exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

md5mon-1.3a.tar.gz
Posted Feb 23, 2001
Site members.linuxstart.com

MD5mon is a file monitor that verifies files by computing their checksums. The shell script is suitable for use as a basic security checking tool from cron. It features configurable monitoring levels, local copies of find/md5sum, and integrity checks to prevent tampering with itself. It can also use a more secure shasum instead of md5sum.

Changes: A bugfix where checksums were not updated correctly in some cases.
tags | tool, shell, local, intrusion detection
systems | unix
SHA-256 | 4b3886734324f04fab377511023d5ae0c9dbdbd5db446f455e3c4d58129385f7

Related Files

mdaemon-user-py.txt
Posted Aug 27, 2006
Authored by muts | Site hackingdefined.com

MDaemon Pre Authentication (USER) heap overflow exploit.

tags | exploit, overflow
SHA-256 | 4f7b94833ece72e52aeb28060f38d879ff856d35732f73e066575bfd5ed1d323
MDaemon-2.txt
Posted May 29, 2006
Authored by Kingcope

A Heap Overflow in the MDaemon IMAP Daemon has been discovered which may result in the execution of arbitrary code.

tags | advisory, overflow, arbitrary, imap
SHA-256 | 89bc9caf6e91d1debfb7900ebde25e13be71301a7d4023227e739df8908fe4d1
mdaemon.zip
Posted Dec 14, 2005
Authored by Dr. Insane

Some vulnerabilities have been located in ALT-N MDAEMON version 8.1.3 for Windows that may allow remote malicious users to disable a users inbox folder.

tags | advisory, remote, vulnerability
systems | windows
SHA-256 | 60dcfefa239f494a106d8d01932a9853f50a16db517fec0a35949268717ed623
md4coll.c
Posted Nov 15, 2005
Authored by Patrick Stach

MD4 collision generator.

tags | encryption
SHA-256 | 2bebad65909745571594f17a961b74232c8dfde3ae0949d01246d67c9c0e48a3
md5coll.zip
Posted Nov 15, 2005
Authored by Patrick Stach, Steve Dispensa

MD5 collision generator tool. Windows port with source.

tags | encryption
systems | windows
SHA-256 | f974e3601b4fcbc763a0348feb1f9026e98d412d2a6aeaea42273546d1a8008c
md5coll.c
Posted Nov 15, 2005
Authored by Patrick Stach

MD5 collision generator tool.

tags | encryption
SHA-256 | ce00158446d946f0333baec9f38470f3670d46c1086d3d71b28ddee5313c5542
Mandriva Linux Security Advisory 2005.157
Posted Sep 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A severe security issue has been discovered in Smb4K. By linking a simple text file FILE to /tmp/smb4k.tmp or /tmp/sudoers, an attacker could get access to the full contents of the /etc/super.tab or /etc/sudoers file, respectively, because Smb4K didn't check for the existance of these files before writing any contents. When using super, the attack also resulted in /etc/super.tab being a symlink to FILE. Affected are all versions of the 0.4, 0.5, and 0.6 series of Smb4K.

tags | advisory
systems | linux, mandriva
SHA-256 | 2e7d946d88525e9117a39502618c5c8066182d1bb26b4e22744dea059b24fb60
Mandriva Linux Security Advisory 2005.156
Posted Sep 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - When starting xntpd with the -u option and specifying the group by using a string not a numeric gid the daemon uses the gid of the user not the group.

tags | advisory
systems | linux, mandriva
SHA-256 | d7150bc8beea7498450152bf9d24ad55ba00067fa4e0945ceb1f6bd303c308a2
Mandriva Linux Security Advisory 2005.154
Posted Aug 28, 2005
Authored by Mandriva | Site mandriva.com

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow. The python packages use a private copy of pcre code.

tags | advisory, overflow, arbitrary, perl, python
SHA-256 | 6c60b8a722eb0465abc8ed758b114123cd720246b7f3268c562345f23dcbf1f9
Mandriva Linux Security Advisory 2005.153
Posted Aug 28, 2005
Authored by Mandriva | Site mandriva.com

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

tags | advisory, overflow, arbitrary, perl
SHA-256 | 2913020ff56d435018e11b27ae5ec6f01a906d4696dc0e8e5102cb460d783f2b
Mandriva Linux Security Advisory 2005.152
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

tags | advisory, overflow, arbitrary, perl
SHA-256 | e296dc932558876aa03691cc4ba4a8ff742813c8186cbe20bf4bf2e7e1e662ba
Mandriva Linux Security Advisory 2005.151
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

tags | advisory, overflow, arbitrary, perl
SHA-256 | 67dac94f58834ac95814d61aff301273abab4bf7af28c2c919f89dbece0aae80
Mandriva Linux Security Advisory 2005.150
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

A vulnerability in bluez-utils was discovered by Henryk Plotz. Due to missing input sanitizing, it was possible for an attacker to execute arbitrary commands supplied as a device name from the remote bluetooth device.

tags | advisory, remote, arbitrary
SHA-256 | c78df857068d0651a0e2e8ea70b1df85952d226a1d91be949a7a2474ffc93450
Mandriva Linux Security Advisory 2005.149
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

Javier Fernandez-Sanguino Pena discovered that the pwmconfig script in the lm_sensors package created temporary files in an insecure manner. This could allow a symlink attack to create or overwrite arbitrary files with full root privileges because pwmconfig is typically executed by root.

tags | advisory, arbitrary, root
SHA-256 | 1eb757480487e5bde151ffe0b5c8a09b452e11ae2137fe90de1c1c1398988c76
mdaemon_imap.pm.txt
Posted Aug 15, 2005

Mdaemon 8.0.3 IMAP CRAM-MD5 authentication remote buffer overflow exploit.

tags | exploit, remote, overflow, imap
SHA-256 | 21d024b65e0fd6aa4d5a421da2cb94f9f9fc3f3f04055622a67cdde3ed104c3d
Mandriva Linux Security Advisory 2005.029
Posted Feb 5, 2005
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts.

tags | advisory, arbitrary, vulnerability
systems | linux, mandrake
advisories | CVE-2005-0069
SHA-256 | 7d9c2bfe6a4ee99a747572aa6fb968bad0aa4e7638fd1885eac13fa60c81fe34
Mandriva Linux Security Advisory 2004.148
Posted Dec 30, 2004
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack.

tags | advisory, denial of service, kernel, local, spoof
systems | linux, mandrake
SHA-256 | 0b77cae8ee0ff13e4f0c71207f40df5bb8a76c2bedd1527178bb64fdc86e1708
Mandriva Linux Security Advisory 2004.146
Posted Dec 12, 2004
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely.

tags | advisory, remote, denial of service, tcp
systems | linux, mandrake
SHA-256 | d6ee8ca8fd5762c70e690ea33f4421867002ac1714835bcf445645c863e83597
mdaemon72.txt
Posted Dec 11, 2004
Authored by Reed Arvin

A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.

tags | exploit, local
SHA-256 | 0bf2ceef32fcac791004f42845f98912b0a3b6b0da97801fcebb9b6068efaee7
MDKSA-2004:140.txt
Posted Dec 11, 2004
Site mandrakesoft.com

Mandrake Linux Security Update Advisory - The GNU a2ps utility fails to properly sanitize filenames, which can be abused by a malicious user to execute arbitrary commands with the privileges of the user running the vulnerable application.

tags | advisory, arbitrary
systems | linux, mandrake
SHA-256 | afffec118e3c478b43f8bd4c296edd84d155a798b59d0a49364f43ef44813126
md5_someday.pdf
Posted Dec 7, 2004
Authored by Dan Kaminsky | Site doxpara.com

Collision vulnerabilities in MD5 Checksums - It is possible to create different executables which have the same md5 hash. The attacks remain limited, for now. The attack allows blocks in the checksumm'd file to be swapped out for other blocks without changing the final hash. This is an excellent vector for malicious developers to get unsafe code past a group of auditors, perhaps to acquire a required third party signature. Alternatively, build tools themselves could be compromised to embed safe versions of dangerous payloads in each build. A tool to demonstrate these vulnerabilities is available here.

tags | paper, vulnerability
SHA-256 | cac2fbb0fa5442eda45b2a7a2412eb69fc74e574eb60d2a15209e44acf7e5bf8
MDKSA-2004:113.txt
Posted Oct 27, 2004
Authored by Chris Evans | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Multiple integer overflow issues affecting xpdf-2.0 and xpdf-3.0. Also programs like cups which have embedded versions of xpdf. These can result in writing an arbitrary byte to an attacker controlled location which probably could lead to arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
systems | linux, mandrake
advisories | CVE-2004-0888, CVE-2004-0889
SHA-256 | 38339c35eb37ea1704d38fa5c8d7a983c7db524a7de177b38224327194a45663
MDKSA-2004:109.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - affected versions of MDK: 10.0, 92, Corporate Server 2.1, Multi Network Firewall 8.2. Several vulnerabilities have been discovered in the libtiff package that could lead to arbitrary code execution.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, mandrake
advisories | CVE-2004-0803
SHA-256 | 00b02fca7dc066d552fa40fbd64474173459db97df3ec38a658849d0dfbfb489
MDKSA-2004:108.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - cvs 10.0, 92, Corporate Server 2.1. A flaw in CVS versions prior to 1.1.17 in an undocumented switch to the CVS history command allows for determining directory structure and the existance of files on a target machine.

tags | advisory
systems | linux, mandrake
SHA-256 | e1cdaf1293a24e2672547e99ab63263760f1dbe553b2c16f4764702091f0a9a9
MDKSA-2004:107.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - A number of vulnerabilities were fixed in mozilla 1.7.3, the following of which have been backported to mozilla packages for Mandrake Linux 10.0: "Send page" heap overrun, javascript clipboard access, buffer overflow when displaying VCard, BMP integer overflow, javascript: link dragging, Malicious POP3 server III.

tags | advisory, overflow, javascript, vulnerability
systems | linux, mandrake
SHA-256 | 9f5db01dbfd4b9ff3f74a73729cb6a0c9bf1c408d1dc95dad30d2132b2454615
Page 2 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close