what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2004-03-18

waraxe-2004-SA010.txt
Posted Mar 18, 2004
Authored by Janek Vind aka waraxe

Multiple vulnerabilities exist in the Error Manager version 2.1 for PhpNuke 6.0. One of them allows for script injection in error logs, forcing an administrator to execute code when viewing the logs.

tags | exploit, vulnerability
SHA-256 | a4a51f7f7381f1fabc7424da2fa85a5bf60ad1a8a9b6826e3cae1904aa25c303
realHelix9.txt
Posted Mar 18, 2004
Site pentest.co.uk

Pentest Limited Security Advisory - The RealNetworks Helix 9 Server allows for an authenticated attacker to submit malformed HTTP POST requests against the Administration server to trigger a buffer overflow and execute arbitrary code. Affected versions: Helix Universal Mobile Server and Gateway 10, version 10.1.1.120 and prior; Helix Universal Server and Gateway 9, version 9.0.2.881 and prior.

tags | advisory, web, overflow, arbitrary
advisories | CVE-2004-0049
SHA-256 | ec765fef32af92bfd91131b904f9e23f6d9eccca366c8270c0af828f68f1a4aa
jpcap-0.01.15.tar.gz
Posted Mar 18, 2004
Authored by Patrick Charles | Site jpcap.sourceforge.net

Network Packet Capture Facility for Java is a set of Java classes that provide an interface and system for network packet capture. A protocol library and tool for visualizing network traffic is included. It utilizes libpcap, a widely used system library for packet capture.

tags | java, protocol
SHA-256 | 616e1a7278e241b405b39db8e0ff62f4f9ccbbda0582e4bdc109ed2e29eaa6fb
zm-1.19.0.tar.gz
Posted Mar 18, 2004
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: MPEG video streaming, NPH streaming, and motion JPEG capture have been added. Tons of other feature enhancements have been added.
tags | web
systems | linux
SHA-256 | 2781c7cbee9342367097c8e7d61785123565352fdea144ec9583010cd86d8705
eckbox-v0.9.3.tar.gz
Posted Mar 18, 2004
Authored by Nick Rupert | Site eckbox.sourceforge.net

Eckbox is van Eck phreaking software. It interprets a radio signal emanating from a computer's monitor to recreate the image (in black and white) that is displayed on it. This could be used as a valuable security tool for testing otherwise secure computers, or for developing hardware and software to counter this type of remote shoulder-surfing.

tags | remote
systems | unix
SHA-256 | 923a9b9725768fc60114e3872ce73b0ba8939bb1bde838bafdfaffb18cc792d3
pyflag-0.60.tar.bz2
Posted Mar 18, 2004
Authored by scudette | Site pyflag.sourceforge.net

FLAG, or Forensic and Log Analysis GUI, is an application designed to assist IT security professionals with analyzing log files, tcpdump files and hard disk images for forensic evidence. It utilizes Ethereal and Sleuthkit.

tags | tool, forensics
SHA-256 | c4d0d549ab071f75b8bbb61a9f2dfbeafe9f2de40633f3fd05de71d0564452f2
motiontrack-0.0.9.tar.gz
Posted Mar 18, 2004
Authored by Corvus V Corax | Site motiontrack.sourceforge.net

Motiontrack is a set of tools that detects motion between two images. It is able to successfully distinguish random flicker from real object movement by applying a set of filters to the images, and can optionally ignore given colors and/or image regions. The roadmap provides for being able to identify objects by pattern detection and AI routines. Currently, this tool is able to turn line-art images into ASCII-art text as a demo feature.

Changes: Image manipulation code for ImageMagick has been optimized.
systems | linux
SHA-256 | 8eb6eb368f0e71e8e7902aa2cfc8b0c464ecf8ba31a0903265d0bebd2b7e92fb
pam_lockout-0.1.tar.bz2
Posted Mar 18, 2004
Authored by Brian Weaver | Site spellweaver.org

PAM Lockout Module is used to lock out users or groups from access to the machine. The module only supports authentication queries, and the command line arguments are used to pass the names of the locked out users and groups.

systems | unix
SHA-256 | bf1c67b3f1ae9919c19c093509b6013c34d6c0826326c7b54b3e7698a6e67eab
mimedefang-2.41.tar.gz
Posted Mar 18, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Includes hostname is quarantine mail body, directory umask is 027, various other features.
systems | windows, unix
SHA-256 | e973fe7cfd99980f3d6280d11e82d65c04339fe2ff66b7a5af620a8fb59bb543
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close