what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 109 RSS Feed

Files Date: 2005-03-22 to 2005-03-23

pwned.c
Posted Mar 22, 2005
Authored by sd

Local sys_uselib root exploit for the Linux 2.4 and 2.6 kernel series.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | e95832127ef41cadddcf73aab42cbb0168d07344395d3aa6b43c4b4a5ffb0fdc
psnup.pl.txt
Posted Mar 22, 2005
Authored by lammat

Proof of concept exploit for PostScript utility psnup from the psutils-p17 package.

tags | exploit, proof of concept
SHA-256 | 0b506f07a5d1f0a237c5075cf1c8fd8938692639618c6508c4c64f7b34f0c8f4
Bastille-2.2.5.tar.bz2
Posted Mar 22, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Substantial internal changes were made.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | 5cc11e42d0aa3982a2e77237a98f2512101cda25e5199ba55c98a46cac5a74c6
iDEFENSE Security Advisory 2005-03-21.t
Posted Mar 22, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 03.21.05 - Local exploitation of a buffer overflow vulnerability within the Core Foundation Library included by default in Apple Computer Inc.'s Mac OS X could allow an attacker to gain root privileges. iDEFENSE has confirmed this vulnerability in Mac OS X 10.3.5 and Mac OS X 10.3.6. Earlier versions are suspected vulnerable.

tags | advisory, overflow, local, root
systems | apple, osx
advisories | CVE-2005-0716
SHA-256 | db5ff37bdf6a8f47915914d8f018372251de8b3a79547f3275e8348007440d4a
Exploit Labs Security Advisory 2005.2
Posted Mar 22, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2005-002 exploitlabs.com Advisory 031 - The Samsung ADSL Modem ships with default root, admin, and user accounts and also allows for arbitrary file access on the underlying filesystem.

tags | exploit, arbitrary, root
SHA-256 | 8781cdcc8a0e6d219a4402867b7c5194121711e509530df3a557353ae00e8bfe
NISR-AntiBruteForce.pdf
Posted Mar 22, 2005
Authored by Gunter Ollmann | Site nextgenss.com

Authentication processes in web-based applications are frequently vulnerable to automated brute force guessing attacks. Whilst commonly proposed solutions make use of escalating time delays and minimum lockout threshold strategies, these tend to prove ineffectual in real attacks and may actually promote additional attack vectors. Resource metering through client-side computationally intensive "electronic payments" can provide an alternative strategy in defending against brute force guessing attacks. This whitepaper discusses how such a solution works and the security advantages it can bring.

tags | paper, web, cracker
SHA-256 | 15245aa7f4bb6184fef5aa8d48258f1200f40a2d9cf75e582ce17ce1140f0645
Secunia Security Advisory 14662
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GSS-IT has reported a vulnerability in Ocean FTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | a2b519c47034e0e65c7b8571c06f33240265b3913a4b7569f1187786497e4aed
Secunia Security Advisory 14670
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Frank brOmstar Reissner has reported a vulnerability in CzarNews, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | efe1c37f050bab7dd90817583b171388cca3c7eae6c25e0f6aca7db84e896d86
Secunia Security Advisory 14655
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes various vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | d87ba2ac40f1b31da87c55ee7facde4aca09427dd95342779954299cf62c9767
Secunia Security Advisory 14668
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - farhad koosha has reported a vulnerability and a security issue in betaparticle blog, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information.

tags | advisory
SHA-256 | a2690ed0643bec9a674ab7806dd5be3d054911cd1b01620e22564bb9dc4ad207
Secunia Security Advisory 14669
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Frank brOmstar Reissner has reported a vulnerability in TRG News Script, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | e6532258e320011fd364633ecdac7e3951d46202bad9579e660277d13456c82b
Secunia Security Advisory 14664
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in FileZilla Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 0c21fb4f548e41244590a286aa33dbf0f8ac33dd64a436c62b5c47005027ca2f
Secunia Security Advisory 14674
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged some vulnerabilities in HP-UX Apache, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | hpux
SHA-256 | 11c8f2774af56a9180784ff2138e7cb6d350ba2db8082af54b49fc1103322f2c
Gentoo Linux Security Advisory 200503-27
Posted Mar 22, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200503-27 - Toby Dickenson discovered that dyndnsupdate suffers from multiple overflows. Versions less than or equal to 0.6.15 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | c5ecd1b5d0d2ea8ae31d4f6f9b092fd3b5a8b3d26ac86361e761466b1b1c8bcc
dsa-695.txt
Posted Mar 22, 2005
Site debian.org

Debian Security Advisory 695-1 - Several vulnerabilities have been discovered in xli, an image viewer for X11.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2001-0775, CVE-2005-0638, CVE-2005-0639
SHA-256 | efcecea1bc6135c1707ecf485761a84bc91da389a3ce02499bf8610ee7431d2a
phpBB153.txt
Posted Mar 22, 2005
Authored by SuBzErO

phpBB plus versions 1.53 and below allow for system information to be leaked via phpinfo.

tags | advisory
SHA-256 | 14da6f698848e5bc8b0b2c1fa87d70c7c80e6c007ffd431bf2e34b2ffc8b6327
dbmac-0.2.tar.gz
Posted Mar 22, 2005
Authored by doctor raid

MacSpoof DB is a database of MAC prefixes for spoofing your MAC address in Linux. Ideal for in war driving situations. It comes with 7500+ available MAC prefixes, the ability to search and sort by company name or MAC prefix, and an option to pick from the results at random. It then sets the MAC accordingly.

tags | tool, spoof
systems | linux, unix
SHA-256 | 143ccbbf46ef702acd674f4ff14ba7cf651d9f48607b01753e51ea2645161b03
Secunia Security Advisory 14644
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Patrick has discovered a vulnerability in Icecast, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | d7e69be3f2c96d33b8e018ae45497e0e122db38b1d81f74cc1c75b2c607168cc
Secunia Security Advisory 14646
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Thomas Liam Romanis has reported two vulnerabilities in AnswerBook2 Documentation Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 33d3ab7a6e47f45db2abeecc15eaf4567e8b9db547df5e8ac2d243b8d3d095c9
Gentoo Linux Security Advisory 200503-26
Posted Mar 22, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200503-26 - Sylpheed and Sylpheed-claws fail to properly handle non-ASCII characters in email headers when composing reply messages. Versions less than 1.0.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-0667
SHA-256 | b7067bae00d3c3ec4e9cae4b2ec45b16494bb2966c073bcd28d6aeb03caa868d
Gentoo Linux Security Advisory 200503-25
Posted Mar 22, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200503-25 - Multiple buffer overflows have been found in OpenSLP, when handling malformed SLP packets. Versions less than 1.2.1 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 2bfc836984b3935a2d88c3b3572cc0393d099eb2c68cbeae3bd8e47e4a5a48ee
Gentoo Linux Security Advisory 200503-24
Posted Mar 22, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200503-24 - LTris is vulnerable to a buffer overflow when reading the global highscores file. Versions less than 1.0.10 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | e3dee4ff1d5ee71be43f54ee8475b5b2cd19b4d5a3376e255e545149542f0967
Gentoo Linux Security Advisory 200503-23
Posted Mar 22, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200503-23 - Rob Holland of the Gentoo Linux Security Audit Team discovered that rxvt-unicode fails to properly check input length. Versions less than 5.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-0764
SHA-256 | 2e84983b32e29000a641b9fe7d872959be3892656e1e798a99cdca1a2bbde68f
phpMyFamily140.txt
Posted Mar 22, 2005
Authored by kreon | Site adz.void.ru

phpMyFamily version 1.4.0 is susceptible to SQL injection attacks. Proof of concept included.

tags | exploit, sql injection, proof of concept
SHA-256 | 6b7e36f14583eff443efbb039fd5c131bfd667623eae3a9ac7d812b68b3db2f7
coolforum081.txt
Posted Mar 22, 2005
Authored by HaCkZaTaN | Site neosecurityteam.net

CoolForum versions 0.8.1 Beta and below may be susceptible to SQL injection attacks.

tags | advisory, sql injection
SHA-256 | c639cf90e16e7b79ccaca1f474d4530cae0f2308e97844097dc253846f520ef4
Page 1 of 5
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close