exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Ian Vitek

Email addressian.vitek at sigtrap.org
First Active2000-02-10
Last Active2004-09-15
iDEFENSE Security Advisory 2004-09-14.t
Posted Sep 15, 2004
Authored by Ian Vitek, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 09.14.04 - Local exploitation of a design error vulnerability in Networks Associates Technology Inc.'s McAfee VirusScan could allow attackers to obtain increased privileges. McAfee VirusScan version 4.5.1 running on Windows 2000 Professional and Windows XP Professional operating systems is vulnerable. It is suspected that McAfee VirusScan 4.5 is also vulnerable.

tags | advisory, local
systems | windows
advisories | CVE-2004-0831
SHA-256 | 07a63f3062f227327fe88d439d02b86ec30f9b7a0e2c503e4cc40fbc7148d85d
Nmap 3.48 Statistics Patch
Posted Dec 23, 2003
Authored by Ian Vitek | Site sekure.net

The Nmap 3.28 Statistics Patch adds the -c switch which guesses how much longer the scan will take, shows how many ports have been tested, resent, and the ports per second rate. Useful for scanning firewalled hosts.

tags | tool, nmap
systems | unix
SHA-256 | ea4f1b08c7795a3b387ea8ad7bc01d8df30e1ec9964d3b0da43604e5488c61da
compaq.txt
Posted Jun 30, 2003
Authored by Ian Vitek

The Compaq Web Based Management Agent is vulnerable to server side injection, stack overflows, access violations, and creation of script objects.

tags | exploit, web, overflow
SHA-256 | 1ac95b0059ba56c29c2e4bf897039346c99782f06b42f3096586c5b7e9ba6ee1
Nmap 3.20 Statistics Patch
Posted Apr 24, 2003
Authored by Ian Vitek | Site sekure.net

The Nmap 3.20 Statistics Patch adds the -c switch which guesses how much longer the scan will take, shows how many ports have been tested, resent, and the ports per second rate. Useful for scanning firewalled hosts.

tags | tool, nmap
systems | unix
SHA-256 | 4544455af5ab0ed47cbcb4e33e29760ad56ff4235407df2e003cab38ff519257
Nmap 3.10 ALPHA 4 Statistics Patch
Posted Dec 3, 2002
Authored by Ian Vitek | Site ixsecurity.com

The Nmap 3.10ALFA Statistics Patch adds the -c switch which guesses how much longer the scan will take, shows how many ports have been tested, resent, and the ports per second rate. Useful for scanning firewalled hosts.

tags | tool, nmap
systems | unix
SHA-256 | 94c4fefef066b8ce76d1da4b519182a6de4456eff0e64cf22418271eeeecf0cc
briiis-1.pl
Posted Jul 20, 2001
Authored by Ian Vitek

Briis-1.pl is a unicode / decode IIS attack tool which includes SSL support under Linux. Features many checks for CMD.EXE, Caches the found directory, SSL support with SSLeay (Unix), Easy to use text file upload, Easy to use / encoding option, Relative path name program execution, and Virtual host support. More info available here.

tags | exploit, file upload
systems | linux, unix
SHA-256 | 02d511ae9e47f8a3122d180ba75ec52c4603ad0f5b0dc7d8ad3579832c4c1fdc
iXsecurity.20001107.compaq-wbm.a
Posted Nov 14, 2000
Authored by Ian Vitek | Site ixsecurity.com

iXsecurity Security Vulnerability Report - The default installation of Compaq Web-Based Management on a Netware server reveals sensitive system files to anyone who can access TCP port 2301. Allows remote users to read the remote console password. Software version 2.28 verified vulnerable. Compaq advisory available here.

tags | exploit, remote, web, tcp
SHA-256 | 992ae643310081a28265d7edbe6fcf3cd675ed92732e4ecbee1271c805355517
Infosec.20000617.panda.a
Posted Jun 21, 2000
Authored by Ian Vitek

Novell Netware servers running Panda Antivirus allows attackers to run any command on a Netware console. By connecting to tcp port 2001, any Netware command can be executed with the CMD command.

tags | exploit, tcp
SHA-256 | aad9dfec4a844bfbe79f4e408d6d4c826689881644ed1413549f6b849935f2f1
Infosec.20000229.axisstorpointcd
Posted Mar 1, 2000
Authored by Ian Vitek

Infosec Security Vulnerability Report - Bypassing authentication on Axis StorPoint CD. By modifying an URL, outsiders can access administrator URLs without entering username and password, allowing unauthorized access.

tags | exploit
SHA-256 | a9d7c189d04d0c389c6bcf2a550c2260c1361e22b171c946fe4e997ba0df1b8a
axis700.txt
Posted Feb 10, 2000
Authored by Ian Vitek

Bypassing authentication on Axis 700 Network Scanner - By modifying an URL, outsiders can access administrator URLs without entering username and password. Tested on Axis 700 Network Scanner Server version 1.12.

tags | exploit
SHA-256 | 62be7cce360cae03aa7cf171c9411f06a344a3d1ae4af8abcb8218e26c1b8673
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close