Exploit the possiblities
Showing 1 - 25 of 35 RSS Feed

Files Date: 2005-06-24

raw.c
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Fast httpd scanner that scans a block of IPs using a half open scan.

MD5 | 696e0eb2ff66e49b4d5fcde7be627389
hide_lkm.tgz
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Tool to manipulate /dev/kmem (kernel memory) to completely hide LKMs. Tested on 2.4.x.

tags | kernel
MD5 | 65cf16859b48ba2b575a48875f9b15fc
Gentoo Linux Security Advisory 200504-30
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-30 - The phpMyAdmin installation process leaves the SQL install script with insecure permissions. Versions less than 2.6.2-r1 are affected.

tags | advisory
systems | linux, gentoo
MD5 | b0239400f3f7ac89cbb6e8a815973a59
Gentoo Linux Security Advisory 200504-29
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-29 - Steven Van Acker has discovered a buffer overflow vulnerability in the add_port() function in Pound. Versions less than 1.8.3 are affected.

tags | advisory, overflow
systems | linux, gentoo
MD5 | 8f62feaa342c218bf76d8c457898e0ff
Gentoo Linux Security Advisory 200504-28
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-28 - Buffer overflow vulnerabilities in the slc_add_reply() and env_opt_add() functions have been discovered by Gael Delalleau in the telnet client in Heimdal. Versions less than 0.6.4 are affected.

tags | advisory, overflow, vulnerability
systems | linux, gentoo
advisories | CVE-2005-0468, CVE-2005-0469
MD5 | 5cc160cf60ddc9411478b10a8b0a5125
koobi-cms423.txt
Posted Jun 24, 2005
Site security-tmp.net.ru

koobi-cms 4.2.3 is susceptible to SQL injection attacks.

tags | exploit, sql injection
MD5 | 2d282b41826fd8de2c6834b8475f3ddd
dltrace-0.5.tar.bz2
Posted Jun 24, 2005
Site labs.idefense.com

iDEFENSE Labs is pleased to announce the release of dltrace, a portable dynamic library call tracer. dltrace attempts to remain portable to all x86 platforms which support the execution of ELF binaries and expose a debugging interface via procfs or the ptrace() system call. The shared library call tracing is done at a level which allows all calls to all exported symbols in loaded libraries to be traced. In addition, dltrace does not rely on specific rtld exports to retrieve library and symbol information and is capable of determining function arguments dynamically via run-time disassembly.

tags | x86
systems | unix
MD5 | ceb8465b010a871ffe5685d003eabaaa
Clam AntiVirus Toolkit 0.86.1
Posted Jun 24, 2005
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Bug fix release.
tags | virus
systems | unix
MD5 | df7116898cdd80ce56721a91e9cff206
zm-1.21.2.tar.gz
Posted Jun 24, 2005
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Minor bug fixes to 1.21.1.
tags | web
systems | linux
MD5 | cb4c6a65ed848f34b26723973345b732
iDEFENSE Security Advisory 2005-06-23.5
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-5 - Remote exploitation of a heap-based buffer overflow vulnerability in the RealText file format parser within various versions of RealNetworks Inc.'s RealPlayer could allow attackers to execute arbitrary code. The vulnerability specifically exists because of a string copying operating into a fixed size heap buffer using the sprintf function. iDEFENSE Labs has confirmed that RealNetworks' RealPlayer 10.5 6.0.12.1056 on Windows and RealPlayer 10 and 10.0.1.436 on Linux are vulnerable.

tags | advisory, remote, overflow, arbitrary
systems | linux, windows
advisories | CVE-2005-1277
MD5 | ad2db8df762c7436cf00bc629c002f4c
iDEFENSE Security Advisory 2005-06-23.4
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-4 - Remote exploitation of an access validation vulnerability in Veritas Backup Exec for Windows provides attackers with 'Administrator' privileges over the target system's registry.

tags | advisory, remote, registry
systems | windows
advisories | CVE-2005-0771
MD5 | 92b5a259c96e4153a4fe12af575291c2
iDEFENSE Security Advisory 2005-06-23.3
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-3 - Remote exploitation of a denial of service condition in Veritas Software Corp.'s Backup Exec allows attackers to crash the vulnerable service.

tags | advisory, remote, denial of service
advisories | CVE-2005-0772
MD5 | 67988eebd46bd46e3c888c5ba35c63f1
iDEFENSE Security Advisory 2005-06-23.2
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-2 - Exploitation of a buffer overflow vulnerability in Veritas Software Corp.'s Backup Exec allows remote attackers to execute arbitrary code. Veritas Backup Exec uses the standard NMDP protocol to communicate with the listening agents. The vulnerability specifically exists because of improper handling of request packets with an unexpected Error Status value.

tags | advisory, remote, overflow, arbitrary, protocol
advisories | CVE-2005-0772
MD5 | d4ed790537cfa8e8f617f87ea657b7c5
iDEFENSE Security Advisory 2005-06-23.1
Posted Jun 24, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.23.05-1 - Exploitation of a buffer overflow vulnerability in Veritas Software Corp.'s Backup Exec allows remote attackers to execute arbitrary code. Veritas Backup Exec uses the standard NMDP protocol to communicate with the listening agents. The NMDP protocol allows multiple authentication types, including support for Windows user credentials. The vulnerability specifically exists because of insufficient input validation on CONNECT_CLIENT_AUTH requests.

tags | advisory, remote, overflow, arbitrary, protocol
systems | windows
advisories | CVE-2005-0773
MD5 | 2a328240f5473b0d8181336f8a8099e9
eEye.vidplin.txt
Posted Jun 24, 2005
Authored by FlashSky | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in RealPlayer. The vulnerability allows a remote attacker to reliably overwrite heap memory with arbitrary data and execute arbitrary code in the context of the user who executed the player. This specific flaw exists within the vidplin.dll file used by RealPlayer. By specially crafting a malformed .avi movie file, a direct heap overwrite is triggered, and reliable code execution is then possible. This vulnerability can be trigger when a user views a webpage, or opens an .avi file via email, instant messenger, or other common file transfer programs.

tags | advisory, remote, arbitrary, code execution
MD5 | 9e857c76cd23e6dad382b54e79dd7218
Gentoo Linux Security Advisory 200506-22
Posted Jun 24, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-22 - The sudoers file is used to define the actions sudo users are permitted to perform. Charles Morris discovered that a specific layout of the sudoers file could cause the results of an internal check to be clobbered, leaving sudo vulnerable to a race condition. Versions less than 1.6.8_p9 are affected.

tags | advisory
systems | linux, gentoo
MD5 | 7d7c24b7394e11d5aaae7c299fb2f7e3
mssmb_poc.c
Posted Jun 24, 2005
Authored by cybertronic | Site livejournal.com

Windows SMB client transaction response handling exploit that makes use of the flaw detailed in MS05-011.

tags | exploit
systems | windows
advisories | CVE-2005-0045
MD5 | 7b7b92ef6de49bb01c9943401145c68e
nessQuick-v0.05.zip
Posted Jun 24, 2005
Authored by Randy M. Nash | Site atriskonline.com

NessQuick consists of perl scripts designed to assist in managing the output from Nessus scans and creating an alternate report format. These scripts help produce a report that lists all vulnerabilities and then enumerates each host that was found to contain that vulnerability. Pulls the .nbe files into a MySQL database.

Changes: Completely rewritten.
tags | tool, scanner, perl, vulnerability
systems | unix
MD5 | 08efea8a480625f404dcdb31ce8b86cb
Secunia Security Advisory 13638
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged two vulnerabilities in Solaris, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | solaris
MD5 | 617dc86d892c445759e2062a9d14a514
Secunia Security Advisory 15783
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Elzar Stuffenbach has reported two vulnerabilities in Whois.Cart, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
MD5 | 7a1349161a633b0205522717adda155f
Secunia Security Advisory 15784
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James has reported a vulnerability in Simple Machines, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 7e1e067ca3cc7c3cbec091d656073665
Secunia Security Advisory 15785
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SGI has acknowledged a vulnerability in IRIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | irix
MD5 | 6a0edbd0189a31d0478a17ad21884b5f
Secunia Security Advisory 15786
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the Linux kernel. One has an unknown impact, and the other can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
MD5 | 32f734c20c0fa286f8b498bbe4fabea5
Secunia Security Advisory 15789
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VERITAS Backup Exec for Windows and NetWare, which can be exploited by malicious users to gain escalated privileges, or by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | windows
MD5 | 85901a0e5107c72f3904754a062f1fcb
Secunia Security Advisory 15790
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in HP Version Control Repository Manager (VCRM), which may disclose the proxy server password to malicious people.

tags | advisory
MD5 | 994f34c11747fa9e90ed7ac7b99059b4
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close