accept no compromises
Showing 1 - 14 of 14 RSS Feed

Files Date: 2005-01-07

libvg-0.3.0.tar.gz
Posted Jan 7, 2005
Authored by Pluf | Site 7a69ezine.org

First public released of libvg, a runtime process manipulation library. Libvg was designed to provide a powerful and portable interface for writing non-complex programs that can get or change information of processes on the system.

tags | library
MD5 | 2407fff41b5a7aff53f95f2d638ca9b7
mac_v01.zip
Posted Jan 7, 2005
Authored by Gogu Gigi

MAC address modification utility for Windows 2000 / XP / 2003 Server.

systems | windows, 2k
MD5 | d02dc661b03005c109e03c5be8cde416
Secunia Security Advisory 13747
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Santiago Cortes has reported a vulnerability in Sugar Sales, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 67ad24f274c97864aea827a154d75cd0
isec-0021-uselib.txt
Posted Jan 7, 2005
Authored by Paul Starzetz | Site isec.pl

Locally exploitable flaws have been found in the Linux binary format loaders' uselib() functions that allow local users to gain root privileges. Linux kernel versions 2.4 up to and including 2.4.29-pre3, 2.6 up to and including 2.6.10 are affected. Exploit included.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2004-1235
MD5 | b8c1d99e53c3f8082e449457f5765447
amp2zero.zip
Posted Jan 7, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept denial of service exploit for the Amp II 3D game engine that is susceptible to attack when receiving UDP datagrams of zero bytes.

tags | exploit, denial of service, udp, proof of concept
MD5 | e0f740ad12e3040bbf0fbbd29c3adecc
amp2zero.txt
Posted Jan 7, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Amp II 3D game engine is susceptible to a denial of service attack when receiving UDP datagrams of zero bytes.

tags | advisory, denial of service, udp
MD5 | 34796b2fcdad58ef8e25b563e0d4cd78
jakarta556_xss.txt
Posted Jan 7, 2005
Authored by Oliver Karow | Site oliverkarow.de

Apache Jakarta Tomcat version 5.5.6 is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | 8d2da4e59e74ea24a42efaf5451139f6
Secunia Security Advisory 13725
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LSS Security Team has reported a weakness in mod_dosevasive for Apache, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
MD5 | a484df531485872140c58fc5ef268a04
phpbb.ssh.D.txt
Posted Jan 7, 2005
Authored by priv8crew

New version of the phpBB worm with bot install that makes use of Altavista.

tags | exploit, worm
MD5 | a85a8594d27153953b6a73ffdef9fac0
winaceHKI.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

WinAce WinHKI version 1.4d suffers from a directory traversal flaw that allows a compressed archive to overwrite files below the extraction directory.

tags | exploit
MD5 | df3b6d9cc21e72eda8409905d80e03a8
Secunia Security Advisory 13713
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Exim, which potentially can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system.

tags | advisory, local, vulnerability
MD5 | 094c598277672b8cb64c3e4a3976c13f
Secunia Security Advisory 13732
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has discovered two vulnerabilities in Jeuce Personal Web Server, which can be exploited by malicious people to disclose sensitive information and cause a DoS (Denial of Service).

tags | advisory, web, denial of service, vulnerability
MD5 | 432b4de4e1861fbb2c0f3beb4bff0857
Secunia Security Advisory 13718
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0ut3r has reported a vulnerability in b2evolution, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | e7fbc5d9ab449c03bccabaf842785e8d
symantecBO.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

A stack buffer overflow exists in all Symantec products in all versions until 2005.

tags | advisory, overflow
MD5 | 7338483f02f02ee1d0e5f214be2cc95a
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    9 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close