what you don't know can hurt you
Showing 1 - 25 of 88 RSS Feed

Files Date: 2005-12-28

dtSearchDUNZIP32.dll.txt
Posted Dec 28, 2005
Authored by Juha-Matti Laurio | Site networksecurity.fi

Networksecurity.fi Security Advisory (21-12-2005) - dtSearch versions prior than 7.20 Build 7136 uses an old version of the unzip library leaving it vulnerable to a buffer overflow.

tags | advisory, overflow
MD5 | 7000edcb2cf95f0a4b67e67f7120484f
fiked-0.0.4.tar.bz2
Posted Dec 28, 2005
Authored by Daniel Roethlisberger | Site roe.ch

Fiked is a fake IKE daemon that supports just enough of the standards and Cisco extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups in what could be described as a semi-MitM attack. Basically, knowing the pre-shared key, also known as shared secret or group password, the VPN gateway can be impersonated in IKE phase 1, in order to learn XAUTH user credentials in phase 2. The configuration supported by fiked is IKE aggressive mode using pre-shared keys and XAUTH. Supported algorithms are DES, 3DES, AES128, AES192, AES256, MD5, SHA1, and DH groups 1, 2, and 5. Main mode is not supported.

tags | encryption
systems | cisco
MD5 | e8d1957b28195712c90e80989301581f
listener-1.7.2.tgz
Posted Dec 28, 2005
Authored by Folkert van Heusden | Site vanheusden.com

This program listens for sound. If it detects any, it starts recording automatically and also automatically stops when things become silent again.

Changes: Added one-shot recording. Can now write its pid to a file when running in daemon mode.
systems | linux
MD5 | 98d73f957d902dd17e7b4d334dcdeaa0
pbnj-1.12.tar.gz
Posted Dec 28, 2005
Authored by Joshua D. Abraham | Site pbnj.sf.net

PBNJ is a network tool that can be used to give an overview of a machine or multiple machines and includes the details about the services running on them. PBNJ is different from other tools because it is based on using a scan from nmap parsed to amap. PBNJ parses the data from a scan and outputs to a CSV format file for each ip address scanned.

Changes: Fixed to work with nmap 3.95.
tags | tool, scanner
systems | unix
MD5 | 30753280dca24fec8caeb148dbdda34b
Nixory_0.3.8.zip
Posted Dec 28, 2005
Authored by Alfredo Spadafina | Site nixory.sourceforge.net

Nixory is an innovative, fast, and powerful anti-spyware program, with a user-friendly graphical interface. It protects Mozilla Firefox from dangerous spyware and harmful cookies. Platform independent source zip file.

Changes: Update function improvements. Code bug fixes.
MD5 | c73f55fc030a12aacff4c8f49bb74e0d
VolksbankXSS.txt
Posted Dec 28, 2005
Authored by Constantin.Hofstetter | Site consti.de

Germanys second largest financial institute's ebanking portal (Volksbank Raiffeisenbank) suffers from several XSS vulnerabilities.

tags | advisory, vulnerability
MD5 | 1d3b400abb0617f010c2ba04ad5d8c14
iDEFENSE Security Advisory 2005-12-22.t
Posted Dec 28, 2005
Authored by iDefense Labs, iDefense | Site idefense.com

iDefense Security Advisory 12.22.05 - Local exploitation of a memory exhaustion vulnerability in Linux Kernel versions 2.4 and 2.6 can allow attackers to cause a denial of service condition.

tags | advisory, denial of service, kernel, local
systems | linux
MD5 | ae0da6b27e3184469496ff5e9ea356c2
libdejector-pg-80x-1.0.tar.bz2
Posted Dec 28, 2005
Authored by rjh | Site sourceforge.net

Libdejector provides a simple, easy-to-use set of libraries that help Web developers give their database queries a great degree of resistance to SQL injection attacks. It currently provides Python bindings to protect PostgreSQL 8.0.3 through 8.0.5.

tags | web, sql injection, python, library
MD5 | 10fddba11594fc28549801638e32bbcd
VirusScanEnterprise8.0i.txt
Posted Dec 28, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5) suffer from a privilege escalation vulnerability in the naPrdMgr.exe program. POC provided.

tags | advisory
MD5 | ea4eef506046f0eda7a4cf6dc4ab191f
alph-0.15.tar.gz
Posted Dec 28, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Fixed help displacement. Removed TEA. Added permutations support. Updated manpage. Implemented/ported several hashing functions.
tags | encryption
MD5 | e694effab8801e504b5ea683bb0f33ff
p3scan-2.3.2.tar.gz
Posted Dec 28, 2005
Authored by Alan DeKok | Site striker.ottawa.on.ca

Pscan checks C source code for problematic uses of printf style functions such as "sprintf(buffer, variable)", which have been the source of many security holes. It does not check for buffer overflows or other misuse of function parameters.

Changes: Update RipMIME to 1.4.0.6. Various bug fixes.
tags | overflow
systems | unix
MD5 | 9f8decc7d4701228788e3c8717096ca0
aimsniff-1.0alpha.tar.gz
Posted Dec 28, 2005
Site sourceforge.net

AIM Sniff is a utility for monitoring and archiving AOL Instant Messenger messages across a network which has the ability to do a live dump (actively sniff the network) or read a PCAP file and parse the file for IM messages. You also have the option of dumping the information to a MySQL database or STDOUT. AIM Sniff will also monitor for an AIM login and then perform an SMB lookup on the originating computer in order to match NT Domain names with AIM login names (handles). A basic Web frontend is included.

Changes: Various enhancements.
tags | tool, web, sniffer
MD5 | 17734c6209dbd2632daf7e295a8a830a
plash-1.15.tar.gz
Posted Dec 28, 2005
Authored by Mark Seaborn | Site cs.jhu.edu

Plash (the Principle of Least Authority Shell) is a Unix shell that lets you run Unix programs with access only to the files and directories they need to run. In order to implement this, the filesystem is virtualized. Each process can have its own namespace, which can contain a subset of your files. Plash is implemented by modifying GNU libc and replacing the system calls that use filenames. For example, open() is changed so that it sends a message to a file server via a socket. If the request is successful, the server sends the client a file descriptor. Processes are run in a chroot jail under dynamically-allocated user IDs. No kernel modifications are required. Existing Linux binaries work unchanged.

Changes: Various enhancements and fixes.
tags | tool, shell, kernel
systems | linux, unix
MD5 | f5b7fe95fbebc5dfb6063eab4e074b63
httprint_win32_301.zip
Posted Dec 28, 2005
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Windows release.

Changes: New multi-threaded engine. SSL in formation gathering. Automatic SSL port detection. Various bug fixes.
tags | web
systems | windows
MD5 | a66408308c3f540030bbb0d59716b032
httprint_macosx_301.zip
Posted Dec 28, 2005
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Mac OS-X release.

Changes: New multi-threaded engine. SSL in formation gathering. Automatic SSL port detection. Various bug fixes.
tags | tool, web, scanner
systems | unix, apple, osx
MD5 | 6b188cd60df6eca5409694fa40859f0d
httprint_linux_301.zip
Posted Dec 28, 2005
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Linux release.

Changes: New multi-threaded engine. SSL in formation gathering. Automatic SSL port detection. Various bug fixes.
tags | tool, web, scanner
systems | linux, unix
MD5 | af53704de9c1851bd439cbe3fab3e0ad
httprint_freebsd_301.zip
Posted Dec 28, 2005
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the FreeBSD release.

Changes: New multi-threaded engine. SSL information gathering. Automatic SSL port detection. Various bug fixes.
tags | tool, web, scanner
systems | unix, freebsd
MD5 | d5efd9463f671ce92f50ce3222f1774e
NCISACIS-CFP.txt
Posted Dec 28, 2005
Authored by Jeimy J. Cano

The Sixth National Computer and Information Security Conference ACIS 2006 (NCIS 2006) invites all researchers and practitioners to submit research papers in security topics.

tags | paper, conference
MD5 | 9e671aa17f86dec1310fec363084f1cd
ciscoACS.txt
Posted Dec 28, 2005
Authored by Oleg Tipisov

Cisco PIX / CS ACS suffers from a downloadable RADIUS ACLs vulnerability.

tags | advisory
systems | cisco
MD5 | 650afb79cee4c777464799dd809a426f
fetchmail-SA-2005-03.txt
Posted Dec 28, 2005
Authored by Fetchmail | Site fetchmail.berlios.de

Fetchmail contains a bug that causes an application crash when fetchmail is configured for multidrop mode and the upstream mail server sends a message without headers. As fetchmail does not record this message as "previously fetched", it will crash with the same message if it is re-executed, so it cannot make progress. A malicious or broken-into upstream server could thus cause a denial of service in fetchmail clients.

tags | advisory, denial of service
MD5 | 9fd1c7946200ec534737f05a523b2822
Ubuntu Security Notice 232-1
Posted Dec 28, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-232-1 - Eric Romang discovered a local Denial of Service vulnerability in the handling of the 'session.save_path' parameter in PHP's Apache 2.0 module. By setting this parameter to an invalid value in an .htaccess file, a local user could crash the Apache server.

tags | advisory, denial of service, local, php
systems | linux, ubuntu
MD5 | b8dd2c1e22a074909e36ec6274bf334a
Ubuntu Security Notice 231-1
Posted Dec 28, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-231-1 - Updated kernel packages fix numerous problems.

tags | advisory, kernel
systems | linux, ubuntu
MD5 | 5d5fd7366437072fd94d3706dce25d56
Mandriva Linux Security Advisory 2005.238
Posted Dec 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A CRLF injection vulnerability in the mb_send_mail function in PHP before 5.1.0 might allow remote attackers to inject arbitrary e-mail headers via line feeds (LF) in the "To" address argument, when using sendmail as the MTA (mail transfer agent).

tags | advisory, remote, arbitrary, php
systems | linux, mandriva
MD5 | c77e7aaad8a89e8fec1bbba338b1a5da
Mandriva Linux Security Advisory 2005.237
Posted Dec 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A buffer overflow in cpio 2.6 on 64-bit platforms could allow a local user to create a DoS (crash) and possibly execute arbitrary code when creating a cpio archive with a file whose size is represented by more than 8 digits.

tags | advisory, overflow, arbitrary, local
systems | linux, mandriva
MD5 | 430b84c4131f42e2050059423f2d6fda
Mandriva Linux Security Advisory 2005.236
Posted Dec 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a DoS (application crash) by sending messages without headers from upstream mail servers.

tags | advisory, remote
systems | linux, mandriva
MD5 | 0c800575e19fce2fe71329e23129037b
Page 1 of 4
Back1234Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    9 Files
  • 10
    Jul 10th
    7 Files
  • 11
    Jul 11th
    4 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close