what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2004-08-18

Apldos.tgz
Posted Aug 18, 2004
Authored by priestmaster | Site priestmaster.org

Paper written to discuss application layer denial of service attacks with a test script that provides an example attack.

tags | denial of service
SHA-256 | 99e71bfefca08435bffe95e4201c73896fedd95f61d35792f8b30c3e2718aeb9
radmind-1.3.1.tgz
Posted Aug 18, 2004
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Various feature enhancements and bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | b60471ef0660af9f86f2826ae396969c0a8035a57b2f4f638f650e66d2aed4a2
cacti085a.txt
Posted Aug 18, 2004
Authored by Fernando Quintero aka nonroot

CACTI version 0.8.5a suffers from full path disclosure and SQL injection vulnerabilities that allow for complete authentication bypass.

tags | advisory, vulnerability, sql injection
SHA-256 | 11017bef293374204c51adc94d8aff90fedb0d6463b136ea5f0d21379b42ac8b
Imailpwdump.cpp
Posted Aug 18, 2004
Authored by Adik

IpSwitch IMail Server versions 8.1 and below password decryption utility. This server uses the polyalphabetic Vegenere cipher to encrypt its user passwords. This encryption scheme is relatively easy to break.

tags | exploit
SHA-256 | cdcde4da494127219fe8e50e8653ac8d70b3426eb86611ca50861a09255e7b4a
ipd-dos.c
Posted Aug 18, 2004
Site ngsec.com

Proof of concept local exploit that makes use of a denial of service vulnerability in IPD (Integrity Protection Driver) versions up to 1.4.

tags | exploit, denial of service, local, proof of concept
SHA-256 | c616f6a4ee3f92a68144069a0fadfefe7d0b92e5bb2761b380e5c0cebe792c8e
Next Generation Security Advisory 2004.6
Posted Aug 18, 2004
Authored by FJ Serna, NGSSoftware | Site ngsec.com

Next Generation Advisory NGSEC-2004-6 - The IPD, or Integrity Protection Driver, from Pedestal Software suffers from an unvalidated pointer referencing in some of its kernel hooks. Any local and unauthorized user can crash the system with some simple coding skills. Versions up to 1.4 are affected.

tags | advisory, kernel, local
SHA-256 | 50720f87318f3a42e9784937201bd48fcc7fed7624a51ca79ec89c25f61005c5
iDEFENSE Security Advisory 2004-08-16.t
Posted Aug 18, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 08.16.04: Remote exploitation of an information disclosure vulnerability in Concurrent Versions Systems (CVS) allows attackers to glean information. The vulnerability exists within an undocumented switch to the history command implemented in src/history.c. The -X command specifies the name of the history file allowing an attacker to determine whether arbitrary system files and directories exist and whether or not the CVS process has access to them. This issue was patched in the latest (June 9th) releases of CVS, specifically 1.11.17 and 1.12.9.

tags | advisory, remote, arbitrary, info disclosure
advisories | CVE-2004-0778
SHA-256 | f268381547d56c35860bc93b1ae5cbc7dede9a48d3f4a6f4aca9198b5b120a68
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close