder,
mediac,
mblogger,
maxdev,
max version,
max os,
max,
mango,
manager. for,
manager system,
management interface,
mac os x,
mac os,
m3u,
ltd,
lois software,
loaded,
lms,
lionwiki,
linux computer,
limny,
lildbi,
libmikmod,
lfi,
leds,
led,
lastest,
kubelance,
krb5,
knowledge base,
keepass,
kdpics,
juke,
jour,
joomla,
jomsocial,
jira,
jetty web,
jetty,
jetaudio,
jaws,
java web server,
java runtime environment,
java rmi,
java,
jailbreak,
iworkstation,
isobuster,
iphone,
ioffice,
insecure,
inout,
increment,
in portal,
ieframe,
ibphotohost,
iboutique,
httpdx,
http server,
htaedit,
home,
homap cms,
holocms,
hmei,
hfs,
hexjector,
hero dvd,
hero,
heap corruption,
gvi,
gui,
gsplayer,
gsm sim,
gsm,
group version,
group,
greg,
gpeasy,
gnu general public license,
globe,
gitweb,
getsimple,
geneshop,
generales,
geeklog,
gba,
gazelle,
gangster,
gamescript,
game id,
game,
gallo,
fusionforge,
fusion,
ftpgetter,
frigate,
freshftp,
freesshd,
freephpwebsitesoftware,
freehost,
freeciv version,
freeciv,
forumcms,
forum,
forgery,
foam machine,
foam,
flatpress,
flashchat,
flashcard,
fixation,
firefox,
fipsforum,
filterftp,
fileapp,
file,
fieldnotes,
fennec,
feeddemon,
fcrackzip,
fcms,
fatwiki,
fathftp,
exploit,
exhaustion,
exec,
ewebeditor,
evolution,
esyndicat,
eswap,
eocms,
entrans,
entertainment,
enterprise version,
enterprise,
enanocms,
elitecms,
eden,
eclime,
easyzip 2000,
easyzip,
easyftp,
easybiller,
dxf file,
dual version,
dsemu,
driver version,
driver,
dreamweaver,
dosya yukle,
dos vulnerability,
dos c,
don,
dompdf,
dolphin,
dodo,
docebo,
dj studio,
dissector,
discuz,
disconnect,
directory traversal,
digitalbox,
digishop,
diem,
dewnewphplinks,
devilzc,
dev,
denial of service exploit,
deluxebb,
default version,
dcp portal,
dbhcms,
dav,
dataface,
data base,
data,
d ftp,
cybermatch,
cutter,
cubecart,
cs4,
crystalreport,
crystal report viewer,
crystal report,
cruxpa,
cruxcms,
crossdomain,
cross site scripting,
cross,
croogo,
cre,
cpio,
cpanel,
coreftp,
cookie manipulation,
converter,
controller,
computer,
completeftp,
commview,
command execution,
com,
coldusergroup,
coldofficeview,
cold fusion application,
codeigniter,
cmsmadesimple,
cmsfaethon,
clone,
client,
clearbudget,
clantools,
cisco ios,
chordpulse,
chipmunk,
chillycms,
chemviewx,
chemistry,
chcounter,
change,
cemaliste disclose,
cemaliste,
ceica,
castripper,
cart,
camshot,
campsite,
bypass,
build,
bugtraq,
buffer overflow vulnerabilities,
bubble bath,
bt4,
bsod,
browser,
brazip,
bonjour,
boastmachine,
bluetooth,
blazedvd,
bigforum,
bigace,
based buffer overflow,
backlinkspider,
baal,
axis controller,
avcon,
avast,
auktionshaus,
audistats,
atutor,
asx to mp3 converter,
asx file,
asx,
asterisk,
asp version,
asp auditor,
asp,
askme,
arraid,
arisg,
archeomed,
arab,
apple safari,
apboard,
apache,
aoaaudioextractor,
anyzip,
anyconnect,
antz,
anti virus,
animation,
angel lms,
anecms,
ananta,
amaya,
alzip,
alqatari,
alpha2,
alpha remote,
alpha cms,
alpha,
allpc,
aligro,
alegrocart,
aimex,
agora,
aef,
adobe reader,
adobe,
adn,
adminloginfinder,
administrator password,
acunetix,
activemq,
achecker,
accessible network,
abc,
a blog,
Support,
Release,
Related,
Pentesting,
Newbie,
Issues,
General,
Final,
Discussions,
BackTrack,
Area,
123 flashchat
Skip to page:
1
2
3
...
5
-
-
17:01
»
Packet Storm Security Exploits
This exploit demonstrates a remotely trigger-able crash in ircd-ratbox version 2.0. It affects Shadowircd version 6.3.3 and Charybdis version 3.4.2.
-
17:01
»
Packet Storm Security Recent Files
This exploit demonstrates a remotely trigger-able crash in ircd-ratbox version 2.0. It affects Shadowircd version 6.3.3 and Charybdis version 3.4.2.
-
17:01
»
Packet Storm Security Misc. Files
This exploit demonstrates a remotely trigger-able crash in ircd-ratbox version 2.0. It affects Shadowircd version 6.3.3 and Charybdis version 3.4.2.
-
-
10:01
»
Hack a Day
This heavily populated PCB is a recreation of the original arcade version of Pong. That is an important distinction because the home version of Pong used a specialized chip to do much of the work. This is basically all stock logic, which explains the high component count. We wonder how many quarters it took just [...]
-
-
1:22
»
Packet Storm Security Advisories
RSSH version 2.3.4 was released to address an environment variable manipulation vulnerability and an improper filtering of the rsync command line.
-
1:22
»
Packet Storm Security Recent Files
RSSH version 2.3.4 was released to address an environment variable manipulation vulnerability and an improper filtering of the rsync command line.
-
1:22
»
Packet Storm Security Misc. Files
RSSH version 2.3.4 was released to address an environment variable manipulation vulnerability and an improper filtering of the rsync command line.
-
-
10:01
»
Hack a Day
Here are two different briefcase speaker projects. [Dale] built the offering on the right back in high school and the upgraded version 2.0 more recently. He was inspired to send in a tip for the projects after seeing yesterday’s suitcase full of tunes. The first version uses a pair of speakers pulled out of a [...]
-
-
3:33
»
Packet Storm Security Exploits
CK Finder version 2.3 and FCKEditor version 2.6.8 allow uploads of malicious swf files that can allow for cross site scripting attacks.
-
-
15:46
»
Packet Storm Security Advisories
Apple Security Advisory 2012-11-07-1 - QuickTime version 7.7.3 is now available and addresses multiple buffer overflows, memory corruption, and use after free vulnerabilities.
-
15:46
»
Packet Storm Security Recent Files
Apple Security Advisory 2012-11-07-1 - QuickTime version 7.7.3 is now available and addresses multiple buffer overflows, memory corruption, and use after free vulnerabilities.
-
15:46
»
Packet Storm Security Misc. Files
Apple Security Advisory 2012-11-07-1 - QuickTime version 7.7.3 is now available and addresses multiple buffer overflows, memory corruption, and use after free vulnerabilities.
-
8:01
»
Hack a Day
Anyone who has listened to any music from the 80s has heard the percussive effects of the infamous TR-808 drum machine. To the modern ear, it sounds like an antique. Being the most popular drum machine of all time means it must have some redeeming qualities, right? [Moritz Simon Geist] decided he wanted nothing to [...]
-
-
6:01
»
Hack a Day
There is buzz all over the reddits and Element 14 discussion boards about an updated version of the Raspberry Pi that bumps the amount of RAM from 256 MB to 512 MB. This new update comes after the announcement of an upgraded version of the yet-to-be-released Raspi Model A (from 128 MB of RAM to [...]
-
-
12:38
»
Hack a Day
The DIWire bender we saw last summer made its way to Maker Faire this year with a new and improved version that is now able to bend steel even more accurately than the previous aluminum-bending version. I chatted up [Marco Perry] (above, obviously), and he explained a new feature of the DIWire bender that makes [...]
-
-
9:20
»
SecDocs
Authors:
Ian Clarke Oskar Sandberg Tags:
covert channel privacy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: At Defcon 13, we presented our ideas for creating scalable networks where only trusted friends speak directly to each other. In this talk, we will elaborate on this, discussing further experiments and results, as well as our attempts to build such a network for real. We believe that such networks, because they are covert and difficult to detect, are the only viable future for peer-to-peer communication in a time when it is under attack from all sides. The problem with such "dark" networks, or Darknets, is that peers in general are connected only through sequences of friends knowing friends. In order to create a network that still allows global communication, one must find a way of searching efficiently for such paths between hosts. This is where we have focused our attention: if one can efficiently find such paths, then one can use the known techniques of distributed hashtables to make a working, searchable, network. We have now begun our plan towards actually deploying a version of Freenet based on these principles: a file sharing network where only once trusted friends will know that one is even participating. Since it is to be the next version of Freenet, we also intend for it to offer anonymity and replication to protect against censorship. In this talk, we will further elaborate on the ideas and the issues we are facing. We will discuss further experiments and results, as well as our initial experiences of attempting to create such a network for the real world. As before, we will present both the theoretical aspects of our research, which has its roots in deep mathematical results, and the practical aspects of what we are trying to achieve.
-
9:20
»
SecDocs
Authors:
Ian Clarke Oskar Sandberg Tags:
covert channel privacy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: At Defcon 13, we presented our ideas for creating scalable networks where only trusted friends speak directly to each other. In this talk, we will elaborate on this, discussing further experiments and results, as well as our attempts to build such a network for real. We believe that such networks, because they are covert and difficult to detect, are the only viable future for peer-to-peer communication in a time when it is under attack from all sides. The problem with such "dark" networks, or Darknets, is that peers in general are connected only through sequences of friends knowing friends. In order to create a network that still allows global communication, one must find a way of searching efficiently for such paths between hosts. This is where we have focused our attention: if one can efficiently find such paths, then one can use the known techniques of distributed hashtables to make a working, searchable, network. We have now begun our plan towards actually deploying a version of Freenet based on these principles: a file sharing network where only once trusted friends will know that one is even participating. Since it is to be the next version of Freenet, we also intend for it to offer anonymity and replication to protect against censorship. In this talk, we will further elaborate on the ideas and the issues we are facing. We will discuss further experiments and results, as well as our initial experiences of attempting to create such a network for the real world. As before, we will present both the theoretical aspects of our research, which has its roots in deep mathematical results, and the practical aspects of what we are trying to achieve.
-
9:20
»
SecDocs
Authors:
Ian Clarke Oskar Sandberg Tags:
covert channel privacy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: At Defcon 13, we presented our ideas for creating scalable networks where only trusted friends speak directly to each other. In this talk, we will elaborate on this, discussing further experiments and results, as well as our attempts to build such a network for real. We believe that such networks, because they are covert and difficult to detect, are the only viable future for peer-to-peer communication in a time when it is under attack from all sides. The problem with such "dark" networks, or Darknets, is that peers in general are connected only through sequences of friends knowing friends. In order to create a network that still allows global communication, one must find a way of searching efficiently for such paths between hosts. This is where we have focused our attention: if one can efficiently find such paths, then one can use the known techniques of distributed hashtables to make a working, searchable, network. We have now begun our plan towards actually deploying a version of Freenet based on these principles: a file sharing network where only once trusted friends will know that one is even participating. Since it is to be the next version of Freenet, we also intend for it to offer anonymity and replication to protect against censorship. In this talk, we will further elaborate on the ideas and the issues we are facing. We will discuss further experiments and results, as well as our initial experiences of attempting to create such a network for the real world. As before, we will present both the theoretical aspects of our research, which has its roots in deep mathematical results, and the practical aspects of what we are trying to achieve.
-
-
18:56
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 12-149 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco AnyConnect VPN Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists because the VPN AnyConnect helper program does not check the version number of the vpndownloader.exe program it downloads. As such it is possible to forcefully install an older version of the vpndownloader.exe that is vulnerable to previously patched issues.
-
-
11:11
»
Hack a Day
Last weekend at the Detroit Maker Faire, the folks at the Lansing Makers Network brought a large-scale version of the classic electronic board game Operation. MegOperation, as the Lansing hackerspace calls their build, is a gigantic printout of the chronically ill guy from Operation plastered onto a sheet of plywood. Wire loops surround each incision to detect when [...]
-
-
6:01
»
Hack a Day
[Eduard Ros] wrote in to show off the latest version of his Arduino powered autonomous rover (translated). You may remember seeing the first version of the build back in June. It started with a remote control truck body, adding an Arduino and some ultrasonic sensors for obstacle avoidance. The two big wheels and the pair of [...]
-
-
8:13
»
Packet Storm Security Recent Files
This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password.
-
8:13
»
Packet Storm Security Misc. Files
This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password.
-
-
10:01
»
Hack a Day
This is the simplest version of a jamming gripper that we’ve seen yet. The only component that might not be readily available is the pump in the upper left, but the rest is all hardware or grocery store stuff. It’s based on the concept we saw from a research video where the air in a bladder [...]
-
-
15:09
»
Packet Storm Security Exploits
Apple iTunes version 10.6.1.7 M3U playlist file walking heap buffer overflow proof of concept exploit. This also affects 10.6.0.40.
-
-
13:01
»
Hack a Day
There’s a new version of the IOIO on the way and we think you’re going to like the goals this redesign aims to achieve. If you’re not familiar, the IOIO is an Android accessory board. It connects to the phone via USB and is aimed at making it easier to build your own hardware peripherals [...]
-
-
15:01
»
Hack a Day
When [Andrea] was looking for a freestyle kayak, he bought the cheap version of a high-end kayak. The hull is exactly the same as the high-end model, but to differentiate between product lines, Pyranha chose to use less expensive fittings. [Andrea] decided to bring his new kayak up to spec (Italian, here’s a Google translation) by [...]
-
-
19:38
»
Packet Storm Security Exploits
Quest vWorkspace version 7.5 Connection Broker client active-x control pnllmcli.dll version 7.5.304.547 suffers from a SaveMiniLaunchFile() method remote file creation / overwrite vulnerability.
-
19:38
»
Packet Storm Security Recent Files
Quest vWorkspace version 7.5 Connection Broker client active-x control pnllmcli.dll version 7.5.304.547 suffers from a SaveMiniLaunchFile() method remote file creation / overwrite vulnerability.
-
19:38
»
Packet Storm Security Misc. Files
Quest vWorkspace version 7.5 Connection Broker client active-x control pnllmcli.dll version 7.5.304.547 suffers from a SaveMiniLaunchFile() method remote file creation / overwrite vulnerability.
-
-
17:58
»
Packet Storm Security Advisories
Apple Security Advisory 2012-03-12-1 - Safari version 5.1.4 is now available and addresses 84 different vulnerabilities. This includes many fixes for WebKit related issues.
-
17:58
»
Packet Storm Security Recent Files
Apple Security Advisory 2012-03-12-1 - Safari version 5.1.4 is now available and addresses 84 different vulnerabilities. This includes many fixes for WebKit related issues.
-
17:58
»
Packet Storm Security Misc. Files
Apple Security Advisory 2012-03-12-1 - Safari version 5.1.4 is now available and addresses 84 different vulnerabilities. This includes many fixes for WebKit related issues.
-
-
18:40
»
Packet Storm Security Recent Files
The Exploit Next Generation® SQL Fingerprint tool uses well-known techniques based on several public tools capable of identifying the Microsoft SQL Server version (such as: SQLping and SQLver), but, instead of showing only the "raw version" (i.e., Microsoft SQL Version 10.00.2746), the Exploit Next Generation® SQL Fingerprint shows the mapped Microsoft SQL Server version (i.e., Microsoft SQL 2008 SP1 (CU5)).
-
18:40
»
Packet Storm Security Tools
The Exploit Next Generation® SQL Fingerprint tool uses well-known techniques based on several public tools capable of identifying the Microsoft SQL Server version (such as: SQLping and SQLver), but, instead of showing only the "raw version" (i.e., Microsoft SQL Version 10.00.2746), the Exploit Next Generation® SQL Fingerprint shows the mapped Microsoft SQL Server version (i.e., Microsoft SQL 2008 SP1 (CU5)).
-
18:40
»
Packet Storm Security Misc. Files
The Exploit Next Generation® SQL Fingerprint tool uses well-known techniques based on several public tools capable of identifying the Microsoft SQL Server version (such as: SQLping and SQLver), but, instead of showing only the "raw version" (i.e., Microsoft SQL Version 10.00.2746), the Exploit Next Generation® SQL Fingerprint shows the mapped Microsoft SQL Server version (i.e., Microsoft SQL 2008 SP1 (CU5)).
-
11:25
»
Hack a Day
For the lazy man who can’t be bothered to buy a proper wattage lamp here’s the Clever Clapper, a Clapper that finally has the ability to dim the lights. Like the clapper we saw last month, [Pete]‘s version uses an ATtiny2313 and an electret mic. What sets [Pete]‘s version apart from the vintage 80s model [...]
-
-
13:59
»
Hack a Day
[Fotoopa] keeps churning out new iterations of his laser-triggered camera rig. This is his latest, which he calls the 2011 setup. Regular readers will remember that we just covered a different version back in November; that one was the 2010 rendition. It had two DSLR cameras offset by 90 degrees with mirrors to face forward. [...]
-
-
7:01
»
Hack a Day
[Chris] has been hard at work building his own version of Simon called [Nomis]. Although [HAD] has featured an ATiny Simon clone before, the article does an excellent job explaining how the system works. The ATTiny85 is used to control this game, which, for now is laid out on a simple breadboard. A PCB version [...]
-
-
14:01
»
Hack a Day
This tiny line-following robot is quite impressive. It’s [Ondrej Stanek's] second take on the design, which he calls PocketBot 2. Just like the earlier version, this robot is small enough to fit in a matchbox, but it’s received several upgrades in this iteration. The coin cells that ran the previous version have been replaced by [...]
-
-
12:17
»
Hack a Day
[Adrian Onsen] keeps making improvements on his auto-focus assist hack for DSLR cameras. The module seen above is version 3.0, which makes a few changes to the previous hardware and also presents a much more finished look. With version 2 [Adrian] was using a defocused laser to illuminate dark subjects so the DSLR auto-focus could [...]
-
-
14:24
»
Hack a Day
If you want people to really be impressed by your projects it’s often better not to have a fully finished look. In this case, we think hooking the stripboard version of FIGnition up to your TV will raise a lot more eyebrows than the PCB version will. [Julian] put together a guide to building the computer on [...]
-
-
11:02
»
Hack a Day
We love looking in on [Simon Inns'] projects, and this must be one of his very best. This is the fifth version of his MIDI-capable stylophone. The gist of the control system is that a conductive keyboard (made of a tinned PCB) is played by making a connection with the tip of a wired stylus [...]
-
-
7:58
»
Packet Storm Security Exploits
Drupal version 6.20 with String Overrides version 6.x-1.8 and Drupal version 5.21 with String Overrides version 5.x-1.8 suffer from a cross site scripting vulnerability.
-
7:58
»
Packet Storm Security Recent Files
Drupal version 6.20 with String Overrides version 6.x-1.8 and Drupal version 5.21 with String Overrides version 5.x-1.8 suffer from a cross site scripting vulnerability.
-
7:58
»
Packet Storm Security Misc. Files
Drupal version 6.20 with String Overrides version 6.x-1.8 and Drupal version 5.21 with String Overrides version 5.x-1.8 suffer from a cross site scripting vulnerability.
-
-
11:01
»
Hack a Day
As the Open Source Hardware movement gathers steam, it has become clear that the tools to work collaboratively on hardware are in the dark ages when compared with slick frameworks like Git used to work on software projects. We’ve read a fair amount about this lately, but the idea of visual difference generation for PCB [...]
-
-
19:45
»
Packet Storm Security Advisories
Apple Security Advisory 2011-10-12-6 - Numbers for iOS version 1.5 is now available and addresses multiple arbitrary code execution vulnerabilities.
-
19:45
»
Packet Storm Security Recent Files
Apple Security Advisory 2011-10-12-6 - Numbers for iOS version 1.5 is now available and addresses multiple arbitrary code execution vulnerabilities.
-
19:45
»
Packet Storm Security Misc. Files
Apple Security Advisory 2011-10-12-6 - Numbers for iOS version 1.5 is now available and addresses multiple arbitrary code execution vulnerabilities.
-
11:01
»
Hack a Day
[Simon] came up with an improved version of Lord Vetinari’s clock that begs to be installed in waiting rooms around the world. Last week, we were introduced to a real-life Vetinari Clock that keeps regular time but ticks at irregular intervals. It’s a great way to turn someone’s mind into porridge, but the original build [...]
-
-
17:48
»
Packet Storm Security Exploits
Multiple CMS systems from Flynax, such as General Classifieds Software version 3.2, Auto Classifieds Script version 3.2, and Real Estate Classifieds version 3.2 suffer from a remote SQL injection vulnerability.
-
17:48
»
Packet Storm Security Recent Files
Multiple CMS systems from Flynax, such as General Classifieds Software version 3.2, Auto Classifieds Script version 3.2, and Real Estate Classifieds version 3.2 suffer from a remote SQL injection vulnerability.
-
17:48
»
Packet Storm Security Misc. Files
Multiple CMS systems from Flynax, such as General Classifieds Software version 3.2, Auto Classifieds Script version 3.2, and Real Estate Classifieds version 3.2 suffer from a remote SQL injection vulnerability.
-
-
13:14
»
Hack a Day
[Easton] as been working with [Jeremy Blum] to come up with the newest version of his animatronic hand. You may remember seeing [Easton's] first animatronic hand, with which he won his regional science fair and made a trip to nations. Since then he’s been working on improvements, and with access to [Jeremy's] Makerbot he harnessed [...]
-
-
18:07
»
Packet Storm Security Exploits
EZ-ShoPwner version 0.1 is a pwning tool for EZ-Shop. It allows an attacker to extraction various data from the database and spawns shells through netcat and metasploit.
-
18:07
»
Packet Storm Security Recent Files
EZ-ShoPwner version 0.1 is a pwning tool for EZ-Shop. It allows an attacker to extraction various data from the database and spawns shells through netcat and metasploit.
-
18:07
»
Packet Storm Security Misc. Files
EZ-ShoPwner version 0.1 is a pwning tool for EZ-Shop. It allows an attacker to extraction various data from the database and spawns shells through netcat and metasploit.
-
-
16:11
»
Packet Storm Security Advisories
Apple Security Advisory 2011-08-03-1 - QuickTime version 7.7 has been made available to address multiple code execution, cross-origin, integer overflow, memory corruption, and other vulnerabilities.
-
16:11
»
Packet Storm Security Recent Files
Apple Security Advisory 2011-08-03-1 - QuickTime version 7.7 has been made available to address multiple code execution, cross-origin, integer overflow, memory corruption, and other vulnerabilities.
-
16:11
»
Packet Storm Security Misc. Files
Apple Security Advisory 2011-08-03-1 - QuickTime version 7.7 has been made available to address multiple code execution, cross-origin, integer overflow, memory corruption, and other vulnerabilities.
-
-
1:26
»
Packet Storm Security Exploits
Demonstration DLL hijacking code for Avira AntiVir Personal version 10.00.12, Free YouTube Download version 2.10, HTTrack Website Copier version 3.44, and Remote Desktop Connection.
-
1:26
»
Packet Storm Security Recent Files
Demonstration DLL hijacking code for Avira AntiVir Personal version 10.00.12, Free YouTube Download version 2.10, HTTrack Website Copier version 3.44, and Remote Desktop Connection.
-
1:26
»
Packet Storm Security Misc. Files
Demonstration DLL hijacking code for Avira AntiVir Personal version 10.00.12, Free YouTube Download version 2.10, HTTrack Website Copier version 3.44, and Remote Desktop Connection.
-
-
15:01
»
Hack a Day
We don’t know if our feature from a couple of days gave [Adrian] a kick in the pants, or if he was just on target to finish is writeup this week, but he’s posted about version 2 of his laser auto focus assist project. The original idea was to use an unfocused laser pointer dot to [...]
-
-
12:36
»
Packet Storm Security Exploits
Imagemagick version 6.6.8-5 with Libtiff version 6.9.4 appears to suffer from a buffer overflow vulnerability. Proof of concept .tif enclosed.
-
12:36
»
Packet Storm Security Misc. Files
Imagemagick version 6.6.8-5 with Libtiff version 6.9.4 appears to suffer from a buffer overflow vulnerability. Proof of concept .tif enclosed.
-
9:30
»
Hack a Day
Keepon, the adorable bot meant to help autistic kids with its jovial dance moves, seems to finally be getting a cheaper version. The original cost $30,000 and did a lot more than dance. Actually, we got to play with it a little bit at CES a couple years ago. The commercial version most likely won’t [...]
-
-
12:10
»
Packet Storm Security Exploits
Alt-N WebAdmin version 3.3.3 suffers from a remote source code disclosure vulnerability. Also affected is U-Mail for Windows version 9.8 and U-Mail GateWay for Windows version 9.8.
-
12:10
»
Packet Storm Security Recent Files
Alt-N WebAdmin version 3.3.3 suffers from a remote source code disclosure vulnerability. Also affected is U-Mail for Windows version 9.8 and U-Mail GateWay for Windows version 9.8.
-
12:10
»
Packet Storm Security Misc. Files
Alt-N WebAdmin version 3.3.3 suffers from a remote source code disclosure vulnerability. Also affected is U-Mail for Windows version 9.8 and U-Mail GateWay for Windows version 9.8.
-
-
18:24
»
SecuriTeam
A potential security vulnerability has been identified in HP Version Control Repository Manager (VCRM) for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
Skip to page:
1
2
3
...
5