exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 77 RSS Feed

Files Date: 2005-02-25 to 2005-02-26

savant31FR.txt
Posted Feb 25, 2005
Authored by Mati Aharoni, Tal Zeltzer

Savant Web Server version 3.1 remote buffer overflow exploit with French Windows support.

tags | exploit, remote, web, overflow
systems | windows
SHA-256 | 89050effe3dcbd193a8864b77cdcb028ed19a86e32efeeaa53483bd62f985f61
un-typed.c
Posted Feb 25, 2005
Authored by unl0ck | Site unl0ck.void.ru

Proof of concept local exploit for typespeed.

tags | exploit, local, proof of concept
SHA-256 | 6a6ff914f615eabfeff936e3dba4a9c79fa047ad7e78ef33797ad864bf5c9f3b
a2ps.c
Posted Feb 25, 2005
Authored by lizard

Local exploit for a2ps. Proof of concept and not setuid by default.

tags | exploit, local, proof of concept
SHA-256 | c0630b367b578e43ba17fda620061c3c67dd8919affa1ca08dcf6cc81e4243f2
brute_cisco.exp
Posted Feb 25, 2005
Authored by Mr. Parinya Jutasen

Brute force utility for Cisco password authentication.

systems | cisco
SHA-256 | 04878f9fcd2bba9a6a3be629e0e71407e6f2270b6bfdf8eb88077703d5592a2e
glftpd.txt
Posted Feb 25, 2005
Authored by Paul Craig | Site pimp-industries.com

glftpd versions 1.26 to 2.00 suffer from directory traversal and information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 110718097e5a28b9268a6032bf6f96515d6bdfd15d196ff2016190c1161b2bf3
invision131xss.txt
Posted Feb 25, 2005
Authored by Daniel A.

Invision Power Boards 1.3.1 FINAL is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | b37cc241459613996ea38c595661f73a298bf77201e087fa514548c754502cd0
Samhain File Integrity Checker
Posted Feb 25, 2005
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Multiple bug fixes.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 6562f374bb4320f0d58eed75a8bffb9139db8ef97bb941f041f7b91aa8cd191c
Linux IPTables Firewall
Posted Feb 25, 2005
Site iptables.org

iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: Bug fixes.
tags | tool, firewall
systems | linux
SHA-256 | 0aa1e7a60e05bac9fb27fda8c52979cbbaa4e3aef6463983935d83691bd9fba9
afick-2.7-0.tgz
Posted Feb 25, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Various bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | e3f09a9a0399e01cdefafa2890c3035f00fe36e3496a0dcdbd5c67782f10de82
radmind-1.5.0.tgz
Posted Feb 25, 2005
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Major networking and speed improvements. Various other additions and fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 8cac95a3387474cd63da145291faa6517cbac1cda4d4961534a5a62f46a68ecc
base-1.0.2.tar.gz
Posted Feb 25, 2005
Authored by Kevin Johnson | Site sourceforge.net

BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.

Changes: Various bug fixes and language additions.
tags | tool, web, sniffer
SHA-256 | ce6ebc5e75d69be73eaad1a544ad66ac2349127303622e8199b3a2d7b246f196
Clam AntiVirus Toolkit 0.83
Posted Feb 25, 2005
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
SHA-256 | 94986cfc9badef2e717524d1ec87e2870d2195d5abab0a4b3298b776d489cf2e
adobeDoS.txt
Posted Feb 25, 2005
Authored by Felix Zhou

Adobe Reader is susceptible to a denial of service when the count value of a root page is set to a negative digit.

tags | advisory, denial of service, root
SHA-256 | e425f612d9d694c26bdb66bdae05b00cd4ab166c5cc01a78de8ba4e9593863fb
Gentoo Linux Security Advisory 200502-24
Posted Feb 25, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-24 - Midnight Commander contains several format string errors, buffer overflows and one buffer underflow leading to execution of arbitrary code. Versions below 4.6.0-r13 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
SHA-256 | b8dfa45cd13112d037062d121f1fa7b2a9ed98b0da56b0870ccf826c70d1c9c1
nessus-installer-2.2.3.sh
Posted Feb 25, 2005
Authored by Renaud Deraison | Site nessus.org

Nessus version 2.2.3 is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Nessus 2.2.3 contains a new option called silent dependencies which can be used to filter out the noise generated by some plugins not directly enabled by the user. It also contains a slightly more intuitive GUI which now contains a Credentials tab to put Windows and SSH usernames and passwords.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | d78a335599794d0a8aa0f10f1acd60c107d024383f25d7b085e35f1b66861d3a
dsa-686.txt
Posted Feb 25, 2005
Site debian.org

Debian Security Advisory 686-1 - Albert Puigsech Galicia discovered a directory traversal vulnerability in a proprietary FTP client which is also present in gftp, a GTK+ FTP client. A malicious server could provide a specially crafted filename that could cause arbitrary files to be overwritten or created by the client.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-1376, CVE-2005-0372
SHA-256 | 2013d5592168515f5acf79dad97fbd472271cf916079902e6654592f80288f26
BibORB.txt
Posted Feb 25, 2005
Authored by Patrick Hof

BibORB 1.3.2 is susceptible to SQL injection, cross site scripting, directory traversal, and arbitrary file upload vulnerabilities. Detailed exploitation provided.

tags | exploit, arbitrary, vulnerability, xss, sql injection, file upload
advisories | CVE-2005-0251, CVE-2005-0252, CVE-2005-0253, CVE-2005-0254
SHA-256 | 6bbe10137333240ad47282adad90a3b7777a81f0dc780ee486ce04283ddce6b9
Secunia Security Advisory 14262
Posted Feb 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jarno has reported a vulnerability in NewsBruiser, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | e92c34f1367b9a091fd736112ed9d95e5a79312b1e1bbcf82953bff4856ddc4f
paFAQBeta4.txt
Posted Feb 25, 2005
Authored by Pi3cH

paFAQ Beta4 is susceptible to numerous SQL injection attacks.

tags | exploit, sql injection
SHA-256 | e93c70d3cf090afbe29be64a3af553a2dfdc1a29c8e988f6657dd15a41a5887c
SCL-2005.001.txt
Posted Feb 25, 2005
Authored by Michael Scovetta | Site scovettalabs.com

WebCalendar 0.9.45 is susceptible to SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 615c93bb479d94b061ed24ec78d2b1ded739bd33bf88b25ece8f6975c2a55443
ieAgain.txt
Posted Feb 25, 2005
Authored by bitlance winter

A variation of the status bar spoofing flaw in Internet Explorer has been discovered using the label for id trick.

tags | advisory, spoof
SHA-256 | c80295d0329225420d26b9c369016b8552f9c5bdb1bc1cf2e635891d75758745
reconCFP2005.txt
Posted Feb 25, 2005
Site recon.cx

RECON 2005 Call For Papers - RECON is a security conference taking place downtown Montreal from the 17th to 19th of June 2005. Reverse Engineering and Exploit development are the main topics of RECON; other domains of Information Security will be covered as well. The call for papers will end on April 15th.

tags | paper, conference
SHA-256 | 66ffb05511c1bfd7d84e99ca008e97fab1edc7c077218de3dc0820f1e6e99bba
aspNetXSS.txt
Posted Feb 25, 2005
Authored by Andrey Rusyaev

ASP .Net is susceptible to cross site scripting flaws.

tags | advisory, xss, asp
SHA-256 | 29032900a26f70e0bb6647397526a9a550637719bdaa0abc86d78dee89e5b494
amihotornot.txt
Posted Feb 25, 2005
Authored by C. Saunders

A bug has been found in the amihotornot.com.au gallery that lets a registered user modify other members' gallery photo's.

tags | advisory
SHA-256 | 3c6410a3169baa6381f674a3619de9360df737c93d93c8b2353b06be90072b6e
Gentoo Linux Security Advisory 200502-22
Posted Feb 25, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-22 - wpa_supplicant contains a buffer overflow that could lead to a Denial of Service. Versions below 0.2.7 are affected.

tags | advisory, denial of service, overflow
systems | linux, gentoo
SHA-256 | 96cefbf89377a0a08e30577b6e46e178d47233c70049a1ed4ab7699332b3cf2d
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close