what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-03-12

listener-0.4.tgz
Posted Mar 12, 2004
Authored by Folkert van Heusden | Site vanheusden.com

This program listens for sound. If it detects any, it starts recording automatically and also automatically stops when things become silent again.

Changes: If the sound ends, one can now let an external script/program be executed. Samples can now be compressed with several compression schemes.
systems | linux
SHA-256 | 04cf289583b05882168daf3389154243157121ae87c09f2719deb24c322efbbc
os-sim-0.9.1.tar.gz
Posted Mar 12, 2004
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Bug fixes.
tags | system logging
systems | linux, unix
SHA-256 | 7e5a0f94190655f731d026d3e6a77d99340c84b8f759db1e3c04a8c272afbfda
eckbox-v0.9b2.tar.bz2
Posted Mar 12, 2004
Authored by Nick Rupert | Site eckbox.sourceforge.net

Eckbox is van Eck phreaking software. It interprets a radio signal emanating from a computer's monitor to recreate the image (in black and white) that is displayed on it. This could be used as a valuable security tool for testing otherwise secure computers, or for developing hardware and software to counter this type of remote shoulder-surfing.

tags | remote
systems | unix
SHA-256 | 8cffcc5c970467fe2414deedfdb0a9281ff8f7cfe8584a1398f8e9675585c3a8
Pegasi022.txt
Posted Mar 12, 2004
Authored by Donato Ferrante | Site autistici.org

Pegasi Web Server aka PWS version 0.2.2 is susceptible to cross site scripting and directory traversal attacks due to a lack of input validation.

tags | exploit, web, xss
SHA-256 | ccd71dc5d0be8fa6f24ab7dc8902149371dfd6778c4a2812f4af37674bae8aa3
MyProxy20030629.txt
Posted Mar 12, 2004
Authored by Donato Ferrante | Site autistici.org

Due to a lack of proper input validation, cross site scripting flaws exist in MyProxy version 20030629.

tags | advisory, xss
SHA-256 | 41078aa5f506cbca271a880e944289d5e7e8c02397ef7ddf52bcaf65a7a9f401
hushmail_09-03-04.txt
Posted Mar 12, 2004
Authored by Calum Power

Various cross site scripting vulnerabilties exist in the hushmail.com site.

tags | advisory, xss
SHA-256 | d73566f676dd22af7f5a456848424ab6e59187f352f2cd0df4f994f998c084bd
CPANEL-2004:01-01.txt
Posted Mar 12, 2004
Authored by J. Nick Koston | Site support.cpanel.net

cPanel Security Advisory - CPANEL-2004:01-01 - When trying to change a user password in cPanel 8.x.x, it is possible to execute commands as root. cPanel suggests that administrators disable this feature until a fixed version is released.

tags | advisory, root
SHA-256 | de07214fb14cedfac34abe7008de692d19d39c9a9c15972e2b70d9b2a04ff003
cpanelroot.txt
Posted Mar 12, 2004
Authored by Arab VieruZ

When trying to change a user password in Cpanel 8.x.x, it is possible to execute commands as root. Exploitation included.

tags | exploit, root
SHA-256 | b0fe35e9a94148384b318c44d5d223fd32ceb4ef21173dbdf28866c4156cc642
battlemagy.zip
Posted Mar 12, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Exploit for testing a specific server to see if it is susceptible to a denial of service vulnerability found in Battle Mages versions 1.0 for Windows.

tags | exploit, denial of service
systems | windows
SHA-256 | d2b584ade89590a754df4dbb854ff00858da8fc92a75afa919ef94377d3fc991
battlemages-adv.txt
Posted Mar 12, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Battle Mages versions 1.0 for Windows is vulnerable to a denial of service server freeze. It infinitely loops when trying to read an expected data block after being sent incomplete data.

tags | advisory, denial of service
systems | windows
SHA-256 | a1218e65d7cbe334c606426ef75b9583a74defddc3520cbb77e1caccfb06cab3
adore-ng-0.41.tgz
Posted Mar 12, 2004
Authored by teso, stealth | Site team-teso.net

Adore is a Linux LKM based rootkit for Linux v2.[246]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Ported to 2.6 and fixed a buffer overflow from version 0.32.
systems | linux
SHA-256 | f7f3132f7abb9f75bf1761c20916f778d3487efed3356124798ff769d61224c4
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close