exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2005-01-06

ifchk-0.95b3.tar.gz
Posted Jan 6, 2005
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Minimal updates.
systems | unix
SHA-256 | ce7f6a107c0e49df5ee8181fc2d13b8ed5da34db9446020cac7c1f8f82df3397
Next Generation Security Advisory 205012005I
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005I - IBM's DB2 database server contain four XML functions that can be used to read and write files on the system. Systems Affected: DB2 8.1.

tags | advisory
SHA-256 | b96a26b299af6b8dfd51f75246b6c5b612402295c834c9712ad99334ce4a205f
Next Generation Security Advisory 205012005H
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005H - IBM's DB2 database server contain four XML functions that suffer from stack based buffer overflow vulnerabilities. Systems Affected: DB2 8.1.

tags | advisory, overflow, vulnerability
SHA-256 | 9a5db27238d552f7b43a081f1565127b3d1b829c519051fd7154784b75627dc8
Next Generation Security Advisory 205012005G
Posted Jan 6, 2005
Authored by NGSSoftware, Chris Anley | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005G - IBM DB2 is vulnerable to denial of service conditions when processing certain function calls. Systems Affected: DB2 8.1.

tags | advisory, denial of service
SHA-256 | f3c908713847b92460a5a7d99df17b60b369dd3c656c7cfc290d0f990ee42c85
Next Generation Security Advisory 205012005F
Posted Jan 6, 2005
Authored by NGSSoftware, Chris Anley | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005F - Almost all shared memory sections and events in the Windows version of DB2 have weak permissions; all sections can be read and written by Everyone, and all events can be set and waited on by Everyone. This results in a number of security issues relating to the privileges of local users. Systems Affected: DB2 8.1.

tags | advisory, local
systems | windows
SHA-256 | 710a1b87f503f48ddd770bd0d5c49acdd7ab71124cf9f67ce6157ca99e17f3fc
Next Generation Security Advisory 205012005E
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005E - IBM's DB2 database server, when configured for Satellite Administration includes a number of SQL functions. One of these, the SATENCRYPT function, suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1.

tags | advisory, overflow
SHA-256 | 7d386e3e0437c1c85d6802b327e3efb8a9fa4ca901feee75516c9820b611581d
Next Generation Security Advisory 205012005D
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005D - IBM's DB2 JDBC Applet Server suffers from a stack based buffer overflow vulnerability that can be exploited remotely without a user ID or password. Systems Affected: DB2 8.1.

tags | advisory, overflow
SHA-256 | f1b0c032caaaca34c6de39e4209280e534786f0ddb5e39bce1e00bd9d05f0ca7
Next Generation Security Advisory 205012005C
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005C - IBM's DB2 database server suffers from a stack based buffer overflow vulnerability when using call. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
SHA-256 | 75e7cc2f74b9c5d19bd9e5a521176de0f8c998d0326b2e48c27a990f35438cf9
Next Generation Security Advisory 205012005B
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005B - libdb2.so.1, one of the libraries supplied with IBM's DB2 database server suffers from a buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
SHA-256 | a81f720fbef9bf57c906d4ba4a8c6424583a17436daff3676135f7916fd24c36
Next Generation Security Advisory 205012005A
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005A - IBM's DB2 database server suffers from a local attack whereby passing an overly parameter to the db2fmp binary will overflow a stack based buffer. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow, local
SHA-256 | b4c01bb875e8e863804f2afe3c1a596a966e1de1a34b6e4081a98bc4bc0a23a1
sql-injection.html
Posted Jan 6, 2005
Authored by Steve Friedl | Site unixwiz.net

Whitepaper discussing SQL injection attacks that gives an illustrated overview showing the process of how these attacks are performed.

tags | paper, sql injection
SHA-256 | 6919bd7b19365fb970cbb380dd2326a04eff29ffa171b4193991ff4c5c8b30d1
Secunia Security Advisory 13709
Posted Jan 6, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pierquinto Manco has reported a vulnerability in FlatNuke, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | ba8b84fe43e98e20552a5040815d2789ab738d2c046f294e7059f6a873f0b74b
un-htget_0.9x.txt
Posted Jan 6, 2005
Authored by nekd0 | Site unl0ck.void.ru

Local root exploit for htget versions 0.9.x and below.

tags | exploit, local, root
SHA-256 | b00f0adbb375360a412bc0c36539c6f346a47598682b2be9741666ecb5fe30b7
Gentoo Linux Security Advisory 200501-3
Posted Jan 6, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-03 - Various vulnerabilities were found and fixed in Mozilla-based products, ranging from a potential buffer overflow and temporary files disclosure to anti-spoofing issues.

tags | advisory, overflow, spoof, vulnerability
systems | linux, gentoo
SHA-256 | 3a382f2b5cdecc73c0e1b733116e72207c725296d0da07a4dd1c5d600fceada3
dsa-624.txt
Posted Jan 6, 2005
Site debian.org

Debian Security Advisory 624-1 - A buffer overflow has been discovered in zip, the archiver for .zip files. When doing recursive folder compression the program did not check the resulting path length, which would lead to memory being overwritten. A malicious person could convince a user to create an archive containing a specially crafted path name, which could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-1010
SHA-256 | 80eb0fe00f369ec72d22068be95a49b49a010283eb4ed8df1df52030453ba699
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close