what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 93 RSS Feed

Files Date: 2004-12-11 to 2004-12-12

ssfakep.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Serious engine for games like Alpha Black Zero and Nitro family fails to limit the amount of new players joining a game, allowing for a denial of service. Only one UDP packet is needed to create a fake player.

tags | advisory, denial of service, udp
SHA-256 | 1d4d9d5101c652cd463fe24cc999f3991959494588e7a826a52df28c2c1a1133
winfingerprint-0.5.13.zip
Posted Dec 11, 2004
Authored by Vacuum | Site winfingerprint.sourceforge.net

Winfingerprint is a Win32 Host/Network Enumeration Scanner. Winfingerprint is capable of performing SMB, TCP, UDP, ICMP, RPC, and SNMP scans. Using SMB, winfingerprint can enumerate OS, users, groups, SIDs, password policies, services, service packs and hotfixes, NetBIOS shares, transports, sessions, disks, security event log, and time of day in either an NT Domain or Active Directory environment. Winfingerprint-cli is a command line version of winfingerprint and it is currently bundled with each release.

Changes: Dynamically link wpcap.dll and packet.dll. Winfingerprint will now again work without WinPcap although TCP SYN portscans will be unavailable. Automatically fall back to TCP non-blocking connect TCP scans if WinPcap is not available. Check out changelog for complete list.
tags | udp, tcp
systems | windows
SHA-256 | 4a336625213434a3182194ac1088dca70eba26241a153ed9271999150ac3e023
Gentoo Linux Security Advisory 200411-36
Posted Dec 11, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-36 - phpMyAdmin is vulnerable to cross-site scripting attacks. Versions below 2.6.0_p3 are susceptible.

tags | advisory, xss
systems | linux, gentoo
SHA-256 | 3fa6d61a17f65aef0fc13b15a5d049b51f701964bdf1c96d63fcab8787e1ecfb
phpnews.txt
Posted Dec 11, 2004
Authored by ruggine

Simple remote exploit for the SQL injection vulnerability discovered in PHPNews.

tags | exploit, remote, sql injection
SHA-256 | c5de8860494ec9c6c1f6fd843c7a558b1fee55f076ab1a36f0363084f66befb4
instantanea.pdf
Posted Dec 11, 2004
Authored by Nicolas Waisman | Site immunitysec.com

Security research discussing a new vulnerability discovered in WINS that allows for remote unauthenticated system access.

tags | advisory, remote
SHA-256 | b36dcc29c389916dbba601c7e517f5d4ec18f3aa881ccfebf4de339e949d0c61
phpbb2011.txt
Posted Dec 11, 2004
Authored by Zeelock

phpBB versions below 2.0.11 suffer from addition SQL injection and directory traversal flaws.

tags | exploit, sql injection
SHA-256 | 4d879cc6423df932290b6e1b7d9182c499c15eaf7502b726946c2a1b29356b16
pntresmailer.txt
Posted Dec 11, 2004
Authored by John Cobb

PnTresMailer code browser version 6.03 is susceptible to path disclosure and directory traversal attacks.

tags | exploit
SHA-256 | 0a17793363214eba0be0a9ddbc2c21299703b7751b93939842febb4de75a715c
Secunia Security Advisory 13319
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in YaBB, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | ab95c3c55be85ae0e8ca498fadff512c57499794b2dde161177e9c8b7ee07580
glFlow-0.1.1.tar.gz
Posted Dec 11, 2004
Authored by Vlad GALU | Site night.rdslink.ro

glFlow is a pcap-based traffic analysis tool intended for monitoring high speed links. The detection algorithm is based on realtime NetFlow traffic aggregation and analysis. The code is portable across platforms, it should work on every system with working md4/md5 and pcap implementations, with very little modifications.

Changes: The DSCP is printed out when there's an event. The IPs are printed in dotted notation rather than as unsigned long integers.
systems | cisco
SHA-256 | ae65c85f078fcd55f2924cc22ad11b6a1e9db36f0075977f6ca03135e9512385
Secunia Security Advisory 13317
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - cyber flash has discovered a vulnerability in Microsoft Internet Explorer, which can be exploited by malicious people to trick users into downloading malicious files.

tags | advisory
SHA-256 | 0831a126d00d18c5cdb07ba991a9671f8c66b5f06aed588fbc06b83745c69c47
bilbo-0.11.tar.gz
Posted Dec 11, 2004
Authored by Bart Somers | Site doornenburg.homelinux.net

Bilbo is a wrapper for nmap which makes it easier to scan lots of machines or networks.

Changes: Major rewrite. Now multithreaded and streamlined.
tags | tool, nmap
systems | unix
SHA-256 | f67baad0edc920a5ef76782a9c7d16549c2afe4cfab5e20080c6cc291b13b74f
phpCMS121.txt
Posted Dec 11, 2004
Authored by Cyrille Barthelemy | Site cyrille-barthelemy.com

phpCMS versions 1.2.1 and below suffer from information disclosure and cross site scripting flaws.

tags | advisory, xss, info disclosure
SHA-256 | 806a8881ffffbf74b2f09ca1f0f6f7b6e5099e5dc00aaa4a7873b39c8bc03b51
MDKSA-2004:140.txt
Posted Dec 11, 2004
Site mandrakesoft.com

Mandrake Linux Security Update Advisory - The GNU a2ps utility fails to properly sanitize filenames, which can be abused by a malicious user to execute arbitrary commands with the privileges of the user running the vulnerable application.

tags | advisory, arbitrary
systems | linux, mandrake
SHA-256 | afffec118e3c478b43f8bd4c296edd84d155a798b59d0a49364f43ef44813126
000102advisory.txt
Posted Dec 11, 2004
Authored by class101, Nima Majidi, idespinner | Site hat-squad.com

MailEnable Professional Edition version 1.52 and MailEnable Enterprise Edition version 1.01 both suffer from a remote buffer overflow in their IMAP service. Full exploit included.

tags | exploit, remote, overflow, imap
SHA-256 | 32c6ae1f1b84066439bf30e3587f50ec5f207c7c74e794bbd4f1278e559265ab
phpnolimit.c
Posted Dec 11, 2004
Authored by Gyan Chawdhary

Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.

tags | exploit, php
advisories | CVE-2004-0594
SHA-256 | 2c97cd1c958eda9cb6b3a5a97720fabb55603f0d0d23e1c106b84fb552ebbcfa
ezshopper.txt
Posted Dec 11, 2004
Authored by Zero-X | Site excluded.org

EZshopper is susceptible to a directory traversal attack. Exploitation included.

tags | exploit
SHA-256 | cbdb0c2b9acdabdbc38e91ad21b569d3defbbf86aa3ad3d5253a0b43f04f7d69
dsa-598.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 598-1 - Max Vozeler noticed that yardradius, the YARD radius authentication and accounting server, contained a stack overflow similar to the one from radiusd which is referenced as CVE-2001-0534. This could lead to the execution of arbitrary code as root.

tags | advisory, overflow, arbitrary, root
systems | linux, debian
advisories | CVE-2004-0987
SHA-256 | 9ecd3ad0354574b4685ff09a4dd7f47ca78960f6c3f1cf553472b4478e3b85fb
Secunia Security Advisory 13267
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cengiz Aykanat has reported a security issue in eTrust Antivirus, which can be exploited by malicious people to bypass certain security features.

tags | advisory
SHA-256 | e95ff9f50362359b5420a6cb73b82a1def018e97149d245d91d96bc18c046f35
mimedefang-2.49.tar.gz
Posted Dec 11, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Fixed documentation error and a few minor bug and logic fixes.
systems | windows, unix
SHA-256 | 9ff52d51fbc6ad8805f38be6d2a1a480cc1dd576b920302f003e355f51d7fa96
gsasl-0.2.2.tar.gz
Posted Dec 11, 2004
Authored by Simon Josefsson

GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.

Changes: Various minor fixes.
tags | imap, library
SHA-256 | 4d04cccf5955cba89c60775f76ef7bea4a91323b7a8ae92aba2af9e541092edb
motiontrack-0.1.3.tar.gz
Posted Dec 11, 2004
Authored by Corvus V Corax | Site motiontrack.sourceforge.net

Motiontrack is a set of tools that detects motion between two images. It is able to successfully distinguish random flicker from real object movement by applying a set of filters to the images, and can optionally ignore given colors and/or image regions. The roadmap provides for being able to identify objects by pattern detection and AI routines. Currently, this tool is able to turn line-art images into ASCII-art text as a demo feature.

Changes: Added SMP support.
systems | linux
SHA-256 | 57bd0e19f4e2a1bbb8c0e5b5143592d26f0d9fdd31f62ab6968c71a3f9e7d859
listener-0.6.tgz
Posted Dec 11, 2004
Authored by Folkert van Heusden | Site vanheusden.com

This program listens for sound. If it detects any, it starts recording automatically and also automatically stops when things become silent again.

Changes: One can now configure several parameters via the commandline.
systems | linux
SHA-256 | 98ad30a0ccb9efab33e61d565dd53b6922e3395876c772d0a65d5485bd65e57e
ipfreeze-0.4.9.tar.gz
Posted Dec 11, 2004
Authored by greg | Site savannah.nongnu.org

Ipfreeze is a program that listens to the netlink device. It takes the source address from every incoming packet and adds it to a Netfilter "blacklist" chain. The address is removed from this chain after a user-definable period of time. This allows you to create rules that detect and halt certain odd behaviors, such as ports scans, syn floods, or connection attempts on forbidden ports. The attacker's IP address is blacklisted using the QUEUE target. There is also a whitelist where you can declare hosts that you never want to be blacklisted.

tags | tool, firewall
systems | unix
SHA-256 | f7206f5b31442c0ea8a3e5a224b5daff709cf39a09762e25c8d5f222137dff07
umbrella-0.5.1.tar.bz2
Posted Dec 11, 2004
Site umbrella.sourceforge.net

The Umbrella security mechanism implements a combination of process-based Mandatory Access Control (MAC) and authentication of files through Digital Signed Binaries (DSB) for Linux based consumer electronics devices ranging from mobile phones to settop boxes. Umbrella is implemented on top of the Linux Security Modules (LSM) framework. The MAC scheme is enforced by a set of restrictions on each process. This policy is distributed with a binary in form of execute restrictions (in the file signature) and within the program, where the developer has the opportunity of making a restricted fork.

Changes: Fixed a memory allocation bug.
systems | linux
SHA-256 | 758b8186c67b0ff6cd3a876eac73982bc7f565f8dc006085cef3cd6c693ad264
placid-2.0.5.tar.gz
Posted Dec 11, 2004
Authored by Phillip Deneault | Site speakeasy.wpi.edu

Placid is a Web-based frontend for Snort that uses MySQL. It supports searching, sorting, and graphing of events, and was designed for speed and to have little overhead.

Changes: Bug fixes. Minor additions and changes.
tags | tool, web, sniffer
SHA-256 | 232304444140a229233a2a2f5ffa8372f4a9ca1473863c40183b8ccaded97bf6
Page 2 of 4
Back1234Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close