what you don't know can hurt you
Showing 1 - 16 of 16 RSS Feed

Files Date: 2005-01-19

Posted Jan 19, 2005
Authored by DuskDruid | Site tcpick.sourceforge.net

tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.

Changes: Feature enhancements, various bug fixes and workarounds.
tags | tool, sniffer, tcp
MD5 | bb94f2f9ea81aeb645619fbe9b3b9a29
Posted Jan 19, 2005
Authored by Mark Seaborn | Site cs.jhu.edu

Plash (the Principle of Least Authority Shell) is a Unix shell that lets you run Unix programs with access only to the files and directories they need to run. In order to implement this, the filesystem is virtualized. Each process can have its own namespace, which can contain a subset of your files. Plash is implemented by modifying GNU libc and replacing the system calls that use filenames. For example, open() is changed so that it sends a message to a file server via a socket. If the request is successful, the server sends the client a file descriptor. Processes are run in a chroot jail under dynamically-allocated user IDs. No kernel modifications are required. Existing Linux binaries work unchanged.

tags | tool, shell, kernel
systems | linux, unix
MD5 | 860fda64f6cd95c7472fcb4c0a1cc6e6
Posted Jan 19, 2005
Authored by Pete Finnigan | Site petefinnigan.com

Abuse problems exist for the DIRECTORY object in Oracle. Patches have been released for this issue.

tags | advisory
MD5 | 803258067f733e8a856a457aa6a0a7c1
iDEFENSE Security Advisory 2005-01-18.t
Posted Jan 19, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.18.05 - Remote exploitation of a buffer overflow vulnerability in the xpdf PDF viewer included in multiple Unix and Linux distributions could allow for arbitrary code execution as the user viewing a PDF file. Version 3.00 is affected, possibly earlier revs as well.

tags | advisory, remote, overflow, arbitrary, code execution
systems | linux, unix
advisories | CVE-2005-0064
MD5 | cd9ba618d021a52a31157d9195bfe578
Posted Jan 19, 2005
Site sco.com

SCO Security Advisory - SCO has just come to terms with the fact that chroot jails can be broken out of.

tags | advisory
advisories | CVE-2004-1124
MD5 | ecfe697c76f391c282530a2991633fbe
Posted Jan 19, 2005
Authored by Valentin Avram

It appears that the Microsoft patch released to fix the HHCTRL.OCX vulnerability discussed in MS05-001 can still be exploited using other IE bugs that are not patched.

tags | advisory
MD5 | e8e7c9edc03c858823b43abe69069c07
Posted Jan 19, 2005
Site ngssoftware.com

NGSSoftware has discovered SQL injection and buffer overflow vulnerabilities in Oracle 10g and 9i database servers.

tags | advisory, overflow, vulnerability, sql injection
MD5 | 1c1c31a52f2d42ce6a4abb3d45aceeda
Posted Jan 19, 2005
Authored by thc, Johnny Cyberpunk | Site thc.org

Remote fingerprinting tool for Oracle and DB2 that allows for discovery of versions and OS information.

tags | remote
MD5 | c7864372da1e20d5aa25b8a8f210b74c
Posted Jan 19, 2005
Authored by Tan Chew Keong

NodeManager Professional 2.00 buffer overflow exploit that binds a shell to port 2001.

tags | exploit, overflow, shell
MD5 | d3ea564e89596c5826d835b8f712e9cc
Posted Jan 19, 2005
Site debian.org

Debian Security Advisory 644-1 - Danny Lungstrom discoverd a vulnerability in chbg, a tool to change background pictures. A maliciously crafted configuration/scenario file could overflow a buffer and lead to the execution of arbitrary code on the victim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-1264
MD5 | 12496d9f2e9feaf4f297bccb999e0e65
Posted Jan 19, 2005
Site debian.org

Debian Security Advisory 643-1 - jaguar of the Debian Security Audit Project has discovered several buffer overflows in queue, a transparent load balancing system.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2004-0555
MD5 | b9259d6d512eaddad1fd8e67a9bf50aa
Posted Jan 19, 2005
Authored by Marc Ruef | Site computec.ch

The Netegrity SiteMinder smpwservicescgi.exe is susceptible to a remote data inclusion vulnerability that allows for phishing attacks.

tags | exploit, remote
MD5 | 2d8ada3ab66ec8268d82e552fa2e164c
Posted Jan 19, 2005
Authored by Marc Ruef | Site computec.ch

The Novell GroupWise WebAccess error module handling has a flaw where a malicious attacker can circumvent the login procedure.

tags | advisory
MD5 | b0d1478da0d41ff19dbc734c7afca5ee
Posted Jan 19, 2005

Proof of concept local exploit for Exim version 4.41.

tags | exploit, local, proof of concept
MD5 | a710a65db5bce4ca9cedd2b3d59cc373
Posted Jan 19, 2005
Authored by ATmaCA | Site atmacasoft.com

Peer2Mail Encrypt passdumper exploit version 1.0. Versions 1.4 and below are affected. Tested on Win XP SP2.

tags | exploit
MD5 | e6376162f2a711928b65864775d81550
Posted Jan 19, 2005
Authored by The North American Lineage II Community

INCA nProtect Gameguard has a flaw where it allows for unrestricted I/O access.

tags | advisory
MD5 | 039aa93fdd22aa2f7142107830c8d559
Page 1 of 1

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    11 Files
  • 19
    Jun 19th
    1 Files
  • 20
    Jun 20th
    3 Files
  • 21
    Jun 21st
    2 Files
  • 22
    Jun 22nd
    21 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By