exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2002-06-03 to 2002-06-04

CA-2002-14.jrun
Posted Jun 3, 2002
Site cert.org

CERT Advisory CA-2002-14 - A remotely exploitable buffer overflow in Macromedia JRun v3.0 and 3.1 when running with IIS 4 or 5 allows remote attackers to execute code with SYSTEM privileges. According to Macromedia, JRun is deployed at over 10,000 organizations worldwide.

tags | remote, overflow
SHA-256 | cee2fc10d87afb680259c6f67e016f6345d10f40911ebac451a3ef50ee172dd7
syscalltrack-0.71.tar.gz
Posted Jun 3, 2002
Site syscalltrack.sourceforge.net

Syscall Tracker is a very powerful tool for Linux 2.2 and 2.4 which allows you to write rules to track system calls. It includes a kernel module plus a userspace applications. Currently only logging the invocation is supported, but in the future, you will be able to fail the system call (i.e. force it to return some error code), or suspend the process executing it. Allows you find out info that is hard to find, for instance to determine which process touched a certain file.

Changes: Support was added for constants when specifying matching rules, for example, O_RDONLY, O_EXCL, and friends for open(2). Support was added for octal/hex numbers in filter expressions. Assorted internal cleanups, code refactoring, bugfixes, and memory leak plugs were done.
tags | kernel
systems | linux
SHA-256 | 3c662bd4b93a91c6be40a21fe63190ffe5e64e9a9a64d6002b2c872c579a39b1
telhack-shambala.txt
Posted Jun 3, 2002
Authored by Daniel Nystrum

A directory traversal vulnerability found in Shambala v4.5 can lead to the disclosure of files that are stored outside the served directories. More info on this bug available here.

SHA-256 | 792ce8a4307b49251659094a08eb30bb916bc5d232a44e48c27fb7fa5360260f
MDKSA-2002:037-1
Posted Jun 3, 2002
Authored by Mandrake Linux Security Team | Site mandrakesecure.net

Mandrake Linux security advisory MDKSA-2002:037-1 - ISC DHCPD in its version 3 introduced new dns-update features. ISC DHCPD v3.0 to 3.0.1rc8 is vulnerable to a remote root format string bug attack, while reporting the result of a dns-update request.

tags | remote, root
systems | linux, mandrake
SHA-256 | 42232836f0d3fb1ef90a2677417ea2433081cd0f3beee7cf19875a6a8511d9c2
CSSA-2002-SCO.23
Posted Jun 3, 2002
Authored by Caldera | Site stage.caldera.com

Caldera Security Advisory CSSA-2002-SCO.23 - A vulnerability found in the Open UNIX and UnixWare FTP daemon can allow remote attackers to hijack passive FTP data connections.

tags | remote
systems | unix, unixware
SHA-256 | 2ba86861d069c9bc17521caaefcb7ca1c5ad9ae7377ab0c78f4293019c0c4363
MDKSA-2002:034
Posted Jun 3, 2002
Authored by Marcell Fodor, Mandrake Linux Security Team | Site mandrakesecure.net

Mandrake Linux security advisory MDKSA-2002:034 - A remote overflow found in the WU-IMAP daemon v2001a and below affects Mandrake 7.1, 7.2, 8.1, 8.2 and Corporate Server 1.0.1.

tags | remote, overflow, imap
systems | linux, mandrake
SHA-256 | ccb9e4f0cf15f78cf499d5204b26c83fea31cfd471f6bf7d99bdaded7df24b9e
CLA-2002:490
Posted Jun 3, 2002
Site distro.conectiva.com.br

Conectiva Security Advisory CLA-2002:490 - Several vulnerabilities were found in the Mozilla package v1.0rc1 which allows hostile web sites to read and list local files. The vulnerability was related to the XMLHTTP, a component that is primarily used for retrieving XML documents from a web server. Fixed packages have now been released for Conectiva Linux 6.0, 7.0, and 8.

tags | web, local, vulnerability
systems | linux
SHA-256 | c7bcc06f713f54cc826c79b1c5b09093f8a35b0ee1fae86fccaad9566107e1f1
safemode-adv-mnews.txt
Posted Jun 3, 2002
Authored by Zillion | Site safemode.org

Safemode Security Advisory SRT2002-04-31-1159 - Several local and remote overflows have been found in the Mnews package v1.22 and below.

tags | remote, overflow, local
SHA-256 | 34e50c77bf1364ae80884b5a9c0e02f0f32770926beb9492611db880bf70ab98
RHSA-2002:084-17
Posted Jun 3, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:084-17 - A format string vulnerability found in the pam_ldap module affected Red Hat versions 6.2, 7.0, 7.1,7.2, and 7.3. Red Hat released fixed packages that can be used to counter this vulnerability.

systems | linux, redhat
SHA-256 | fc2c689b4513509af1f8a5e7f2046d6dea50643ccac8e23b7cebe0b1fd61ab30
xandros-autorun.txt
Posted Jun 3, 2002
Authored by dotslash@snosoft.com | Site snosoft.com

A vulnerability in the Xandros Linux autorun utility can be used to disclose parts of protected files such as /etc/shadow.

tags | exploit
systems | linux
SHA-256 | 82784ea64ae0545645c2ce9fc64d6aed90906eec891e5e934434f6621cad4670
0205-exploits.tgz
Posted Jun 3, 2002
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for May, 2002.

tags | exploit
SHA-256 | 8650725205a461908be4ba21749215d0a22d1bab51a9b3c9b8df1f4bada63029
pure-xinetd-backdoor.c
Posted Jun 3, 2002
Authored by Pwr

Xinetd backdoor.

tags | tool, rootkit
systems | unix
SHA-256 | dee84d089e45597a9c2a27792c04cb8fa64bf053b8299baa9691b1eaf689e153
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close