what you don't know can hurt you
Showing 1 - 25 of 25 RSS Feed

Files Date: 2005-03-24

cisco-torch-0.4b.tar.bz2
Posted Mar 24, 2005
Authored by Arhont Team | Site arhont.com

Cisco Torch mass scanning, fingerprinting, and exploitation tool was written while working on the next edition of the "Hacking Exposed Cisco Networks", since the tools availalbe on the market could not meet our needs. The main feature that makes Cisco-torch different from similar tools is the extensive use of forking to launch multiple scanning processes on the background for maximum scanning efficiency. Also, it uses several methods of application layer fingerprinting simultaneously, if needed.

systems | cisco
MD5 | 18abd02ebeacf6514b752c54813e6a0a
snmp-fuzzer-0.1.1.tar.bz2
Posted Mar 24, 2005
Site arhont.com

SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl. It provides efficient methods of determining which test case has caused a fault, offers more testing granularity and a friendlier user interface. Happy vulnerability searching.

tags | perl, fuzzer
systems | unix
MD5 | f5c8882cd8a450552af62772aa1319a2
nessus-installer-2.2.4.sh
Posted Mar 24, 2005
Authored by Renaud Deraison | Site nessus.org

Nessus version 2.2.4 is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Fixed several bugs which may impact scanning performance. Reduced CPU usage. A new SMB API to log into the remote Windows hosts.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
MD5 | a8519dc602385331394b0d5450fc20e9
zm-1.21.0.tar.gz
Posted Mar 24, 2005
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Addition of camera control, plus several bugfixes.
tags | web
systems | linux
MD5 | 2cb674e083ded0c5233f8be43c33619b
codebug-8.txt
Posted Mar 24, 2005
Site codebug.org

Codebug Labs Advisory 08 - Topic Calendar 1.0.1 for phpBB is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | e24e607e05489098e88b9811cb495f38
phpSysInfo23.txt
Posted Mar 24, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

phpSysInfo 2.3 is susceptible to cross site scripting flaws.

tags | exploit, xss
MD5 | d952f283fd4795f279524d09e05ef9dc
Attack_5250_terminal_em.pdf
Posted Mar 24, 2005
Authored by Shalom Carmel

Attacking PC based 5250 terminal emulations from an iSeries server. Paper describing how insertion of commands inside an AS/400 application allows them to be executed as a command on the connected PC.

tags | exploit
MD5 | aa3631c9ab82c8e8bbbb04089d368f08
vortex.txt
Posted Mar 24, 2005
Authored by Dominus Vis

The Vortex Portal is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 966e906c82963047f5b074fca315e8fe
surgemail22g3.txt
Posted Mar 24, 2005
Authored by Tan Chew Keong | Site security.org.sg

A vulnerability was found in SurgeMail's Webmail file attachment upload feature. This vulnerability may be exploited by a malicious Webmail user to upload files to certain locations on the server, obtain file listings of certain directories, and/or send certain files on the server to him/herself. Two XSS vulnerabilities were also found.

tags | exploit, vulnerability
MD5 | 11163795f76572cb966de35829ec3330
idspm.v1.6.0.msi
Posted Mar 24, 2005
Site activeworx.org

IDS Policy Manager was written to manage Snort IDS sensors in a distributed environment. This is done by having the ability to take the text configuration and rule files and allow you to modify them with an easy to use Graphical interface. With the added ability to merge new rule sets, manage pre processors, control output modules and scp rules to sensors, this tool makes managing snort easy for most security professionals.

Changes: Support for threshold.conf file, for downloading rules with new format from snort.org, and for new Snort.org reference website format.
tags | tool, sniffer
MD5 | 609b65beb28e7a1030926e2b7a9da1a3
nortelVPNpass.txt
Posted Mar 24, 2005
Authored by Roy Hills

NTA Monitor has discovered a password disclosure issue in the Nortel Windows VPN client. The Nortel client stores the password in an obfuscated form in the Windows registry, but it also stores the unencrypted password in process memory.

tags | advisory, registry
systems | windows
MD5 | c40ebd01b56018c9805cff4a52e4901d
osCommerce2.txt
Posted Mar 24, 2005
Authored by Megasky

osCommerce versions 2.x suffer from a directory traversal attack that allows for access to directories outside of the webroot. Besides using the download action, the read action is also usable.

tags | exploit
MD5 | bba5fef32c2d3ad380a12417f41d46de
phorumSplit.txt
Posted Mar 24, 2005
Authored by Positive Technologies

Input passed to the Location parameter in Phorum version 5.0.14a is not properly sanitized. This can be exploited to inject malicious characters into HTTP headers and may allow execution of arbitrary HTML and script code in a user's browser session in context of an affected site.

tags | exploit, web, arbitrary
MD5 | 4d491615838f77f878772ef8e845540e
kayakoXSS2.txt
Posted Mar 24, 2005
Authored by James Bercegay

Kayako eSupport version 2.3 is susceptible to multiple cross site scripting attacks.

tags | exploit, xss
MD5 | e178ffb3f374a8a65248e81119eff5f2
dsa-696.txt
Posted Mar 24, 2005
Site debian.org

Debian Security Advisory 696-1 - Paul Szabo discovered another vulnerability in the File::Path::rmtree function of perl, the popular scripting language. When a process is deleting a directory tree, a different user could exploit a race condition to create setuid binaries in this directory tree, provided that he already had write permissions in any subdirectory of that tree.

tags | advisory, perl
systems | linux, debian
advisories | CVE-2005-0448
MD5 | bfd437d5bf80cc93582064870a7f0aa5
ruxconCFP2005.txt
Posted Mar 24, 2005
Authored by ruxcon

RUXCON would like to announce the call for papers for the third annual RUXCON conference. Breaking from the RUXCON tradition of having the conference in winter months, this year the conference will be ran during the 1st and 2nd of October. As with previous years, RUXCON will be held at the University of Technology, Sydney, Australia. The dead line for submissions is the 31st of August.

tags | paper, conference
MD5 | 5f063aacf3eb3cdad0add28547cababe
xosx-cf.c
Posted Mar 24, 2005
Authored by vade79 | Site fakehalo.us

Local root exploit for /usr/bin/su on Mac OS X that makes use of the buffer overflow vulnerability discovered by iDefense using the CF_CHARSET_PATH environment variable.

tags | exploit, overflow, local, root
systems | apple, osx
advisories | CVE-2005-0716
MD5 | f6fb2b97ea877182983ee16dafacce16
Secunia Security Advisory 14660
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HaCkZaTaN has discovered a vulnerability in Proview Disassembler, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 778a18f14038e667f37abc42bae065d4
Secunia Security Advisory 14679
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in MercuryBoard, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 568fa010c03db800346cf2e139ac9184
Secunia Security Advisory 14524
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Mathopd, which can be exploited by malicious, local users to corrupt the contents of arbitrary files on a vulnerable system.

tags | advisory, arbitrary, local
MD5 | ce6166f8613269def6c944c9beeb316f
Secunia Security Advisory 14676
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BirdBlog, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 46a0a636090c32e339c04437eb7814cf
Secunia Security Advisory 14677
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Eric Hobbs has reported a vulnerability in Sun Java System Application Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, java, xss
MD5 | 5b9ec0187da5f863f9eaeef129773c87
Secunia Security Advisory 14675
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IPsec-Tools, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 07d3d3bb23b0f3d3eaeb271fecf9f6a2
Secunia Security Advisory 14680
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported a vulnerability in phorum, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | b0efef669c03ba09c08025c57d5204c9
Secunia Security Advisory 14467
Posted Mar 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pi3cH has reported a vulnerability in the new-login module for PHP-Fusion, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, php, xss
MD5 | fdbcc7680817866d71307ec5dfeefee9
Page 1 of 1
Back1Next

File Archive:

March 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    2 Files
  • 2
    Mar 2nd
    18 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    12 Files
  • 5
    Mar 5th
    19 Files
  • 6
    Mar 6th
    8 Files
  • 7
    Mar 7th
    1 Files
  • 8
    Mar 8th
    1 Files
  • 9
    Mar 9th
    11 Files
  • 10
    Mar 10th
    15 Files
  • 11
    Mar 11th
    9 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    13 Files
  • 14
    Mar 14th
    10 Files
  • 15
    Mar 15th
    13 Files
  • 16
    Mar 16th
    27 Files
  • 17
    Mar 17th
    15 Files
  • 18
    Mar 18th
    23 Files
  • 19
    Mar 19th
    25 Files
  • 20
    Mar 20th
    10 Files
  • 21
    Mar 21st
    6 Files
  • 22
    Mar 22nd
    1 Files
  • 23
    Mar 23rd
    22 Files
  • 24
    Mar 24th
    15 Files
  • 25
    Mar 25th
    23 Files
  • 26
    Mar 26th
    20 Files
  • 27
    Mar 27th
    15 Files
  • 28
    Mar 28th
    10 Files
  • 29
    Mar 29th
    1 Files
  • 30
    Mar 30th
    18 Files
  • 31
    Mar 31st
    6 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close