what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2005-06-24

raw.c
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Fast httpd scanner that scans a block of IPs using a half open scan.

SHA-256 | 2defbdb4ab4e646551e3f5483833a3029ed3bac341a8d20e07d7d3da00941bc1
hide_lkm.tgz
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Tool to manipulate /dev/kmem (kernel memory) to completely hide LKMs. Tested on 2.4.x.

tags | kernel
SHA-256 | afad67bd1962d78e3fc466bb2136fbfb5d512592976a66548ebc68a60de238b3
Gentoo Linux Security Advisory 200504-30
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-30 - The phpMyAdmin installation process leaves the SQL install script with insecure permissions. Versions less than 2.6.2-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 2f14682c3d2c1ce53dc09035ebfa9852d3f37d2162c30a53ce2789161c0d33bd
Gentoo Linux Security Advisory 200504-29
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-29 - Steven Van Acker has discovered a buffer overflow vulnerability in the add_port() function in Pound. Versions less than 1.8.3 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 508acf6707fea998ce6f61a2d863c2f1364881a6c998ee20d344d408a8cedea3
Gentoo Linux Security Advisory 200504-28
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-28 - Buffer overflow vulnerabilities in the slc_add_reply() and env_opt_add() functions have been discovered by Gael Delalleau in the telnet client in Heimdal. Versions less than 0.6.4 are affected.

tags | advisory, overflow, vulnerability
systems | linux, gentoo
advisories | CVE-2005-0468, CVE-2005-0469
SHA-256 | 8f9785ac0de012dcf5e162da16f150a5a3fc8423a3b5bf8c8f0c7332c37b590a
koobi-cms423.txt
Posted Jun 24, 2005
Site security-tmp.net.ru

koobi-cms 4.2.3 is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 6bd4dc672ea366510896c4cecd7c7df7b8b5c4e357ceb00b84a6777bf1918209
dltrace-0.5.tar.bz2
Posted Jun 24, 2005
Site labs.idefense.com

iDEFENSE Labs is pleased to announce the release of dltrace, a portable dynamic library call tracer. dltrace attempts to remain portable to all x86 platforms which support the execution of ELF binaries and expose a debugging interface via procfs or the ptrace() system call. The shared library call tracing is done at a level which allows all calls to all exported symbols in loaded libraries to be traced. In addition, dltrace does not rely on specific rtld exports to retrieve library and symbol information and is capable of determining function arguments dynamically via run-time disassembly.

tags | x86
systems | unix
SHA-256 | af2778862bb15d5835935aefe4be1df15d536564b73ac5c65d96b716ed90fce4
Clam AntiVirus Toolkit 0.86.1
Posted Jun 24, 2005
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Bug fix release.
tags | virus
systems | unix
SHA-256 | 787cba086d32cc315a5b125b802f61d9a5a5a274eaa67dad5a9069d1bfe47d0c
zm-1.21.2.tar.gz
Posted Jun 24, 2005
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Minor bug fixes to 1.21.1.
tags | web
systems | linux
SHA-256 | 03058269a8c2f1db739da5e0b11273e4c3034af25c30eaa2f7a7e4b44c959fad
iDEFENSE Security Advisory 2005-06-23.5
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-5 - Remote exploitation of a heap-based buffer overflow vulnerability in the RealText file format parser within various versions of RealNetworks Inc.'s RealPlayer could allow attackers to execute arbitrary code. The vulnerability specifically exists because of a string copying operating into a fixed size heap buffer using the sprintf function. iDEFENSE Labs has confirmed that RealNetworks' RealPlayer 10.5 6.0.12.1056 on Windows and RealPlayer 10 and 10.0.1.436 on Linux are vulnerable.

tags | advisory, remote, overflow, arbitrary
systems | linux, windows
advisories | CVE-2005-1277
SHA-256 | df026c704e3ad34d1768b14092ad473096836595c1ffcde9e7933fe03348e7d9
iDEFENSE Security Advisory 2005-06-23.4
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-4 - Remote exploitation of an access validation vulnerability in Veritas Backup Exec for Windows provides attackers with 'Administrator' privileges over the target system's registry.

tags | advisory, remote, registry
systems | windows
advisories | CVE-2005-0771
SHA-256 | ab285af36fc9830fbc0a7b5f5e8ac6f339f5f74fb5e182a0d7517727e7f76b6e
iDEFENSE Security Advisory 2005-06-23.3
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-3 - Remote exploitation of a denial of service condition in Veritas Software Corp.'s Backup Exec allows attackers to crash the vulnerable service.

tags | advisory, remote, denial of service
advisories | CVE-2005-0772
SHA-256 | 0a9c433c89e531d25308929e144ba32635a04db53a759bc07bad31834203b95f
iDEFENSE Security Advisory 2005-06-23.2
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-2 - Exploitation of a buffer overflow vulnerability in Veritas Software Corp.'s Backup Exec allows remote attackers to execute arbitrary code. Veritas Backup Exec uses the standard NMDP protocol to communicate with the listening agents. The vulnerability specifically exists because of improper handling of request packets with an unexpected Error Status value.

tags | advisory, remote, overflow, arbitrary, protocol
advisories | CVE-2005-0772
SHA-256 | 34c571e007340cd8773d461ea89bbddc2583feac6bc71d7d8bc24b3d3f6939ab
iDEFENSE Security Advisory 2005-06-23.1
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-1 - Exploitation of a buffer overflow vulnerability in Veritas Software Corp.'s Backup Exec allows remote attackers to execute arbitrary code. Veritas Backup Exec uses the standard NMDP protocol to communicate with the listening agents. The NMDP protocol allows multiple authentication types, including support for Windows user credentials. The vulnerability specifically exists because of insufficient input validation on CONNECT_CLIENT_AUTH requests.

tags | advisory, remote, overflow, arbitrary, protocol
systems | windows
advisories | CVE-2005-0773
SHA-256 | 7e933c29fc49623bd4988caa2ab27aaf3de8ced4a8dcaa75b645a887c3a92529
eEye.vidplin.txt
Posted Jun 24, 2005
Authored by FlashSky | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in RealPlayer. The vulnerability allows a remote attacker to reliably overwrite heap memory with arbitrary data and execute arbitrary code in the context of the user who executed the player. This specific flaw exists within the vidplin.dll file used by RealPlayer. By specially crafting a malformed .avi movie file, a direct heap overwrite is triggered, and reliable code execution is then possible. This vulnerability can be trigger when a user views a webpage, or opens an .avi file via email, instant messenger, or other common file transfer programs.

tags | advisory, remote, arbitrary, code execution
SHA-256 | 847a8e37f9bd046455e0c8e37d152a9ed8be41d8c966b8aced5ac3d1b07ef988
Gentoo Linux Security Advisory 200506-22
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-22 - The sudoers file is used to define the actions sudo users are permitted to perform. Charles Morris discovered that a specific layout of the sudoers file could cause the results of an internal check to be clobbered, leaving sudo vulnerable to a race condition. Versions less than 1.6.8_p9 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 956caac77ca19fcbed67f3307b2e1888a5cfc98178b69387908bec83c22150f3
mssmb_poc.c
Posted Jun 24, 2005
Authored by cybertronic | Site livejournal.com

Windows SMB client transaction response handling exploit that makes use of the flaw detailed in MS05-011.

tags | exploit
systems | windows
advisories | CVE-2005-0045
SHA-256 | 0d73d261923b7c90d3028e70fa51daeba2ea05e4b77fb7d0913e15847c1ae886
nessQuick-v0.05.zip
Posted Jun 24, 2005
Authored by Randy M. Nash | Site atriskonline.com

NessQuick consists of perl scripts designed to assist in managing the output from Nessus scans and creating an alternate report format. These scripts help produce a report that lists all vulnerabilities and then enumerates each host that was found to contain that vulnerability. Pulls the .nbe files into a MySQL database.

Changes: Completely rewritten.
tags | tool, scanner, perl, vulnerability
systems | unix
SHA-256 | 754d5fb2206faa3724831290f3e79849d98b396cb1d37880095fb6ff425b8345
Secunia Security Advisory 13638
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged two vulnerabilities in Solaris, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | solaris
SHA-256 | 2c79d6297dee6c99845926558f29e68ede2cfcd30b3323a4cf1ac0c13b424798
Secunia Security Advisory 15783
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Elzar Stuffenbach has reported two vulnerabilities in Whois.Cart, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | 0690fac6ae1870b6e2ccaa06cf72cd35c2c9037bec00c58bf3bce5392cd00511
Secunia Security Advisory 15784
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James has reported a vulnerability in Simple Machines, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | cefc153dfd02f993f49fb711a45e2d7b445720fe6704bd1d15ad76eda201aa62
Secunia Security Advisory 15785
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SGI has acknowledged a vulnerability in IRIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | irix
SHA-256 | 4ea34ef44b3a59e40bf864693791767592303c7d6e0cfe32c49397af362eca71
Secunia Security Advisory 15786
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the Linux kernel. One has an unknown impact, and the other can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
SHA-256 | 14e0309e3c71683cd933a14d76ddb237d636e6716bc880cc1c1b79cf035c1eb3
Secunia Security Advisory 15789
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VERITAS Backup Exec for Windows and NetWare, which can be exploited by malicious users to gain escalated privileges, or by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | windows
SHA-256 | f00b7fabe22b59cf9fc63e982275ca337adc3beeab326ebd40e9ac3e9023736e
Secunia Security Advisory 15790
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in HP Version Control Repository Manager (VCRM), which may disclose the proxy server password to malicious people.

tags | advisory
SHA-256 | 903a5b4e6d31cc21f53113953988bc3895203ad8a9cf18863b4c29e3a636359c
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close