exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2004-08-09

Xines_Mine.c
Posted Aug 9, 2004
Authored by c0ntex | Site open-security.org

Xine v0.99.2 remote stack overflow exploit. A overflow in all versions of xine-lib allow the vcd:// input source to execute arbitrary code, even if the file is .mp3, .mpeg, .mpg or .avi media. Fix available (currently only in the cvs xine-lib) here.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 32955c3e74badabf60efcd97d31761b9fa8bfd32d260deb331486ed610d1a87d
dump2code-0.2.tgz
Posted Aug 9, 2004
Authored by newbug | Site chroot.org

Dump2code is an ELF file section reader that allows you to dump any executable section, such as .interp, .dtors, .text, etc, from binary code to hex code.

tags | shellcode
SHA-256 | 02e4221d141f634e535b986413a1fb59b4f7f15a334932f0e73b7c8cf95d095f
Aim.DoS.8_9.pdf
Posted Aug 9, 2004
Authored by Ryan McGeehan, Kevin Benes | Site TheBillyGoatCurse.com

A buffer overflow vulnerability has been discovered in AOL Instant Messenger 5.x that can allow for arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 29f13f59caac1ab84f3df01e8a06deb1d8cdc62ada4a2048e3186f5dbe2a3dd0
cvstrac.txt
Posted Aug 9, 2004
Authored by Richard Ngo

CVSTrac versions 1.x have an input validation flaw that allows for arbitrary command execution.

tags | exploit, arbitrary
SHA-256 | a4fbbe43075d15f6f1f2aa3f8a3d21cf99c42b351348d35ac984950bd03c8bc6
upnpboom.c
Posted Aug 9, 2004
Authored by anonymous

UPNP mass infector exploit.

tags | exploit
SHA-256 | 18e0f419929aa859e5a7ec066be1b57c720c219044cd322fe7335ffc7841c819
libnids-1.19.tar.gz
Posted Aug 9, 2004
Authored by Nergal | Site libnids.sourceforge.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit, and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: Multiple bug fixes.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | 788882607cb35eaf005525af3f7ee8e6c99f98d76ef9daf48fc6388af9f7ab31
rkhunter-1.1.4.tar.gz
Posted Aug 9, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Now supports Debian 3.1, FreeBSD 4.10, SunOS, OpenBSD 3.5, and White Box EL. Adds boot.local/Apache2/mod_rootme support and an application scanner. Display-logfile option was added. Fixes bugs and improves some tests.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | 39925a2882b60cffb5673663f256429064eb325ad4c13c93ab41f6d2db9d592e
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close