what you don't know can hurt you
Showing 1 - 16 of 16 RSS Feed

Files Date: 2005-01-11

Posted Jan 11, 2005
Authored by Robert Osterlund | Site pikt.org

PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.

Changes: Various updates.
tags | tool
systems | unix
MD5 | b17defe348fc1cb5cdb43c26fe635237
Posted Jan 11, 2005
Site danstheman.com

Results from a national wardial against Jenny 867-5309. This is hilarious.

tags | tool, wardialer
MD5 | 5ff689330b4460540395dc3e8c668c03
Posted Jan 11, 2005
Authored by random nut

EarthStation 5, aka ES5 or ESV, is a P2P application that has been poorly designed in that it will allow any remote attacker to delete any shared file on a victim's system.

tags | advisory, remote
MD5 | 89c1007872624a8d4919eb557b552ac4
Posted Jan 11, 2005
Authored by Markus Roth | Site solutix.ch

The scrutinizer toolkit is designed to protect Web servers from HTTP (D)DoS attacks. It is a toolkit consisting of an analysis engine which analyzes Web server access logfiles in almost real time, an Apache module which is able to block wrongdoers on the Web server, an extension to block offenders with netfilter firewalls, and a set of visualization tools. The analysis engine uses statistical anomaly detection to expose offenders. The engine has to be trained with old log files so that it can adapt itself to your system.

Changes: Bugfix release.
tags | web, denial of service
MD5 | fec85dffee76c0c834baef6f0198296a
Posted Jan 11, 2005
Authored by DuskDruid | Site tcpick.sourceforge.net

tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.

Changes: Feature enhancements, added Italian documentation, few bug fixes.
tags | tool, sniffer, tcp
MD5 | f22911f3382e743d9dd983b1b4776e68
Posted Jan 11, 2005
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
MD5 | 0c2ef91ee3b036381b08ebb89f2977ef
Posted Jan 11, 2005
Authored by Christophe Devine

aescrypt2 is a command line file encryption program that relies on AES-CBC-128 plus HMAC-MD5. It has been designed to be portable as well as very straightforward to use. Works on all Unix flavors and Win32.

tags | encryption
systems | windows, unix
MD5 | 90db12e9fa66a43935201da33195a6b9
Posted Jan 11, 2005
Authored by Todd Troxell | Site logcheck.org

Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.

Changes: Various updates. See changelog.
tags | tool, intrusion detection
systems | unix
MD5 | d345b1f8f31a744cc9c966a6d34f4025
Posted Jan 11, 2005
Site debian.org

Debian Security Advisory 630-1 - Jeroen van Wolffelaar discovered a problem in lintian, the Debian package checker. The program removes the working directory even if it was not created at program start, removing an unrelated file or directory a malicious user inserted via a symlink attack.

tags | advisory
systems | linux, debian
advisories | CVE-2004-1000
MD5 | a55848bc8b7decbf83cb013963e829a8
Gentoo Linux Security Advisory 200501-12
Posted Jan 11, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-12 - A bug in TikiWiki allows certain users to upload and execute malicious PHP scripts.

tags | advisory, php
systems | linux, gentoo
MD5 | 4f82fae2cb5248fc5370d51d80fb554b
Posted Jan 11, 2005
Authored by darkhawk matrix | Site matrix2k.org

The Invision Community Blog system is susceptible to a SQL injection attack on the eid variable.

tags | exploit, sql injection
MD5 | eedcc9e119950fc30714bfedd8be408b
Posted Jan 11, 2005
Authored by Martin Heistermann

Woltlab Burning Board Lite version 1.0.0 and 1.0.1e are susceptible to a cross site scripting flaw.

tags | exploit, xss
MD5 | 7a9c468289b188eda701354e7ce28e40
Posted Jan 11, 2005
Authored by Luca Ercoli

Mozilla version 1.6 for Windows is susceptible to a denial of service flaw due to a mishandling of xbm graphic files.

tags | advisory, denial of service
systems | windows
MD5 | d1e1070544b4a5d950dfec190cdc11a3
Posted Jan 11, 2005
Site idefense.com

iDEFENSE Security Advisory IDEF0731 - Remote exploitation of a buffer overflow vulnerability in Exim 4.41 may allow execution of arbitrary commands with elevated privileges. Exim is a message transfer agent developed for use on Unix systems. The problem specifically exists in the auth_spa_server function. The function fails to check the length of input to spa_base64_to_bits(), which decodes a Base64-encoded string into a buffer of a fixed length. This string is user-controlled and passed to the program from a remote connection.

tags | advisory, remote, overflow, arbitrary
systems | unix
advisories | CVE-2005-0022
MD5 | 83c5efbe93b5841ac11c2a862fced50e
Posted Jan 11, 2005
Site idefense.com

iDEFENSE Security Advisory IDEF0725 - Local exploitation of a buffer overflow vulnerability in Exim 4.41 may allow execution of arbitrary commands with elevated privileges. The problem specifically exists in the host_aton function. The function fails to check the number of elements it stores in a fixed size array. The elements come from a user-controlled string and are passed into the program from a command line option.

tags | advisory, overflow, arbitrary, local
advisories | CVE-2005-0021
MD5 | 41be0482969e042cd542ef909ab3252e
Posted Jan 11, 2005
Authored by Madelman

SPHPBlog 0.3.7c is susceptible to a directory traversal attack. Fixed in release 0.3.7r2.

tags | exploit
MD5 | d3805dea18227681095923838e0572c2
Page 1 of 1

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By