Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed

Files Date: 2005-01-11

pikt-1.18.0.tar.gz
Posted Jan 11, 2005
Authored by Robert Osterlund | Site pikt.org

PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.

Changes: Various updates.
tags | tool
systems | unix
MD5 | b17defe348fc1cb5cdb43c26fe635237
Jenny.htm
Posted Jan 11, 2005
Site danstheman.com

Results from a national wardial against Jenny 867-5309. This is hilarious.

tags | tool, wardialer
MD5 | 5ff689330b4460540395dc3e8c668c03
EarthStation5.txt
Posted Jan 11, 2005
Authored by random nut

EarthStation 5, aka ES5 or ESV, is a P2P application that has been poorly designed in that it will allow any remote attacker to delete any shared file on a victim's system.

tags | advisory, remote
MD5 | 89c1007872624a8d4919eb557b552ac4
scrutinizer-1.03.tar.gz
Posted Jan 11, 2005
Authored by Markus Roth | Site solutix.ch

The scrutinizer toolkit is designed to protect Web servers from HTTP (D)DoS attacks. It is a toolkit consisting of an analysis engine which analyzes Web server access logfiles in almost real time, an Apache module which is able to block wrongdoers on the Web server, an extension to block offenders with netfilter firewalls, and a set of visualization tools. The analysis engine uses statistical anomaly detection to expose offenders. The engine has to be trained with old log files so that it can adapt itself to your system.

Changes: Bugfix release.
tags | web, denial of service
MD5 | fec85dffee76c0c834baef6f0198296a
tcpick-0.2.0.tar.gz
Posted Jan 11, 2005
Authored by DuskDruid | Site tcpick.sourceforge.net

tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.

Changes: Feature enhancements, added Italian documentation, few bug fixes.
tags | tool, sniffer, tcp
MD5 | f22911f3382e743d9dd983b1b4776e68
sid-0.4.0.tar.gz
Posted Jan 11, 2005
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
MD5 | 0c2ef91ee3b036381b08ebb89f2977ef
aescrypt2-1.0.tgz
Posted Jan 11, 2005
Authored by Christophe Devine

aescrypt2 is a command line file encryption program that relies on AES-CBC-128 plus HMAC-MD5. It has been designed to be portable as well as very straightforward to use. Works on all Unix flavors and Win32.

tags | encryption
systems | windows, unix
MD5 | 90db12e9fa66a43935201da33195a6b9
logcheck_1.2.33.tar.gz
Posted Jan 11, 2005
Authored by Todd Troxell | Site logcheck.org

Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.

Changes: Various updates. See changelog.
tags | tool, intrusion detection
systems | unix
MD5 | d345b1f8f31a744cc9c966a6d34f4025
dsa-630.txt
Posted Jan 11, 2005
Site debian.org

Debian Security Advisory 630-1 - Jeroen van Wolffelaar discovered a problem in lintian, the Debian package checker. The program removes the working directory even if it was not created at program start, removing an unrelated file or directory a malicious user inserted via a symlink attack.

tags | advisory
systems | linux, debian
advisories | CVE-2004-1000
MD5 | a55848bc8b7decbf83cb013963e829a8
Gentoo Linux Security Advisory 200501-12
Posted Jan 11, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-12 - A bug in TikiWiki allows certain users to upload and execute malicious PHP scripts.

tags | advisory, php
systems | linux, gentoo
MD5 | 4f82fae2cb5248fc5370d51d80fb554b
invisionSQL.txt
Posted Jan 11, 2005
Authored by darkhawk matrix | Site matrix2k.org

The Invision Community Blog system is susceptible to a SQL injection attack on the eid variable.

tags | exploit, sql injection
MD5 | eedcc9e119950fc30714bfedd8be408b
woltlabXSS.txt
Posted Jan 11, 2005
Authored by Martin Heistermann

Woltlab Burning Board Lite version 1.0.0 and 1.0.1e are susceptible to a cross site scripting flaw.

tags | exploit, xss
MD5 | 7a9c468289b188eda701354e7ce28e40
mozilla16win.txt
Posted Jan 11, 2005
Authored by Luca Ercoli

Mozilla version 1.6 for Windows is susceptible to a denial of service flaw due to a mishandling of xbm graphic files.

tags | advisory, denial of service
systems | windows
MD5 | d1e1070544b4a5d950dfec190cdc11a3
IDEF0731.txt
Posted Jan 11, 2005
Site idefense.com

iDEFENSE Security Advisory IDEF0731 - Remote exploitation of a buffer overflow vulnerability in Exim 4.41 may allow execution of arbitrary commands with elevated privileges. Exim is a message transfer agent developed for use on Unix systems. The problem specifically exists in the auth_spa_server function. The function fails to check the length of input to spa_base64_to_bits(), which decodes a Base64-encoded string into a buffer of a fixed length. This string is user-controlled and passed to the program from a remote connection.

tags | advisory, remote, overflow, arbitrary
systems | unix
advisories | CVE-2005-0022
MD5 | 83c5efbe93b5841ac11c2a862fced50e
IDEF0725.txt
Posted Jan 11, 2005
Site idefense.com

iDEFENSE Security Advisory IDEF0725 - Local exploitation of a buffer overflow vulnerability in Exim 4.41 may allow execution of arbitrary commands with elevated privileges. The problem specifically exists in the host_aton function. The function fails to check the number of elements it stores in a fixed size array. The elements come from a user-controlled string and are passed into the program from a command line option.

tags | advisory, overflow, arbitrary, local
advisories | CVE-2005-0021
MD5 | 41be0482969e042cd542ef909ab3252e
sphpBlog037.txt
Posted Jan 11, 2005
Authored by Madelman

SPHPBlog 0.3.7c is susceptible to a directory traversal attack. Fixed in release 0.3.7r2.

tags | exploit
MD5 | d3805dea18227681095923838e0572c2
Page 1 of 1
Back1Next

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    30 Files
  • 12
    Dec 12th
    25 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close