exploit the possibilities
Showing 76 - 100 of 100 RSS Feed

Files

OpenEMR 5.0.0 Command Injection / Cross Site Scripting
Posted Dec 4, 2017
Authored by Fikri Fadzil, Wan Ikram, Jasveer Singh | Site sec-consult.com

OpenEMR version 5.0.0 suffers from code execution and cross site scripting vulnerabilities.

tags | exploit, vulnerability, code execution, xss
SHA-256 | cb323afd4eb9936c8fd21b2415f3e7b565e714471a0bae50bb61af03fdd63c92

Related Files

satan-1.1.1.tar.gz
Posted Aug 17, 1999

Security Administrator's Tool for Analyzing Networks version 1.1.1

tags | tool, scanner
systems | unix
SHA-256 | 3eeb23c00d531e23e51a8e29751b61e3efd38edbe69a48fd50f0b584d364ffe0
satan-1.1.4exp.tar.gz
Posted Aug 17, 1999

Security Administrator's Tool for Analyzing Networks version 1.1.4exp

tags | tool, scanner
systems | unix
SHA-256 | 2bfefcc953da18360a4301592be71ae1313b124664c029026f0f0aaaeb42867e
SATAN_Extensions.tar.gz
Posted Aug 17, 1999

Extensions for SATAN.

tags | tool, scanner
systems | unix
SHA-256 | 3bc23a9fe4d63e0e4da67cefc55f4191fcfdd2bac8b26a84f1889c917166436d
satan-1.0.tar.Z
Posted Aug 17, 1999

Security Administrator's Tool for Analyzing Networks version 1.0

tags | tool, scanner
systems | unix
SHA-256 | fe4d86822aebebd782f62cdf32ee75ac1236c2764f5e57a097582a185d71edfe
satools-1.5.tar.gz
Posted Aug 17, 1999
Authored by Lars Berntzon

satools 1.5 is a set of tools to help system administrators to control and administrate large networks of UNIX machines. It is specially useful if most, but not quite all, machines are configured equally. It allows the administrator to have control of all system files on all hosts on one central point. It is also an automatic machines inventory tool and database which can store both manual and automatic data. Tested on Linux and Solaris platforms.

tags | tool
systems | linux, unix, solaris
SHA-256 | 445f507611d1e9c3d6e540f1dc4038b3fc12a10bc4ceea2522ec90aabf46a54f
safeload.c
Posted Aug 17, 1999

SafeLoad is buffer overflow wrapper for suid programs.

tags | tool, overflow
systems | unix
SHA-256 | 8d29e7510ada3f3bfe07b9619cbbf60a5e613d09f89c9fe56aac6e3e3e24ded4
sanitize-1.0.tar.Z
Posted Aug 17, 1999
Authored by Lawrence Berkeley National Laboratory

A collection of shell scripts for "sanitizing" tcpdump trace files to address privacy and security concerns.

tags | shell, system logging
systems | unix
SHA-256 | da5f261ef070fb18aaf0a2036b9d506d092ecf683bae157ad8521ccf95290c92
sara-2.0.6.tar.gz
Posted Aug 17, 1999
Authored by Advanced Research Corporation

SARA v2.0.6 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.

tags | tool, remote, overflow, arbitrary, shell, cgi, scanner, vulnerability
systems | unix
SHA-256 | f3d92f684d08884012e8aa42642d6a6080a19ca16a145a70859ba383ad09c44e
saint-1.3.8.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 61940d66fb84a4ce8038009b25c4d657c48143ba13615449e44edccf3d19d1fa
saint-1.3.9.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 0d91eeb77f04aadfcf55d79b709df59678bf94f0ea3fcdbd7c2178f920ce92e0
sara-2.0.5.tar.gz
Posted Aug 17, 1999
Authored by Advanced Research Corporation

SARA v2.0.5 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.

Changes: Now compiles under Red Hat 6.0, fixed bug in login.sara.
tags | tool, remote, overflow, arbitrary, shell, cgi, scanner, vulnerability
systems | unix
SHA-256 | ac43549c160c7e8910c611056c2fc242b8af6054980a18713656cf45464efeb5
sara-2.0.2.tar.gz
Posted Aug 17, 1999
Authored by Advanced Research Corporation

SARA v2.0.2 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.

tags | tool, remote, overflow, arbitrary, shell, cgi, scanner, vulnerability
systems | unix
SHA-256 | c11cc04d682e421daca393f631ccdd4f4ba9e92966a47d9354c881ee7d161c34
sara-2.0.3.tar.gz
Posted Aug 17, 1999
Authored by Advanced Research Corporation

SARA v2.0.3 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.

tags | tool, remote, overflow, arbitrary, shell, cgi, scanner, vulnerability
systems | unix
SHA-256 | d9ccc5d0f69e8f9e3b50d9c94445defbb0224ddbff75161b9c81d8fa2d79ad07
sara-2.0.4.tar.gz
Posted Aug 17, 1999
Authored by Advanced Research Corporation

SARA v2.0.4 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.

Changes: added ftp bounce test, added mail relay test, improved login.sara, improved timeouts for various tests, improved http.sara tests.
tags | tool, remote, overflow, arbitrary, shell, cgi, scanner, vulnerability
systems | unix
SHA-256 | 99e993bbbdd19e437966ac7e0cfd59cfa981e29ade2aaeb82d04438a83cb61b9
saint-1.3.7.beta2.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | b3a42411e514959b66196070b96a27510ff53973a9430644a6f173c3ffb502f7
saint-1.3.7.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | af327e3560fac539ab4476e05d5d370022f9e9883f77b1a6d5b709001ab90631
saint-1.3.7.beta.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 909c09d518bc314fe950048516457b3bff007756e4c951e38fa01fdd03f233b5
saint-1.3.6.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 85571f0f6a2eb6df8e0bbe86f497b4a1b0828829adba4d44b20294e8ccd41b56
saint-1.3.3.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 597c56f2b4d02994605bf41b6d040f01a87f8ad659ea6edd05f8d5db76e1211a
saint-1.3.4.tar.gz
Posted Aug 17, 1999
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | e951b5e919d2073721556785cd766e99cd55cb01f2a33734c1180af5f939cb9d
samgrab.zip
Posted Aug 17, 1999
Authored by magic

SamGrab is a tool to quickly extract SAM databases from NTFS volumes. It is effective against both workstation and server versions and can be placed on a boot disk and imitate a normal boot procedure while extracting the SAM databases.

SHA-256 | 3515846c3cfe81d6ac794c2084e9806324398ba9144d1e3763d8c7fd24b0a62b
samdump.extract.sam.info.zip
Posted Aug 17, 1999

Extract SAM info from samdump.

SHA-256 | f112b21aff11083ddbb7ef109399104f9194aa3ef257d996ac5e0fd5e0a39d1b
sans-v2n3.txt
Posted Aug 17, 1999
Authored by The SANS Institute

The latest issue of The SANS NT Digest (v2n3). Includes information about Microsoft Security Bulletins, MS Hotfixes, Other NT Issues, IIS Issues, Third-party Software issues, Trojans, and an excellent description of the NT Resource Kit and UNIX commands available for NT.

tags | trojan
systems | unix
SHA-256 | a3fd11eb7d5fee0326445d9345e8fd6441e46810437309f7281c3d24db5107cd
SAFER+attack.txt
Posted Aug 17, 1999

Two academic attacks on the key schedules of block ciphers on the SAFER+ algorithm version with 256-bit keys, demonstrating a fundamental weakness in the SAFER+ key schedule design.

tags | exploit
SHA-256 | 3e62e304ea60518ef840caddd25a36bfb417d14c59e12582233a75a1ef9d50d1
sans.sec-v3n5.txt
Posted Aug 17, 1999

May SANS Security Digest Vol.3 Num.5 - the latest issue of the excellent, comprehensive SANS Security Digest, with information regarding Intrusion Detections and security issues and general info for all major operating systems. SANS

tags | exploit
SHA-256 | 8bc0349eb5f8391bc179497dee82698e4b0aa0e0cc3953c654762aed0fbf68e3
Page 4 of 4
Back1234Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close