what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 428 RSS Feed

Files Date: 2005-01-01 to 2005-01-31

WIPv011.tgz
Posted Jan 27, 2005
Authored by Adrian Pastor aka pagvac

Whitepaper giving an overview of a security assessment against Windows NT machines when penetration testing. Provides insight from both attacker and administrative perspectives.

tags | paper
systems | windows
SHA-256 | f705ae5f0ef37d54227812c9a52ff8ac0207987b4489cfb8224af55ad18e2103
Secunia Security Advisory 14001
Posted Jan 27, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MoinMoin, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 8ea371b8728a7aafe7a1feb2e6d8f4daf69f468638f58ec38b7721fa12121126
bindFlaws.txt
Posted Jan 27, 2005
Site isc.org

Two news flaws have been discovered in BIND. BIND 9.3.0 suffers from a denial of service flaw in its validator. BIND 8.4.4 and 8.4.5 suffer from a denial of service flaw due to an overrun exploitable in the q_usedns array which is used to track queries.

tags | advisory, denial of service, overflow
SHA-256 | 5926d2b1570d6b79c9dbf0eb3627bc595490c75b56c5ef11db4748fc5171fd12
dsa-659.txt
Posted Jan 27, 2005
Site debian.org

Debian Security Advisory 659-1 - Two problems have been discovered in the libpam-radius-auth package, the PAM RADIUS authentication module. The configuration file gets installed world-readable and the same flaw that exists in mod_auth_radius for Apache is inherent in libpam-radius-auth as well.

tags | advisory
systems | linux, debian
advisories | CVE-2004-1340, CVE-2005-0108
SHA-256 | 23970a322ee025947949b427b88cd9aa8a5be13adf076f41317674fcacab8334
siteman.noam.txt
Posted Jan 27, 2005
Authored by Noam Rathaus

Siteman versions 1.1.10 and below remote administrative account addition exploit.

tags | exploit, remote
SHA-256 | b877cfac097f68de3a9f7a2e28a40d53104a37f15d43fac11d8a0e3616a63bd3
trn-test.txt
Posted Jan 27, 2005
Authored by ZzagorR | Site rootbinbash.com

Local root exploit for /usr/bin/trn. Tested on Mandrake 9.2, Slackware 9.1.0/10.0.0.

tags | exploit, local, root
systems | linux, slackware, mandrake
SHA-256 | 01582be97fed45d219f9fdddda6cbadc367a0d5d9c76671520bd0222ed537e2d
ex_gpsd.c
Posted Jan 27, 2005
Authored by Kevin Finisterre, John H. | Site digitalmunition.com

Remote format string exploit for Berlios gpsd, a remake of pygps. On Debian, it achieves uid of gpsd. On Redhat, it achieves root.

tags | exploit, remote, root
systems | linux, redhat, debian
SHA-256 | 9cf987a3eb342c6394cc4295306f491839c95483078d7f507c259c3482d304c3
DMA-2005-0125a.txt
Posted Jan 27, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Berlios gpsd, a remake of pygps, suffers from a format string vulnerability that is remotely exploitable.

tags | advisory
SHA-256 | 91f4951eb6348f3788887678a4451b9998f3f8c3cbacfcc1f0fda31e97293782
WebServices_Info_Gathering.pdf
Posted Jan 27, 2005
Authored by Shreeraj Shah | Site net-square.com

Whitepaper discussing the scope of information gathering used against web services. First in a series of papers defining attack and defense methodologies with web services.

tags | paper, web
SHA-256 | 41051ad1f79babf058f6e50a6da49759baee349f285fbc702e91c39d819f38f8
snort-2.3.0.tar.gz
Posted Jan 27, 2005
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Many bug fixes.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | e49c838f75cdb2e17b23615fb4f9edca1937914ebd4c5588a5633fd1fb4d7016
kbof_payload.txt
Posted Jan 27, 2005
Authored by qobaiashi

White paper discussing the smashing of the Linux kernel stack.

tags | paper, kernel
systems | linux
SHA-256 | 96b0072d117741d1bfea9486c04178f967e4cc35cc5fae75bf7faef4e74dec7e
phpEventCalendar.txt
Posted Jan 27, 2005
Authored by Madelman

phpEventCalendar version 0.2 does not check title and event text when the data is inserted in the database, allowing for arbitrary HTML injection.

tags | exploit, arbitrary
SHA-256 | e8a699fef2e513e4378aa82199db727c3e572800b81722fc116d8c0e405fae00
57727.html
Posted Jan 26, 2005
Site sunsolve.sun.com

Sun Security Advisory - A security vulnerability in the DHCP administration utilities dhcpconfig(1M), pntadm(1M), and dhcpmgr(1M) may allow an unprivileged local user the ability to execute arbitrary code with the privileges of root.

tags | advisory, arbitrary, local, root
SHA-256 | 28d9fe4db2eec10195999416b29730e9a7757b54eb86793f5cefd1b241f69e4f
dsa-658.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 658-1 - The Debian Security Audit Project discovered that the DBI library, the Perl5 database interface, creates a temporary PID file in an insecure manner. This can be exploited by a malicious user to overwrite arbitrary files owned by the person executing the parts of the library.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0077
SHA-256 | 33c649bdecf8390f19cc8ac37b7fe39371b11a83ce1bcdbec402e17800600144
Secunia Security Advisory 13976
Posted Jan 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BRIBBLE, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 49eed3024e0d77fd91982e0b5803f06cbf50a7556e65b4c8a7455ba4ea6deafb
dsa-657.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 657-1 - A heap overflow has been discovered in the DVD subpicture decoder of xine-lib. An attacker could cause arbitrary code to be executed on the victims host by supplying a malicious MPEG. By tricking users to view a malicious network stream, this is remotely exploitable.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-1379
SHA-256 | 498b369f0d2a898c3a04161eb4c4a99551dffdf5ad433f3d72826e8074c9aee1
dsa-656.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 656-1 - The Debian Security Audit Team has discovered that the vdr daemon which is used for video disk recorders for DVB cards can overwrite arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0071
SHA-256 | 12a94e185f0315de627dd903f9482a3c97a473fe34f836fa4025467494c764bc
dsa-655.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 655-1 - zhcon accesses a user-controlled configuration file with elevated privileges. Thus, it is possible to read arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0072
SHA-256 | 522851362d262be05d4670766589389ed2043f1bfa8c3e992e3f7b9a58503231
Echo Security Advisory 2005.10
Posted Jan 26, 2005
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

Exponent CMS version 0.95 is susceptible to full path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | cba48bf52bb176ac8e8bda738703049a1c0e2915e1885ece04e0b5b76e7fb5a5
AWStatsVulnAnalysis.pdf
Posted Jan 26, 2005
Authored by newbug | Site chroot.org

Detailed analysis of three different vulnerabilities that reside in AWStats which all allow for remote command execution.

tags | exploit, remote, vulnerability
SHA-256 | 74511a1c2d8b5d0dd45ea1e139574de5434d44c4a7e1207c7f78f2ac9324e365
0501038.pdf
Posted Jan 26, 2005
Authored by D.J. Capelis

White paper discussing the new ASH family of hashing algorithms. They are based off of modifications to the existing SHA-2 family and were designed with two main goals in mind: Providing increased collision resistance and increasing mitigation of security risks post-collision.

tags | paper
SHA-256 | 150fa7a85ac85ec3d91ca4a2ddc89e7acfe8f22d268b5d91541cd64b1165ebcc
Gentoo Linux Security Advisory 200501-31
Posted Jan 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-31 - teTeX, pTeX and CSTeX make use of vulnerable Xpdf code which may allow the remote execution of arbitrary code. Furthermore, the xdvizilla script is vulnerable to temporary file handling issues.

tags | advisory, remote, arbitrary
systems | linux, gentoo
SHA-256 | ed0dba4c77a665b500b135c1364a2634203b2a6511a369e8f746a7ebccd40c7a
firehol-1.224.tar.bz2
Posted Jan 25, 2005
Authored by Costa Tsaousis | Site firehol.org

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Added security checks and other enhancements.
tags | tool, spoof, firewall
systems | linux
SHA-256 | 7e5f59e36fea86dee34f35054a38c3def77a7e649306f58a478ebb0b875aca8a
Bastille-2.1.7.tar.bz2
Posted Jan 25, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..

Changes: Added support for Fedora Core 3.
systems | linux, redhat, unix, suse, debian, hpux, mandrake
SHA-256 | ebe4d9a3204ad599a3cdbe43f230345f48e5736d5746187f93756eac0728694c
fm-dmpsc.c
Posted Jan 25, 2005
Authored by nemo

Small application written to make life easier. It dumps C style opcodes between two provided offsets.

tags | shellcode
SHA-256 | 4e7b34bd72aa38097381c48faee3882bfff8bfafa9e16fcbd8a7d692399b7651
Page 3 of 18
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close