accept no compromises
Showing 1 - 25 of 94 RSS Feed

Files Date: 2004-12-31

alph-0.7.tar.gz
Posted Dec 31, 2004
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Minor corrections and a facelist.
tags | encryption
MD5 | f1db95eee38ff8bf4835c3dc7495ae22
rkhunter-1.1.9.tar.gz
Posted Dec 31, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support and hashes for various OSes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 2e24806cb1267124fba6132009e30f1b
listener-0.8.tgz
Posted Dec 31, 2004
Authored by Folkert van Heusden | Site vanheusden.com

This program listens for sound. If it detects any, it starts recording automatically and also automatically stops when things become silent again.

Changes: Added external filter support.
systems | linux
MD5 | bb99dc9d440bd6a1c08f3470f5163bda
scrutinizer-1.02.tar.gz
Posted Dec 31, 2004
Authored by Markus Roth | Site solutix.ch

The scrutinizer toolkit is designed to protect Web servers from HTTP (D)DoS attacks. It is a toolkit consisting of an analysis engine which analyzes Web server access logfiles in almost real time, an Apache module which is able to block wrongdoers on the Web server, an extension to block offenders with netfilter firewalls, and a set of visualization tools. The analysis engine uses statistical anomaly detection to expose offenders. The engine has to be trained with old log files so that it can adapt itself to your system.

tags | web, denial of service
MD5 | d657105db587ae9a595b953ea44cad2c
Secunia Security Advisory 13634
Posted Dec 31, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nicolae Mihalache has reported a security issue in avelsieve, which potentially can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 80fc9a8d4680fdd69e2dcabc51896311
phpbbworm2.tgz
Posted Dec 31, 2004
Authored by Herman Sheremetyev

New version of the phpBB worm that successfully works against a patched phpBB 2.0.11. The scripts in this tarball are the worm itself and the bot that is installed.

tags | exploit, worm
MD5 | 3e25607b656731c8902642da039f0697
STG Security Advisory 2004-12-20.16
Posted Dec 31, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: An input validation flaw in ZeroBoard versions 4.1pl4 and below can allow malicious attackers the ability to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user.

tags | exploit, arbitrary
MD5 | f266dea6fadc6bcb9dcc65dd55ae1090
ieTrick.txt
Posted Dec 31, 2004
Authored by Albert Puigsech Galicia

Internet Explorer will accept %0a and %0d in URLs. In FTP URLs, it will accept them in the username part of the URL. Due to the similarity between the FTP and SMTP protocols, this can be used to send mail.

tags | advisory, protocol
MD5 | ee66b2e6d49b546793170520a819053e
plesk700.txt
Posted Dec 31, 2004
Authored by Andrew Smith

Plesk, a popular server administration tool used by many web hosting companies, is susceptible to cross site scripting flaws.

tags | advisory, web, xss
MD5 | 2a40d7304bd1fd94d5a07e880ad27fa5
phpbb-url.pl
Posted Dec 31, 2004
Authored by Alberto Trivero | Site albythebest.altervista.org

Simple tool to automate the creation of the URL needed to exploit phpBB versions below 2.0.11 using the viewtopic.php vulnerability.

tags | exploit, php
MD5 | f54e59d659820db210376da4a83090c8
SSRT4699.txt
Posted Dec 31, 2004
Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with System Administration Manager (SAM) running on HP-UX that may allow local unauthorized privileges. Affected Versions: HP-UX B.11.00, B.11.11, B.11.22, and B.11.23.

tags | advisory, local
systems | hpux
MD5 | c14db62e19bc70eeec74f51a043a334c
shoutcast194.c
Posted Dec 31, 2004
Authored by Damian Put, Tomasz Trojanowski | Site cc-team.org

SHOUTcast DNAS/Linux version 1.9.4 format string remote exploit. Tested on slackware 9.1 and 10.0. Bind a shell to port 7000.

tags | exploit, remote, shell
systems | linux, slackware
MD5 | 10a9677625a70dc41e3a961b0e06168d
Secunia Security Advisory 13635
Posted Dec 31, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Rpm Finder, which can be exploited by malicious people to compromise a user's system and by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local, vulnerability
MD5 | 1697b6efedeca34e4236ed6e1b44decb
Next Generation Security Advisory 223122004L
Posted Dec 31, 2004
Authored by David Litchfield, NGSSoftware | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004L - IBM's DB2 database server contains a procedure, generate_distfile. This procedure suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
MD5 | cdd3d73cfa50d9f5fe7a95749dd99e9d
Next Generation Security Advisory 223122004K
Posted Dec 31, 2004
Authored by Mark Litchfield, NGSSoftware | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004J - IBM's DB2 database server contains a function, rec2xml, used to format a string in XML. This function suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
MD5 | 8131309f4210d2ed68cd045c14a04b82
oracle23122004J.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004J - The code for PL/SQL procedures can be encrypted or wrapped to use the Oracle term. When a wrapped procedure is created a buffer overflow vulnerability can be triggered. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory, overflow
MD5 | d97ff3e3a1a5717cb97dfbedcec74635
oracle23122004H.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004H - Oracle 10g and 9i suffer from multiple PL/SQL injection vulnerabilities. Systems Affected: Oracle 10g/AS on all operating systems.

tags | advisory, vulnerability, sql injection
MD5 | bba6750fb329c77e111241092f946839
oracle23122004F.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004F - The 10g Oracle TNS Listener is vulnerable to a denial of service vulnerability. Systems Affected: Oracle 10g on all operating systems.

tags | advisory, denial of service
MD5 | a6738a6d54561303d7c502149fc7f788
oracle23122004E.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004E - The 10g Oracle Application Server installs ISQL*Plus. Once logged in, an attacker can use load.uix to read files on the server. Systems Affected: Oracle 10g AS on all operating systems.

tags | advisory
MD5 | adfe20bd74a120aa085285fa65b8aa91
oracle23122004D.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004D - The 10g Oracle database server may have passwords in clear text in world readable files. Systems Affected: Oracle 10g on all operating systems.

tags | advisory
MD5 | 428ac4ebe3aca104d0aaf92bc5284f08
oracle23122004C.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR23122004C - The Oracle database server supports PL/SQL, a programming language. PL/SQL can execute external procedures via extproc. Extproc is intended only to accept requests from the Oracle database server but local users can still execute commands bypassing this restriction. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory, local
MD5 | dae273bf1612c10c3afe4b3514192b16
oracle23122004B.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR23122004B - The Oracle database server supports PL/SQL, a programming language. PL/SQL can execute external procedures via extproc. Extproc has been found to suffer from a directory traversal problem that allows attackers access to arbitrary libraries. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory, arbitrary
MD5 | ed02212351daf65fa9d5c70b6f46cee1
oracle23122004.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004A - The Oracle database server supports PL/SQL, a programming language. PL/SQL can execute external procedures via extproc. Extproc has been found to suffer from another buffer overflow vulnerability. Systems Affected: Oracle 10g on all operating systems.

tags | advisory, overflow
MD5 | 8ff3f6a4a456615d65a9263bafbdd8f2
oracle23122004G.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004G - Due to character conversion problems in Oracle 10g with Oracle's Application server it is possible to bypass pl/sql exclusions and gain access to the database server as SYS. Systems Affected: Oracle 10g/AS on all operating systems.

tags | advisory
MD5 | fb210b21300c07dcfb7d455421482490
oracle23122004I.txt
Posted Dec 31, 2004
Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004I - Database triggers exist to help maintain data integrity and perform certain actions when a table's data is modified. Many of the default triggers in Oracle can be abused to gain elevated privileges. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory
MD5 | 64970b9686acb7b8e503c2a9f727350d
Page 1 of 4
Back1234Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    2 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close