exploit the possibilities
Showing 1 - 21 of 21 RSS Feed

Files Date: 2005-06-20

Gentoo Linux Security Advisory 200506-7
Posted Jun 20, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-07 - The curses_msg function of Ettercap's Ncurses-based user interface insecurely implements formatted printing. Versions less than 0.7.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-1796
MD5 | bf142a158d8d242059f236812a2ab8c1
Gentoo Linux Security Advisory 200506-6
Posted Jun 20, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-06 - Xpdf is vulnerable to multiple overflows, as described in GLSA 200501-28. Also, integer overflows were discovered in Real and PNG extractors. Versions less than 0.5.0 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-0064
MD5 | 84ac68d6ca33bd33685dabaa8a02bcc6
Posted Jun 20, 2005
Authored by Adam Funk

Leafnode versions 1.11.2 and below are susceptible to a denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2005-1911
MD5 | 17e9b9758a821d3ab16fe0eeba294ed5
Posted Jun 20, 2005
Site fishnetsecurity.com

Various voice VLAN access and abuse is possible on Cisco voice-enabled 802.1x-secured interfaces.

tags | advisory
systems | cisco
MD5 | e19fb405fd73835cd8c98c288bbf650d
Posted Jun 20, 2005
Authored by hack_912

The Loki download manager is susceptible to SQL injection attacks.

tags | exploit, sql injection
MD5 | 9caea66bc21bc83d132af820079d3a1d
Gentoo Linux Security Advisory 200506-5
Posted Jun 20, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-05 - The SilverCity package installs three executable files with insecure permissions. Versions less than 0.9.5-r1 are affected.

tags | advisory
systems | linux, gentoo
MD5 | bcf78cffe9b82f0f9d82b0ac6861e904
Ubuntu Security Notice 137-1
Posted Jun 20, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-137-1 - Alexander Nyberg discovered that ptrace() insufficiently validated addresses on the amd64 platform so that it was possible to set an invalid segment base. A local attacker could exploit this to crash the kernel. This does not affect the i386 and powerpc platforms in any way. Chris Wright discovered that the mmap() function could create illegal memory maps (using the "mmap" function) with the start address pointing beyond the end address. A local user could exploit this to crash the kernel or possibly even execute arbitrary code with kernel privileges.

tags | advisory, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2005-1265, CVE-2005-0756
MD5 | 81d76f32f731ff83e0d86cbc462e5846
Posted Jun 20, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

GoodTech SMTP Server for Windows NT/2000/XP version 5.14 is susceptible to a denial of service vulnerability.

tags | exploit, denial of service
systems | windows, nt
MD5 | 865e9cb2d4c6232438f6ab88a1e22c39
Posted Jun 20, 2005
Authored by Esteban Martinez Fayo | Site appsecinc.com

A remote buffer overflow exists in the WebSphere application server administrative console.

tags | advisory, remote, overflow
MD5 | 6fca1d4e261e41b6022cbc40671da00a
Posted Jun 20, 2005
Authored by Ilya Rabinovich

The Kaspersky AntiVirus klif.sys is susceptible to a privilege escalation vulnerability.

tags | advisory
MD5 | 4f9ac64118d4c1ca263ea98a5be5c09c
Posted Jun 20, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

tags | local
systems | unix
MD5 | 5435e92c92c8c8142b7030958069e616
TOR Virtual Network Tunneling Tool
Posted Jun 20, 2005
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: A good amount of bug fixes and performance improvements. Check out the changelog for full details.
tags | tool, remote, local, peer2peer
MD5 | a7d27084ebe3f407c0c3fdaf61fb5631
Posted Jun 20, 2005
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Various new features and bug fixes.
tags | web
systems | linux
MD5 | 37c294f02d5ba229db4ef77cc56b9cf2
Posted Jun 20, 2005
Authored by lekernel | Site lekernel.lya-fr.com

PictoSniff allows you to spy live on PictoChat communications between Nintendo DS gaming consoles. It requires an 802.11 device with support for monitor mode and Radiotap (tested only under FreeBSD with the p54u driver). It is based upon GTK2 and libpcap.

tags | tool, scanner
systems | unix, freebsd
MD5 | 9f5bd75755f9534a727f842ca073b684
Posted Jun 20, 2005
Authored by Kevin Johnson | Site sourceforge.net

BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.

tags | tool, web, sniffer
MD5 | e47ce74de5c84ce747441e319e44bf77
Posted Jun 20, 2005
Authored by Bartek Krajnik | Site bmk.bz

authfail is a tool for adding IP addresses to an ACL when entities from those addresses attempt to log into a system, but cause authentication failures in auth.log. It reads data from auth.log in real time and adds the IP into netfilter with a DROP/REJECT policy.

Changes: Couple of modifications made.
tags | tool, firewall
systems | linux
MD5 | bb065fd39530df8c3ccfec10e63a8328
Posted Jun 20, 2005
Authored by SmithJ108 | Site snortsms.servangle.net

SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.

Changes: Various bug fixes.
tags | tool, web, sniffer
MD5 | 4b34ff0191975fc202356e734254a33e
Posted Jun 20, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Suppress useless opening of /dev/random.
tags | tool, remote, firewall
systems | unix
MD5 | d1b332420761385e172c1cca6b55e27b
Posted Jun 20, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: ALBERTI cipher implemented. Jeffer-Lewis cipher implemented. Updated man page.
tags | encryption
MD5 | 67aab1bc5e84ef118ed35d207b59ab90
Posted Jun 20, 2005
Authored by Stephan Martin | Site tinyca.sm-zone.net

TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.

Changes: Minor bug fixes.
tags | perl, encryption
MD5 | aa9221737e96dd7d7be24bfbe61e1277
Posted Jun 20, 2005
Authored by SP Research Labs | Site security-protocols.com

AOL Instant Messenger (AIM) buddy icon ateimg32.dll is susceptible to a denial of service vulnerability.

tags | advisory, denial of service
MD5 | c4afde86b3eed0cb3d638cdebaa629ff
Page 1 of 1

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By