exploit the possibilities
Showing 51 - 75 of 92 RSS Feed

Files Date: 2004-10-13 to 2004-10-14

dsa-558.txt
Posted Oct 13, 2004
Site debian.org

Debian Security Advisory DSA 558-1 - Julian Reschke reported a problem in mod_dav of Apache 2 in connection with a NULL pointer dereference. When running in a threaded model, especially with Apache 2, a segmentation fault can take out a whole process and hence create a denial of service for the whole server.

tags | advisory, denial of service
systems | linux, debian
MD5 | 2a63811cc7e3645b8e94d34d4fc10c6b
libsignelf1_1.0.0-1.tar.gz
Posted Oct 13, 2004
Authored by Synwan | Site sourceforge.net

Signelf is a library that allows you to RSA sign an elf binary. It also provides a static library that you can link against to validate a given binaries' signature. This can be used to validate a shared object before loading it. This can be used to validate plugins being loaded. If validation passes, then the plugin is from an authorized source, is unmodified, and is uncorrupted.

tags | library
MD5 | 9315c6925a15beaee2a5cc93523f9806
shadowmac-1.0.tar.gz
Posted Oct 13, 2004
Authored by Johnny Cache

shadowmac is a kernel patch for spoofing MAC addresses under Mac OS X. It works even if the device does not support the IOCTL via rewriting the MAC on the wire as packets go out and the reverse when they come in.

tags | tool, kernel, spoof
systems | unix, apple, osx
MD5 | e34ed86d8f3e4f221af7ef8440ad66ff
jc-wepcrack.tar.gz
Posted Oct 13, 2004
Authored by Johnny Cache | Site hick.org

jc-wepcrack is a distributed WEP cracker. It uses its own sockets-based protocol for communication. It can easily be installed on a lab or your own cluster. It supports any key size. Other features include the ability to save/restore the state of the server to disk and a fancy ncurses interface. It is architecture neutral, and was co-developed on a G4 Powerbook and an x86 Linux machine. If you only have one machine, it will still run.

tags | tool, x86, protocol, wireless
systems | linux
MD5 | ae30312b54faa184c529a2a0063edeb2
prismstumbler-0.7.3.tar.bz2
Posted Oct 13, 2004
Authored by Florian Boor | Site prismstumbler.sourceforge.net

Prismstumbler is software which finds 802.11 (W-LAN) networks. It comes with an easy to use GTK2 frontend and is small enough to fit on a small portable system. It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. Because of its client-server architecture the scanner engine may be used for different frontends.

Changes: Major and minor bug fixes.
tags | tool, wireless
MD5 | 3232b2a12136c6ec097bb2544cd7ab16
sambaCAN20040815.txt
Posted Oct 13, 2004

Correction to an earlier Samba advisory stating that versions 3.0.0 through 3.0.5 were susceptible to a remote file access bug when only versions 3.0.x through 3.0.2a were susceptible.

tags | advisory, remote
MD5 | 8e460aaeb70d83a3627e6e5503b3fee4
PI.tgz
Posted Oct 13, 2004
Authored by Marshall Beddoe | Site baselineresearch.net

The Protocol Informatics project is a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats. The algorithms that are utilized perform comparative analysis on a series of samples to better understand the underlying structure of the otherwise random-looking data. The PI framework was designed for experimentation through the use of a widget-based component set.

tags | tool, sniffer, protocol
MD5 | 26b4efae961542718a9208bca030a7e7
maxpatrolXSS.txt
Posted Oct 13, 2004
Site maxpatrol.com

Invision Power Board version 2.0.0 is susceptible to cross site scripting attacks.

tags | advisory, xss
MD5 | 9e10fdefbc05fb9c27cf7c3c946a8915
iDEFENSE Security Advisory 2004-10-05.b
Posted Oct 13, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.05.04b - Remote exploitation of design vulnerability in Symantec's Norton AntiVirus allows malicious code to evade detection.

tags | advisory, remote
advisories | CVE-2004-0920
MD5 | 1f260679422f53de50c357b68d904925
10.05.04a.txt
Posted Oct 13, 2004
Site idefense.com

iDEFENSE Security Advisory 10.05.04a - Remote exploitation of an input validation error in ColdFusion MX 6.1 on IIS could allow the disclosure of file contents.

tags | advisory, remote
advisories | CVE-2004-0928
MD5 | 7a62846242e6250cef1f988b06169976
Secunia Security Advisory 12732
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BliZZard has reported a vulnerability in AWS MySQLguest, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | 3f5762dbf69e95e933c510f375e0d541
Secunia Security Advisory 12703
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Trading Partner Interchange 4.x, which can be exploited by malicious people to access arbitrary files. The vulnerability is caused due to an input validation error within the included Jetty HTTP server and can be exploited to gain access to arbitrary files and directories on the system.

tags | advisory, web, arbitrary
MD5 | 77fde4c771474f4f26660467a3cc694d
Secunia Security Advisory 12719
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has reported a vulnerability in NetworkActiv Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, web, denial of service
MD5 | c049c56c10713eff4eb6ff8d51e8d4ff
Secunia Security Advisory 12721
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some unspecified vulnerabilities with unknown impacts have been reported in Real Estate Management Software.

tags | advisory, vulnerability
MD5 | 4db0a887e04ee02da98985b42e3b553a
Secunia Security Advisory 12728
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Online-Bookmarks, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | f17af5ff0b172fdb088f504e7e017a1e
Secunia Security Advisory 12730
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Eduardo Correia has reported a vulnerability with an unknown impact in BugPort.

tags | advisory
MD5 | 6a2d5bd2c051e29a55e8471755cb6e66
Secunia Security Advisory 12729
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in My Blog, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 6f81fbf3015d1f6ed0bc90dd6b188699
Secunia Security Advisory 12720
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Online Recruitment Agency 1.x suffers from some vulnerabilities with an unknown impact.

tags | advisory, vulnerability
MD5 | 7284651cfd17ba23eb33312ede70468b
phplinks2.txt
Posted Oct 13, 2004
Site security.lss.hr

Further research into PHP Links shows that it is susceptible to a PHP inclusion flaw along with some SQL injection attacks.

tags | exploit, php, sql injection
MD5 | 5fbdc1927eda766638c56d56304c4870
FreeBSD Security Advisory 2004.15
Posted Oct 13, 2004
Authored by The FreeBSD Project, Christer Oberg | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-04:15.syscons - The syscons CONS_SCRSHOT ioctl(2) does insufficient validation of its input arguments. In particular, negative coordinates or large coordinates may cause unexpected behavior.

tags | advisory
systems | freebsd
advisories | CVE-2004-0919
MD5 | 181ac2612ef0976b5adf64eaa7cee8c4
Gentoo Linux Security Advisory 200410-2
Posted Oct 13, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-02 - Utilities included in old Netpbm versions are vulnerable to multiple temporary files issues, potentially allowing a local attacker to overwrite files with the rights of the user running the utility.

tags | advisory, local
systems | linux, gentoo
MD5 | 92e1e2df85248f728df0de73bd5f2237
Secunia Security Advisory 12711
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in distcc, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 5d5bdf3a635958aa5404c44c6eb67ba6
Secunia Security Advisory 12693
Posted Oct 13, 2004
Authored by Secunia, Eric Lackey | Site secunia.com

Secunia Security Advisory - A vulnerability in ColdFusion MX 6.x can be exploited by malicious, authenticated users to bypass certain security restrictions.

tags | advisory
MD5 | 7ab017a34896d2f8ec8bfe3c63224f19
Secunia Security Advisory 12708
Posted Oct 13, 2004
Authored by Secunia, Alex Vincent | Site secunia.com

Secunia Security Advisory - A vulnerability in Mozilla Firefox 0.1 can be exploited by malicious people to delete files on a user's system.

tags | advisory
MD5 | 9c75be3477a6e57b2c5ddc31d742b92a
Secunia Security Advisory 12709
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Georg Ragaz has reported a vulnerability with an unknown impact in yappa-ng.

tags | advisory
MD5 | 8d1c85fe3fd41136dfd6752b15377633
Page 3 of 4
Back1234Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    31 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close