OpenEMR version 5.0.0 suffers from code execution and cross site scripting vulnerabilities.
cb323afd4eb9936c8fd21b2415f3e7b565e714471a0bae50bb61af03fdd63c92
Security Administrator's Tool for Analyzing Networks version 1.1.1
3eeb23c00d531e23e51a8e29751b61e3efd38edbe69a48fd50f0b584d364ffe0
Security Administrator's Tool for Analyzing Networks version 1.1.4exp
2bfefcc953da18360a4301592be71ae1313b124664c029026f0f0aaaeb42867e
Extensions for SATAN.
3bc23a9fe4d63e0e4da67cefc55f4191fcfdd2bac8b26a84f1889c917166436d
Security Administrator's Tool for Analyzing Networks version 1.0
fe4d86822aebebd782f62cdf32ee75ac1236c2764f5e57a097582a185d71edfe
satools 1.5 is a set of tools to help system administrators to control and administrate large networks of UNIX machines. It is specially useful if most, but not quite all, machines are configured equally. It allows the administrator to have control of all system files on all hosts on one central point. It is also an automatic machines inventory tool and database which can store both manual and automatic data. Tested on Linux and Solaris platforms.
445f507611d1e9c3d6e540f1dc4038b3fc12a10bc4ceea2522ec90aabf46a54f
SafeLoad is buffer overflow wrapper for suid programs.
8d29e7510ada3f3bfe07b9619cbbf60a5e613d09f89c9fe56aac6e3e3e24ded4
A collection of shell scripts for "sanitizing" tcpdump trace files to address privacy and security concerns.
da5f261ef070fb18aaf0a2036b9d506d092ecf683bae157ad8521ccf95290c92
SARA v2.0.6 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.
f3d92f684d08884012e8aa42642d6a6080a19ca16a145a70859ba383ad09c44e
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
61940d66fb84a4ce8038009b25c4d657c48143ba13615449e44edccf3d19d1fa
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
0d91eeb77f04aadfcf55d79b709df59678bf94f0ea3fcdbd7c2178f920ce92e0
SARA v2.0.5 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.
ac43549c160c7e8910c611056c2fc242b8af6054980a18713656cf45464efeb5
SARA v2.0.2 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.
c11cc04d682e421daca393f631ccdd4f4ba9e92966a47d9354c881ee7d161c34
SARA v2.0.3 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.
d9ccc5d0f69e8f9e3b50d9c94445defbb0224ddbff75161b9c81d8fa2d79ad07
SARA v2.0.4 - The Security Auditor's Research Assistant (SARA) is a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. The author of SAINT, Bob Todd, recently joined Advanced Research and has been working non-stop to evolve SATAN and the original SAINT concept to a community oriented product (i.e, SARA) which will be available to all. Advanced Research's philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior "Operating System fingerprinting". Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA's features include ( the [SARA] indicates that this is a new or improved feature when compared to SAINT or SATAN): Built-in report writer (by subnet or by database) [SARA], Built-in summary table generator [SARA], Gateway to external programs (e.g., NMAP) [SARA], CGI-BIN vulnerability testing (Unix and IIS) [SARA], SSH buffer overflow vulnerabilities [SARA], Current Sendmail vulnerabilities [SARA], IMAPD/POPD buffer overflow vulnerabilities [SARA], Current FTP and WU-FTP vulnerabilities [SARA], Tooltalk buffer overflow vulnerbilities [SARA], Netbus, Netbus-2, and Back Orifice vulnerabilities [SARA], Improved Operating System fingerprinting [SARA], Firewall-aware [SARA], Weekly updates [SARA], Probing for non-password accounts [SARA], NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.
99e993bbbdd19e437966ac7e0cfd59cfa981e29ade2aaeb82d04438a83cb61b9
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
b3a42411e514959b66196070b96a27510ff53973a9430644a6f173c3ffb502f7
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
af327e3560fac539ab4476e05d5d370022f9e9883f77b1a6d5b709001ab90631
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
909c09d518bc314fe950048516457b3bff007756e4c951e38fa01fdd03f233b5
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
85571f0f6a2eb6df8e0bbe86f497b4a1b0828829adba4d44b20294e8ccd41b56
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
597c56f2b4d02994605bf41b6d040f01a87f8ad659ea6edd05f8d5db76e1211a
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
e951b5e919d2073721556785cd766e99cd55cb01f2a33734c1180af5f939cb9d
SamGrab is a tool to quickly extract SAM databases from NTFS volumes. It is effective against both workstation and server versions and can be placed on a boot disk and imitate a normal boot procedure while extracting the SAM databases.
3515846c3cfe81d6ac794c2084e9806324398ba9144d1e3763d8c7fd24b0a62b
Extract SAM info from samdump.
f112b21aff11083ddbb7ef109399104f9194aa3ef257d996ac5e0fd5e0a39d1b
The latest issue of The SANS NT Digest (v2n3). Includes information about Microsoft Security Bulletins, MS Hotfixes, Other NT Issues, IIS Issues, Third-party Software issues, Trojans, and an excellent description of the NT Resource Kit and UNIX commands available for NT.
a3fd11eb7d5fee0326445d9345e8fd6441e46810437309f7281c3d24db5107cd
Two academic attacks on the key schedules of block ciphers on the SAFER+ algorithm version with 256-bit keys, demonstrating a fundamental weakness in the SAFER+ key schedule design.
3e62e304ea60518ef840caddd25a36bfb417d14c59e12582233a75a1ef9d50d1
May SANS Security Digest Vol.3 Num.5 - the latest issue of the excellent, comprehensive SANS Security Digest, with information regarding Intrusion Detections and security issues and general info for all major operating systems. SANS
8bc0349eb5f8391bc179497dee82698e4b0aa0e0cc3953c654762aed0fbf68e3