what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2004-08-09 to 2004-08-10

Xines_Mine.c
Posted Aug 9, 2004
Authored by c0ntex | Site open-security.org

Xine v0.99.2 remote stack overflow exploit. A overflow in all versions of xine-lib allow the vcd:// input source to execute arbitrary code, even if the file is .mp3, .mpeg, .mpg or .avi media. Fix available (currently only in the cvs xine-lib) here.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 32955c3e74badabf60efcd97d31761b9fa8bfd32d260deb331486ed610d1a87d
dump2code-0.2.tgz
Posted Aug 9, 2004
Authored by newbug | Site chroot.org

Dump2code is an ELF file section reader that allows you to dump any executable section, such as .interp, .dtors, .text, etc, from binary code to hex code.

tags | shellcode
SHA-256 | 02e4221d141f634e535b986413a1fb59b4f7f15a334932f0e73b7c8cf95d095f
Aim.DoS.8_9.pdf
Posted Aug 9, 2004
Authored by Ryan McGeehan, Kevin Benes | Site TheBillyGoatCurse.com

A buffer overflow vulnerability has been discovered in AOL Instant Messenger 5.x that can allow for arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 29f13f59caac1ab84f3df01e8a06deb1d8cdc62ada4a2048e3186f5dbe2a3dd0
cvstrac.txt
Posted Aug 9, 2004
Authored by Richard Ngo

CVSTrac versions 1.x have an input validation flaw that allows for arbitrary command execution.

tags | exploit, arbitrary
SHA-256 | a4fbbe43075d15f6f1f2aa3f8a3d21cf99c42b351348d35ac984950bd03c8bc6
upnpboom.c
Posted Aug 9, 2004
Authored by anonymous

UPNP mass infector exploit.

tags | exploit
SHA-256 | 18e0f419929aa859e5a7ec066be1b57c720c219044cd322fe7335ffc7841c819
libnids-1.19.tar.gz
Posted Aug 9, 2004
Authored by Nergal | Site libnids.sourceforge.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit, and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: Multiple bug fixes.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | 788882607cb35eaf005525af3f7ee8e6c99f98d76ef9daf48fc6388af9f7ab31
rkhunter-1.1.4.tar.gz
Posted Aug 9, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Now supports Debian 3.1, FreeBSD 4.10, SunOS, OpenBSD 3.5, and White Box EL. Adds boot.local/Apache2/mod_rootme support and an application scanner. Display-logfile option was added. Fixes bugs and improves some tests.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | 39925a2882b60cffb5673663f256429064eb325ad4c13c93ab41f6d2db9d592e
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close