exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 53 RSS Feed

Files Date: 2004-09-09 to 2004-09-10

stegdetect-0.6.tar.gz
Posted Sep 9, 2004
Site outguess.org

Stegdetect is an automated tool for detecting steganographic content in images which is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are jsteg, jphide, and outguess 01.3b.

Changes: Supports linear discriminant analysis.
tags | encryption, steganography
SHA-256 | 71149fc9fc58c44a49a38c7013d22d8a861e45acb1074b6c3004b314c8e81a8d
snortalog_v2.3.0b.tgz
Posted Sep 9, 2004
Authored by Jeremy Chartier | Site jeremy.chartier.free.fr

Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats: syslog, fast, and full snort alerts. Moreover, it is able to summarize other logs like Fw-1 (NG and 4.1), Netfilter, and IPFilter in a similar way.

Changes: Whois Database information available with -w option, Pix ICMP log detection enhancement, Smartdefense ICMP log detection enhancement, HTML output improvement, PDF output improvement, and more.
tags | tool, perl, sniffer
SHA-256 | 0d4cc0d9d0292a21b04399c87dd4e49064e0a9869488fa79dad3ad54c9986f08
sitenewsAuth.txt
Posted Sep 9, 2004
Site securitytracker.com

A vulnerability in Site News 1.1 allows anyone to add or edit messages without having to authenticate as an administrator.

tags | exploit
SHA-256 | 39cea13c47358c2b6933639b7295d599ae3cf5c206e8a98078b149883e80e73c
cdrdao.sh
Posted Sep 9, 2004

Local root exploit for an old flaw in cdrdao.

tags | exploit, local, root
SHA-256 | 7b62a07fe0891df4fc0e3014cfbdf2c8764003d4f0e5182099154c912221cc2a
psnew11.txt
Posted Sep 9, 2004
Authored by wacky

PsNews 1.1 is susceptible to a cross site scripting flaw.

tags | advisory, xss
SHA-256 | b4ad6f72a0a351bddc12addceefab9e8307442ce60ce749dffef0bee19e9af46
asm-1.tbz
Posted Sep 9, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Project Freedocs Volume 4 - A collection of tutorials regarding asm programming.

tags | paper
SHA-256 | bcf7246531ef6bffa8216db66fdc4db157424b0910e8907e0eb6e7b40f732c92
kernel-1.tbz
Posted Sep 9, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Project Freedocs Volume 1 - A collection of tutorials regarding kernel programming.

tags | paper, kernel
SHA-256 | e04d475de695bcb6fd6abbcf40775e31ba5423ccd62653714439b1c67ea8b3ad
exploits-1.tbz
Posted Sep 9, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Project Freedocs Volume 2 - A collection of tutorials regarding exploit programming.

tags | paper
SHA-256 | 986f806666cd37dc5cdf524b0bb2195d501ad9ef64b5cb8d0f542ee906fe5e53
elf-1.tbz
Posted Sep 9, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Project Freedocs Volume 3 - A collection of tutorials regarding elf programming.

tags | paper
SHA-256 | b82d788fa1cc03185f252c3dd0cd47a9996e0422cc57dc5a354273bd6e0db8ca
CODEBUG Labs Security Advisory 5
Posted Sep 9, 2004
Authored by Pierquinto Manco, CODEBUG Labs | Site mantralab.org

PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to post messages in a system newsletter.

tags | advisory, php, xss
SHA-256 | 70838e1167350de5c53df0b19021ae1a35f30f117a6a21475b296353ab6f21fa
CODEBUG Labs Security Advisory 4
Posted Sep 9, 2004
Authored by Pierquinto Manco, CODEBUG Labs | Site mantralab.org

PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to post global homepage messages.

tags | advisory, php, xss
SHA-256 | 03dcede6b00dd60a67938196af5367683c8269fbceb7a204b1678875a1a86174
codboom.zip
Posted Sep 9, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for Call of Duty versions 1.4 and below that makes use of a denial of service vulnerability.

tags | exploit, denial of service, proof of concept
SHA-256 | b8ddb5cf9cad3d53397ea5b472ac427b2bf469e3d1f577eed36f7a8721fd2021
CallOfDuty.txt
Posted Sep 9, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Call of Duty versions 1.4 and below use some anti-buffer-overflow checks that automatically shutdown the game if they find a too big input. The result is that a query or a reply containing over 1024 chars is able to exploit this protection causing the immediate stop of the game.

tags | advisory, overflow
SHA-256 | 9583108fdf5efbc20a5366f2c6a5e031e725730003b709353c1d34e9997346f1
BrocadeDoS.txt
Posted Sep 9, 2004
Authored by Frank Denis

Brocase switches can be frozen with a few specially crafted TCP packets. The IP stack becomes unresponsive and remote administration becomes impossible. This attack does not require any authentication and there is no trace in any log file. Versions affected: All Brocade fiber channel switches running pre-3.2 code including Silkworm 3800, Silkworm 3200 and Silkworm 2800.

tags | advisory, remote, tcp
SHA-256 | fd5b1fd96268eb5f48f6af03f5007c9d70d0e73120ab7db2b96f8616abeb1a8e
neb-private.c
Posted Sep 9, 2004
Authored by haker haker

Private version of the remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Support for Red Hat 7.1, 7.2, 7.3, SuSE 8.0, Debian, Slackware 8.0, 9.0.0, 9.1.0.

tags | exploit, remote, overflow
systems | linux, redhat, suse, slackware, debian
SHA-256 | 0288e222e92a3ec340ab792060fffc178ba5bce0ce2bdd19260c5dc60893692b
engenioLSI.txt
Posted Sep 9, 2004
Authored by Frank Denis

Storagetek and IBM FastT controllers can be frozen with a few specially crafted TCP packets. The IP stack becomes unresponsive and administration through Santricity/IBM Storage Manager becomes impossible. Under some circumstances, unrecoverable corruption of the stored data will happen. This attack doesn't require any authentication and there is no trace in any log file. The controllers are vulnerable even at installation-time.

tags | advisory, tcp
SHA-256 | 9f0a33dcfdb49b6eae3cc05e488bd9881a47508833daf81f508815df58c6fc70
Echo Security Advisory 2004.5
Posted Sep 9, 2004
Authored by y3dips, Echo Security | Site echo.or.id

YABBSE 1.5.1 is susceptible to a full path disclosure flaw.

tags | advisory
SHA-256 | 808d9da033aa558f922dc12bcc718aa04988bf14d7ac1d1f17867f1243794e6d
CODEBUG Labs Security Advisory 3
Posted Sep 9, 2004
Authored by Pierquinto Manco, CODEBUG Labs | Site mantralab.org

PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to view admin account information. It is an old bug that has a patch that can be bypassed if the data is sent via a POST instead of a GET.

tags | advisory, php, xss
SHA-256 | 0a2035b56855d79436e78d364d0652febcd135bfc23ada43fefd055e73b5d43b
CODEBUG Labs Security Advisory 2
Posted Sep 9, 2004
Authored by Pierquinto Manco, CODEBUG Labs | Site mantralab.org

PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to delete any admin account. It is an old bug that has a patch that can be bypassed if the data is sent via a POST instead of a GET.

tags | advisory, php, xss
SHA-256 | 51573d83c3c65065bed02550784dc40a4c140a5fac13c9ead8bf3bd94ee4981f
Technical Cyber Security Alert 2004-247A
Posted Sep 9, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-247A - The MIT Kerberos 5 implementation contains several vulnerabilities, the most severe of which could allow an unauthenticated, remote attacker to execute arbitrary code on a Kerberos Distribution Center (KDC). This could result in the compromise of an entire Kerberos realm.

tags | advisory, remote, arbitrary, vulnerability
SHA-256 | c6e533b36d77ffb637b867f87f533c2281ca5e526e202509a4017524a1282136
phpWebSite.txt
Posted Sep 9, 2004
Authored by James Bercegay | Site gulftech.org

GulfTech Security Research - phpWebSite versions 0.9.3-4 and prior are susceptible to cross site scripting, SQL injection, script injection, and command execution vulnerabilities.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 193d3f7bf29951ce40a35cc4e059662ef4bd62391eea6a3038761387aabb6ab1
aircrack-2.0.tgz
Posted Sep 9, 2004
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Native win32 port of airodump and aircrack, aireplay better spots potential arp-requests.
tags | tool, wireless
SHA-256 | ba64d68fc880041a6fefd20e44c660ea213b8787d20638e63ffb70119afd651f
Secunia Security Advisory 12455
Posted Sep 9, 2004
Authored by Secunia, CelebrityHacker | Site secunia.com

Secunia Security Advisory - A vulnerability in the Altnet Download Manager included in Kazaa 2.x can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in Altnet Download Manager 4.0.0.4 included in Kazaa 2.7.1. Other versions may also be affected.

tags | advisory
SHA-256 | cb697e39192fcfe3b5f46f0401cd358d1a52f43b77793c6bde3ca36260fdb1c8
Secunia Security Advisory 12456
Posted Sep 9, 2004
Authored by Secunia, CelebrityHacker | Site secunia.com

Secunia Security Advisory - A vulnerability in the Altnet Download Manager included in Grokster can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in Altnet Download Manager 4.0.0.2 included in Grokster 2.6. Other versions may also be affected.

tags | advisory
SHA-256 | 401ae3dd84aed3226d3441923c56939a524ff8b64d188ae608eeca00a30cbc34
Secunia Security Advisory 12453
Posted Sep 9, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Various vulnerabilities have been reported in IMail 8.x, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | b7bc97ecf8ee0d828c326047359c66232e35086b4afde79fe6383003747b8dd3
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close