exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2004-04-12

waraxe-2004-SA018.txt
Posted Apr 12, 2004
Authored by Janek Vind aka waraxe

PHP-Nuke versions 6.x through 7.2 have a flaw that allows for administrator level authentication bypass.

tags | advisory, php
SHA-256 | e506b19ed8619a63fd70561c25235584398ff9dd2637205db300cc42e775de9e
waraxe-2004-SA017.txt
Posted Apr 12, 2004
Authored by Janek Vind aka waraxe

PHP-Nuke versions 6.x through 7.2 have a flaw that allows for user level authentication bypass.

tags | advisory, php
SHA-256 | 24b939d8a82382eed2da1caaffa8502f8d77754e47102fee8be0407d1a625590
MSIE.printer.txt
Posted Apr 12, 2004
Authored by Ben Garvey | Site bengarvey.com

Microsoft Internet Explorer 6.0 allows malicious Javascript to send documents to the printer without notifying the end user.

tags | exploit, javascript
SHA-256 | 2c2171de70fe2e714e0da33b8bb2b0a81c2a7c66e84b62519324f0117db82e8d
rkhunter-1.0.6.tar.gz
Posted Apr 12, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

Changes: Added support for about a dozen Unix variants.
tags | tool, shell, perl, integrity, rootkit
systems | unix
SHA-256 | 926446c2c104b8635df0371c77dac4f4eff5c0a9b76d63b44094f75ee97e3295
lids-2.2.0pre2-2.6.5.tar.gz
Posted Apr 12, 2004
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.

Changes: Release for 2.6.5. Added filesystem support, Enhanced ACL/searching performance, various other feature additions.
tags | kernel, root
systems | linux
SHA-256 | 7c83e2106826ddae1fcf6233ad7941c4ac157d1a92eaa396f5a0b4a11c263470
305monit.c
Posted Apr 12, 2004
Authored by Nilanjan De, Abhisek Datta | Site eos-india.net

Monit versions 4.2 and below remote exploit that makes use of a buffer overflow in the handling of basic authentication. Binds a shell to port 31337.

tags | exploit, remote, overflow, shell
SHA-256 | ba0446ecc2f07da2a2e4e121bf6475f2fd33ff6fdc434504fec164c267d88c3d
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close