what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 216 RSS Feed

Files Date: 2004-07-01 to 2004-07-31

cadslr1.txt
Posted Jul 23, 2004
Authored by Jordi Corrales | Site shellsec.net

A denial of service vulnerability exists in the Conceptronic CADSLR1 Router when a large Host: field is entered during an HTTP transaction.

tags | advisory, web, denial of service
SHA-256 | 12ce83076532db48c47f399738af649c0bdf94d5f28b6ba69af460b995a2bdb6
OpteronMicrocode.txt
Posted Jul 22, 2004
Authored by anonymous

This document details the procedure for performing microcode updates on the AMD K8 processors. It also gives background information on the K8 microcode design and provides information on altering the microcode and loading the altered update for those who are interested in microcode hacking. Source code is included for a simple Linux microcode update driver for those who want to update their K8's microcode without waiting for the motherboard vendor to add it to the BIOS. The latest microcode update blocks are included in the driver.

tags | exploit
systems | linux
SHA-256 | 4ecff8d0555e0bd10657e9dff39c32e92fc331ea26ca0cac5995390818707ac2
doorman-0.7.tgz
Posted Jul 22, 2004
Authored by Bruce Ward | Site doorman.sourceforge.net

The Doorman is a port-knocking listener daemon which helps users secure private servers. It allows a Unix server to run invisibly, with all TCP ports closed.

tags | tool, tcp, rootkit
systems | unix
SHA-256 | fe08f9f4735f367d27a07601ee33249065b847e1e7f2bc91e9fdb851705818ab
comcastWebmail.txt
Posted Jul 22, 2004
Authored by Michael Scheidell | Site secnap.com

Comcast Webmail AT+T Message Center version 1 had a flaw that allowed arbitrary code execution client-side due to the allowance of inbound HTML mail to be executed outside of the restricted zone.

tags | advisory, arbitrary, code execution
SHA-256 | 07e88e9a638298baf1818d056ec714b8942bfdcd19ae5d8f7e063df84ee54129
sambaOverruns.txt
Posted Jul 22, 2004
Site samba.org

Samba versions greater or equal to 2.2.29 and 3.0.0 have a buffer overrun located in the code used to support the mangling method = hash smb.conf option. Versions 3.0.2 suffer from buffer overrun in an internal routine used to decode base64 data during HTTP basic authentication.

tags | advisory, web, overflow
advisories | CVE-2004-0600, CVE-2004-0686
SHA-256 | 678349fe0f5740544c4c032a294d1fb0aaa173deede39851cd1f4a8580219ec0
FlashFTPtraverse.txt
Posted Jul 22, 2004
Authored by CoolICE

Flash FTP Server version 1.0 (and possibly 2.1) for Windows is susceptible to a directory traversal attack.

tags | exploit
systems | windows
SHA-256 | e7c4a69fa6e9f50ddd7601dff354fb1131acb92290e55902121fbc0a85973a70
whisperFTP.txt
Posted Jul 21, 2004
Authored by Komrade | Site unsecure.altervista.org

A buffer overflow in Whisper FTP Surfer 1.0.7 occurs when the client tries to delete a temporary file with an excessively long filename.

tags | advisory, overflow
SHA-256 | 3b3913524789d35c5e21520048a207b0cfef8054b143741b863697319ae8af91
Tenshi Log Monitoring Program
Posted Jul 21, 2004
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added set tailargs option, fixed buggy logprefix implementation, fixed buggy cron implementation, fixed broken cron specs examples, see the Changelog for full details.
tags | system logging
systems | unix
SHA-256 | 98d195eff8e0a76a2a9a5c188dd3cd2054a2036fdd56667c46f82a523c574a49
Cisco Security Advisory 20040721-ons
Posted Jul 21, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory: Several vulnerabilities have been reported in Cisco ONS 15000 based products, allowing malicious people to cause a denial of service or bypass authentication.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | ac141fb486a64681a233918cc01f9f75ce9685cf2a5b03ba3dd389392c586b9e
lionmax.txt
Posted Jul 21, 2004
Authored by nekd0

LionMax Software WWW File Share Pro version 2.60 is susceptible to a denial of service attack.

tags | advisory, denial of service
SHA-256 | c62a3a7b6729e3b80e5b839e7d2059f48258be6d200c5f3d7b84840bc6da9740
lexmarkDoS.txt
Posted Jul 21, 2004
Authored by Peter Kruse | Site csis.dk

Several Lexmark printers have HTTP servers embedded that are susceptible to a denial of service attacks via an overly long Host argument.

tags | advisory, web, denial of service
SHA-256 | 9200bd8aa5813490ac9c3e9a260256993f45be32771a1f1fb673c9cbf0fb1d18
Secunia Security Advisory 12110
Posted Jul 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jordi Corrales has reported a vulnerability in CADSLR1, allowing malicious people to cause a Denial of Service.

tags | advisory, denial of service
SHA-256 | eccc9211bdc15f5068d07448cb567d25b213c146062183c3352436b3ba9d6e3a
pstoolsVuln.txt
Posted Jul 21, 2004
Authored by Alan Ridgeway | Site www3.ca.com

Due to a vulnerability in the Sysinternals PsTools share mapping, an attacker with a user account can execute arbitrary code as an administrator.

tags | advisory, arbitrary
SHA-256 | afa2b3db99139b18f9779cb16ab7ebf5920c2aaf5e39becbcf6b41bd48024acf
manipulate_data-1.3.tar.gz
Posted Jul 21, 2004
Authored by van Hauser, thc

Manipulate_Data version 1.3 - Search data on a harddisk/partition/file, extract the part you are interested in, and write it back after you (maybe) modified it.

Changes: Bug fixes and addition of hexdump output display.
SHA-256 | 12e88c8cdb102daca79c783fd147b8c94413b17e76d8675374dec07de2fc3c0f
rkhunter-1.1.3.tar.gz
Posted Jul 21, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support for SuSE Linux Enterprise Server 8, SuSE Linux Openexchange Server 4.1.1, Fedora Core 2 with 64 bits support, and more. Added bug fixes and code tweaks.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | ddb7b048407b5fb6e587f9d11c817ea961cbbe0e1900e0c62a25b7999562554c
proxyscanner-2.0.tar.gz
Posted Jul 21, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.

Changes: Can now be compiled on any Unix platform.
SHA-256 | fabe21aa1f3980a895c2d11bb0db9e397210a048532f9c75d549c855484e7445
Samhain File Integrity Checker
Posted Jul 21, 2004
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Bug fixes.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 8ed52ce0450ea76df099cbfc6c6c6a7d5a52e320e28b88c797ef0de5059866d3
Beltane Web-Based Management For Samhain
Posted Jul 21, 2004
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Bug fix.
tags | tool, web, intrusion detection
systems | unix
SHA-256 | 5a27f4838510b8ddc788712db24cf81d219bf431e3ac48a7eb629028020f4aff
getusr.c
Posted Jul 20, 2004
Authored by CoKi | Site nosystem.com.ar

Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers.

tags | exploit
SHA-256 | 8675f32c6af2043f644707d59bb74ae4eaf2e430aa1fb582122c2f9c86d7012a
amap-4.6.tar.gz
Posted Jul 20, 2004
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Added 9 new responses. Fixed a small string termination bug.
tags | tool, protocol
SHA-256 | 85cc4c2281d795a7b27631f775a592828561823a3d15c1fe7e7cc969a0414e31
Secunia Security Advisory 12101
Posted Jul 20, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lostmon has reported a weakness in I-Cafe client, allowing malicious users to by disable the software.

tags | advisory
SHA-256 | 80b75d5f1b4a5f89d1ee0cdc8fe71be78001681f051ca500c5b7314b6e886d0d
nucpuncms.txt
Posted Jul 20, 2004
Site secunia.com

Secunia Security Advisory - PunBB 1.x, Nucleus 3.x, and BLOG:CMS 3.x all suffer from a flaw where system access can be gained due to a lack of input validation.

tags | advisory
SHA-256 | 457f046835019de8732a58b41bcae39662b69a04597c072414a80d8faa282e1e
SCOSA-2004.7.txt
Posted Jul 20, 2004
Site sco.com

SCO Security Advisory - Multiple vulnerabilities have been found in the MMDF binaries included with SCO Openserver versions 5.0.6 and 5.0.7. These include buffer overflows, null dereferences, and core dumps.

tags | advisory, overflow, vulnerability
advisories | CVE-2004-0510, CVE-2004-0511, CVE-2004-0512
SHA-256 | f78bc63931e13a59fb61612fe42904a3de9bc9c717ed7cd53c2d6e79a6eb8a55
unrealdecloak.tar.gz
Posted Jul 20, 2004
Authored by bartavelle | Site bandecon.com

Unreal Decloak Toolkit version 0.1 illustrates the weak hashing system vulnerability in Unreal ircd 3.2 and previous versions.

tags | exploit
SHA-256 | b9f87a775c864e80c21ef6545cc72dbd0c4a0132cffc171c5d13262d8058894b
crossZone.txt
Posted Jul 20, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

IEXPLORE.EXE file version 6.0.2800.1106 and MSHTML.DLL file version 6.00.2800.1400 are both susceptible to cross site/zone scripting flaws.

tags | advisory
SHA-256 | adf292c1753dbb9a45642cd37fcc3a60abe2952a1004a4a51d48cb8e38659b95
Page 3 of 9
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close