exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2004-04-06

asleap-1.0.tgz
Posted Apr 7, 2004
Authored by Joshua Wright | Site asleap.sourceforge.net

Asleap is a tool that exposes the weaknesses in Cisco's LEAP protocol. It can read live from any wireless interface, can monitor a single channel, perform channel hopping to look for target networks running LEAP, will actively deauthenticate users on LEAP networks so they will be forced to reauthenticate, and more.

tags | tool, protocol, wireless
systems | cisco
SHA-256 | 4dc44be7567b4b2ddb253a6a70bb6a96f180f6b079ca0c5b3d7b33fefcdb9bdc
symantecVD.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Symantec Virus Detection is susceptible to a buffer overflow.

tags | advisory, overflow, virus
SHA-256 | 31a857797e3983ace0f26dc8e18ec9b0bc7e387b4858a2de50c91d2630b74419
mcafeefreescan.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Mcafee FreeScan is susceptible to buffer overflow and private information disclosure attacks.

tags | advisory, overflow, info disclosure
SHA-256 | 965b844a3cdf53e9218191c6a7f6de76daa2d357f51cad2f8a2e1a8cd4df2ca2
panda50.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Panda ActiveScan version 5.0 has a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | bb4d99560509598cb4f1c03ef93898aab049201920dcb2e36a4f8e75db55b32f
sharutil.txt
Posted Apr 6, 2004
Authored by Shaun Colley aka shaun2k2

A stack-based buffer overflow vulnerability exists in the popular shar utility packaged in the GNU sharutils distribution, due to a lack of bounds checking when handling the -o command-line option. By default, this file is not setuid nor setgid, but if used in conjunction with other tools, it is possible that this can be manipulated for nefarious purposes.

tags | advisory, overflow
SHA-256 | b6dceda7216ae56f8997fa05d3bb0b438c5ce4c248e40197d99a60a8f531c1c6
blaxxun3D.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

blaxxun3d Platform 7 is susceptible to a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | b7a2530778d78625e62544550d13ed956a7c096171f22fca7e63522ee4c5716e
FoundstoneCitrix.txt
Posted Apr 6, 2004
Authored by Vijay Akasapu, David Wong | Site foundstone.com

Foundstone Labs Advisory - Citrix MetaFrame Password Manager 2.0 has a flaw where it will locally store credentials unencrypted if the agent is not pointed to a central credential store.

tags | advisory
SHA-256 | 1c9632d94f5f40b0cc99ad07a73eaec4580053d25e6d9dafb7e2c377dbb5468b
GLSA20040401.txt
Posted Apr 6, 2004
Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200404-01 - A flaw has been found in the temporary file handling algorithms for the sandboxing code used within Portage. Lockfiles created during normal Portage operation of portage could be manipulated by local users resulting in the truncation of hard linked files; causing a Denial of Service attack on the system.

tags | advisory, denial of service, local
systems | linux, gentoo
SHA-256 | 827805dcda3188f92aa65e2f7210d6d2fa512f105b8baa91369883d9d206c28e
heimdal.html
Posted Apr 6, 2004
Site pdc.kth.se

Heimdal releases prior to 0.6.1 and 0.5.3 have a cross-realm vulnerability allowing someone with control over a realm to impersonate anyone in the cross-realm trust path.

tags | advisory
advisories | CVE-2004-0371
SHA-256 | 259dec0f92b706cac74eb9b8dc8d72650d17e97cbf936f9e2367234a60d97a99
Page 1 of 1
Back1Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close