what you don't know can hurt you
Showing 1 - 16 of 16 RSS Feed

Files Date: 2004-08-12

kernsh-0.2c.tar.gz
Posted Aug 12, 2004
Authored by Kernsh Project | Site kernsh.org

This utility was written to allow for easy access to the kernelspace for testing insertion of modules, accessing miscellaneous kernel information, and allows for an easy test environment.

Changes: Various enhancements and fixes.
tags | tool, kernel
systems | unix
MD5 | 80fa29519bad9af3f6db32ff4b22e51d
freedom.c
Posted Aug 12, 2004
Authored by Gyan Chawdhary

Remote CVS exploit for versions 1.11.15 and below that makes use of the Argumentx error_prog_name double free heap overflow on RedHat 8.0.

tags | exploit, remote, overflow
systems | linux, redhat
advisories | CVE-2004-0396
MD5 | 45a646b9d1ea639efc598b6a5d0a9c1b
HexView Security Advisory 0811-20-04.1
Posted Aug 12, 2004
Authored by HexView, Thomas Ryan, Paul Craig

BlackIce Server Protect versions 3.6cno and below from Internet Security Systems installs a firewall ruleset that can be removed or modified by any trusted or local unprivileged user.

tags | advisory, local
MD5 | 0eef793b3c7c3fea0a7027ca07b5e177
TSA-051.txt
Posted Aug 12, 2004
Authored by Samy Kamkar, Lance James, Dachb0den Labs | Site securescience.net

Secure Science Corporation Advisory TSA-051 - T-mobile Wireless and Verizon Northwest are vulnerable to caller-ID authentication spoofing, enabling arbitrary compromise of customer voicemail/message center.

tags | advisory, arbitrary, spoof
MD5 | ca8ed41a88fe1fceaa6ab6c3f3d637e7
KDE Security Advisory 2004-08-11.3
Posted Aug 12, 2004
Authored by KDE Desktop | Site kde.org

KDE Security Advisory - The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open. A malicious website could abuse Konqueror to insert its own frames into the page of an otherwise trusted website. As a result the user may unknowingly send confidential information intended for the trusted website to the malicious website.

tags | advisory
advisories | CVE-2004-0721
MD5 | ebdde55dbc6bfb05aac19e72f83bee1c
KDE Security Advisory 2004-08-11.2
Posted Aug 12, 2004
Authored by KDE Desktop | Site kde.org

KDE Security Advisory - The Debian project was alerted that KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application. Affected are version KDE 3.2.x up to KDE 3.2.3 inclusive.

tags | advisory, local
systems | linux, debian
advisories | CVE-2004-0690
MD5 | 586cb120613346465749ca546dd7eed2
KDE Security Advisory 2004-08-11.1
Posted Aug 12, 2004
Authored by KDE Desktop | Site kde.org

KDE Security Advisory - The SUSE security team was alerted that in some cases the integrity of symlinks used by KDE are not ensured and that these symlinks can be pointing to stale locations. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly (Denial of Service). All versions of KDE up to KDE 3.2.3 inclusive.

tags | advisory, denial of service, arbitrary, local
systems | linux, suse
advisories | CVE-2004-0689
MD5 | 5e936e04e596ff5e7b7f27abebeb6c7e
aircrack-1.1.tgz
Posted Aug 12, 2004
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Multi-processor support, bug fixed BSSID check, and added a better fudging algorithm.
tags | tool, wireless
MD5 | 548dc9c261c61b03e2d3ef703f5775a7
Secunia Security Advisory 12270
Posted Aug 12, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has reported a vulnerability in Shuttle FTP Suite 3.x, which can be exploited by malicious people to read or place files in arbitrary locations on a vulnerable system.

tags | advisory, arbitrary
MD5 | c82b1b92efa906dad24b68f93ad9905d
clearswift.txt
Posted Aug 12, 2004
Authored by Pierre Kroma

Clearswift Minesweeper versions 5.0.4 and below suffer from a directory traversal vulnerability.

tags | exploit
MD5 | dc37e70ddc28a9c0cce597f6802a774e
ptl-2004-03.txt
Posted Aug 12, 2004
Authored by Matt Moore, Mark Rowe | Site pentest.co.uk

An unauthenticated remote attacker can submit various malformed service requests via Bluetooth, triggering a buffer overflow and executing arbitrary code on vulnerable devices using WIDCOMM Bluetooth Connectivity Software. All releases prior to 3.0 are affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0775
MD5 | bfed25095a7e4597170fa58ba13ae4a0
msowa55.txt
Posted Aug 12, 2004
Authored by Amit Klein | Site sanctuminc.com

Microsoft Outlook Web Access (OWA) for Exchange 5.5 is vulnerable to an HTTP Response Splitting attack.

tags | advisory, web
MD5 | 8bf66d3a4df3ada9dac211e1232790e8
pngslap.c
Posted Aug 12, 2004
Authored by infamous42md

Exploit that makes use of the flaw in libpng versions 1.2.5 and below.

tags | exploit
MD5 | 6f73c9777a9de956305785d7d940d747
Secunia Security Advisory 12269
Posted Aug 12, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in IceWarp 1.x through 5.x Web Mail, which can potentially be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, access sensitive information, and manipulate the file system.

tags | advisory, web, vulnerability, xss, sql injection
MD5 | 7c144959b5c1ba033aa319ccb58a3f81
snort-2.2.0.tar.gz
Posted Aug 12, 2004
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Bug fixes.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
MD5 | 6194278217e4e3f733b046256a31f0e6
rkhunter-1.1.5.tar.gz
Posted Aug 12, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Discovers the Ni0 rootkit, and has some new tests. Fixes the xinetd.conf false positive and other minor bugs, improved version checker, and updated the databases.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 750df8c8ab7855bc81ba10504694a33a
Page 1 of 1
Back1Next

File Archive:

March 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    2 Files
  • 2
    Mar 2nd
    18 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    12 Files
  • 5
    Mar 5th
    19 Files
  • 6
    Mar 6th
    8 Files
  • 7
    Mar 7th
    1 Files
  • 8
    Mar 8th
    1 Files
  • 9
    Mar 9th
    11 Files
  • 10
    Mar 10th
    15 Files
  • 11
    Mar 11th
    9 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    13 Files
  • 14
    Mar 14th
    10 Files
  • 15
    Mar 15th
    13 Files
  • 16
    Mar 16th
    27 Files
  • 17
    Mar 17th
    15 Files
  • 18
    Mar 18th
    23 Files
  • 19
    Mar 19th
    25 Files
  • 20
    Mar 20th
    10 Files
  • 21
    Mar 21st
    6 Files
  • 22
    Mar 22nd
    1 Files
  • 23
    Mar 23rd
    22 Files
  • 24
    Mar 24th
    15 Files
  • 25
    Mar 25th
    22 Files
  • 26
    Mar 26th
    20 Files
  • 27
    Mar 27th
    15 Files
  • 28
    Mar 28th
    10 Files
  • 29
    Mar 29th
    1 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close