exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2004-07-21

whisperFTP.txt
Posted Jul 21, 2004
Authored by Komrade | Site unsecure.altervista.org

A buffer overflow in Whisper FTP Surfer 1.0.7 occurs when the client tries to delete a temporary file with an excessively long filename.

tags | advisory, overflow
SHA-256 | 3b3913524789d35c5e21520048a207b0cfef8054b143741b863697319ae8af91
Tenshi Log Monitoring Program
Posted Jul 21, 2004
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added set tailargs option, fixed buggy logprefix implementation, fixed buggy cron implementation, fixed broken cron specs examples, see the Changelog for full details.
tags | system logging
systems | unix
SHA-256 | 98d195eff8e0a76a2a9a5c188dd3cd2054a2036fdd56667c46f82a523c574a49
Cisco Security Advisory 20040721-ons
Posted Jul 21, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory: Several vulnerabilities have been reported in Cisco ONS 15000 based products, allowing malicious people to cause a denial of service or bypass authentication.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | ac141fb486a64681a233918cc01f9f75ce9685cf2a5b03ba3dd389392c586b9e
lionmax.txt
Posted Jul 21, 2004
Authored by nekd0

LionMax Software WWW File Share Pro version 2.60 is susceptible to a denial of service attack.

tags | advisory, denial of service
SHA-256 | c62a3a7b6729e3b80e5b839e7d2059f48258be6d200c5f3d7b84840bc6da9740
lexmarkDoS.txt
Posted Jul 21, 2004
Authored by Peter Kruse | Site csis.dk

Several Lexmark printers have HTTP servers embedded that are susceptible to a denial of service attacks via an overly long Host argument.

tags | advisory, web, denial of service
SHA-256 | 9200bd8aa5813490ac9c3e9a260256993f45be32771a1f1fb673c9cbf0fb1d18
Secunia Security Advisory 12110
Posted Jul 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jordi Corrales has reported a vulnerability in CADSLR1, allowing malicious people to cause a Denial of Service.

tags | advisory, denial of service
SHA-256 | eccc9211bdc15f5068d07448cb567d25b213c146062183c3352436b3ba9d6e3a
pstoolsVuln.txt
Posted Jul 21, 2004
Authored by Alan Ridgeway | Site www3.ca.com

Due to a vulnerability in the Sysinternals PsTools share mapping, an attacker with a user account can execute arbitrary code as an administrator.

tags | advisory, arbitrary
SHA-256 | afa2b3db99139b18f9779cb16ab7ebf5920c2aaf5e39becbcf6b41bd48024acf
manipulate_data-1.3.tar.gz
Posted Jul 21, 2004
Authored by van Hauser, thc

Manipulate_Data version 1.3 - Search data on a harddisk/partition/file, extract the part you are interested in, and write it back after you (maybe) modified it.

Changes: Bug fixes and addition of hexdump output display.
SHA-256 | 12e88c8cdb102daca79c783fd147b8c94413b17e76d8675374dec07de2fc3c0f
rkhunter-1.1.3.tar.gz
Posted Jul 21, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support for SuSE Linux Enterprise Server 8, SuSE Linux Openexchange Server 4.1.1, Fedora Core 2 with 64 bits support, and more. Added bug fixes and code tweaks.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | ddb7b048407b5fb6e587f9d11c817ea961cbbe0e1900e0c62a25b7999562554c
proxyscanner-2.0.tar.gz
Posted Jul 21, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.

Changes: Can now be compiled on any Unix platform.
SHA-256 | fabe21aa1f3980a895c2d11bb0db9e397210a048532f9c75d549c855484e7445
Samhain File Integrity Checker
Posted Jul 21, 2004
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Bug fixes.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 8ed52ce0450ea76df099cbfc6c6c6a7d5a52e320e28b88c797ef0de5059866d3
Beltane Web-Based Management For Samhain
Posted Jul 21, 2004
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Bug fix.
tags | tool, web, intrusion detection
systems | unix
SHA-256 | 5a27f4838510b8ddc788712db24cf81d219bf431e3ac48a7eb629028020f4aff
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close