what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2004-04-06

asleap-1.0.tgz
Posted Apr 7, 2004
Authored by Joshua Wright | Site asleap.sourceforge.net

Asleap is a tool that exposes the weaknesses in Cisco's LEAP protocol. It can read live from any wireless interface, can monitor a single channel, perform channel hopping to look for target networks running LEAP, will actively deauthenticate users on LEAP networks so they will be forced to reauthenticate, and more.

tags | tool, protocol, wireless
systems | cisco
SHA-256 | 4dc44be7567b4b2ddb253a6a70bb6a96f180f6b079ca0c5b3d7b33fefcdb9bdc
symantecVD.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Symantec Virus Detection is susceptible to a buffer overflow.

tags | advisory, overflow, virus
SHA-256 | 31a857797e3983ace0f26dc8e18ec9b0bc7e387b4858a2de50c91d2630b74419
mcafeefreescan.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Mcafee FreeScan is susceptible to buffer overflow and private information disclosure attacks.

tags | advisory, overflow, info disclosure
SHA-256 | 965b844a3cdf53e9218191c6a7f6de76daa2d357f51cad2f8a2e1a8cd4df2ca2
panda50.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Panda ActiveScan version 5.0 has a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | bb4d99560509598cb4f1c03ef93898aab049201920dcb2e36a4f8e75db55b32f
sharutil.txt
Posted Apr 6, 2004
Authored by Shaun Colley aka shaun2k2

A stack-based buffer overflow vulnerability exists in the popular shar utility packaged in the GNU sharutils distribution, due to a lack of bounds checking when handling the -o command-line option. By default, this file is not setuid nor setgid, but if used in conjunction with other tools, it is possible that this can be manipulated for nefarious purposes.

tags | advisory, overflow
SHA-256 | b6dceda7216ae56f8997fa05d3bb0b438c5ce4c248e40197d99a60a8f531c1c6
blaxxun3D.txt
Posted Apr 6, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

blaxxun3d Platform 7 is susceptible to a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | b7a2530778d78625e62544550d13ed956a7c096171f22fca7e63522ee4c5716e
FoundstoneCitrix.txt
Posted Apr 6, 2004
Authored by Vijay Akasapu, David Wong | Site foundstone.com

Foundstone Labs Advisory - Citrix MetaFrame Password Manager 2.0 has a flaw where it will locally store credentials unencrypted if the agent is not pointed to a central credential store.

tags | advisory
SHA-256 | 1c9632d94f5f40b0cc99ad07a73eaec4580053d25e6d9dafb7e2c377dbb5468b
GLSA20040401.txt
Posted Apr 6, 2004
Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200404-01 - A flaw has been found in the temporary file handling algorithms for the sandboxing code used within Portage. Lockfiles created during normal Portage operation of portage could be manipulated by local users resulting in the truncation of hard linked files; causing a Denial of Service attack on the system.

tags | advisory, denial of service, local
systems | linux, gentoo
SHA-256 | 827805dcda3188f92aa65e2f7210d6d2fa512f105b8baa91369883d9d206c28e
heimdal.html
Posted Apr 6, 2004
Site pdc.kth.se

Heimdal releases prior to 0.6.1 and 0.5.3 have a cross-realm vulnerability allowing someone with control over a realm to impersonate anyone in the cross-realm trust path.

tags | advisory
advisories | CVE-2004-0371
SHA-256 | 259dec0f92b706cac74eb9b8dc8d72650d17e97cbf936f9e2367234a60d97a99
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close