what you don't know can hurt you
Showing 1 - 25 of 25 RSS Feed

Files from Ben Williams

First Active2000-12-06
Last Active2012-12-01
Symantec Messaging Gateway 9.5.3-3 Cross Site Request Forgery
Posted Dec 1, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 533bca3177ffec772a849ef04d15cef3
Symantec Messaging Gateway 9.5.3-3 Arbitrary File Download
Posted Dec 1, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from an authenticated arbitrary file download vulnerability.

tags | exploit, arbitrary
MD5 | 316a63fca58f044037fb34f22453b80d
Symantec Messaging Gateway Backdoor / Privilege Escalation
Posted Nov 30, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from backdoor account and privilege escalation vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2007-4573, CVE-2008-0009, CVE-2008-4210, CVE-2009-1046, CVE-2009-1337, CVE-2009-2692, CVE-2009-3547, CVE-2010-1146, CVE-2010-2959, CVE-2010-3848, CVE-2010-3849, CVE-2010-3850, CVE-2010-3904, CVE-2010-4073, CVE-2010-4258, CVE-2010-4347
MD5 | e1a9b2ba54c980d0ecd312d2a5ed1672
Symantec Messaging Gateway 9.5.3-3 Cross Site Scripting
Posted Sep 18, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from an out-of-band stored cross site scripting vulnerability via email. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory, xss
MD5 | 3975238671a8b47e5bc448e219ebfabe
Symantec Messaging Gateway 9.5.3-3 Arbitrary File Download
Posted Sep 18, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from an authenticated arbitrary file download vulnerability. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory, arbitrary
MD5 | 2b91c1f139c0f6dcdec40664ba5dac47
Symantec Messaging Gateway 9.5.3-3 Unauthorized SSH Access
Posted Sep 18, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from an unauthorized ssh access vulnerability. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory
MD5 | 37a236641d4118ea0aeb70c6520b9259
Symantec Messaging Gateway 9.5.3-3 Cross Site Request Forgery
Posted Sep 18, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from a cross site request forgery vulnerability. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory, csrf
MD5 | 8e6e15cf34e3afa61786045123624764
Symantec Messaging Gateway 9.5.3-3 Disclosure
Posted Sep 18, 2012
Authored by Ben Williams | Site nccgroup.com

Symantec Messaging Gateway version 9.5.3-3 suffers from an unauthenticated detailed version disclosure vulnerability. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory
MD5 | 367e6d7ecd5e249203c321bd413cfb98
Symantec Messaging Gateway 9.5 Default SSH Password
Posted Sep 6, 2012
Authored by Ben Williams, sinn3r, Stefan Viehbock | Site metasploit.com

This Metasploit module exploits a default misconfiguration flaw on Symantec Messaging Gateway. The 'support' user has a known default password, which can be used to login to the SSH service, and gain privileged access from remote.

tags | exploit, remote
advisories | CVE-2012-3579, OSVDB-85028
MD5 | 863c340d7696860e8e64d03efd4da61e
Websense (Triton 7.6) Stored Cross Site Scripting
Posted May 2, 2012
Authored by Ben Williams | Site ngssoftware.com

Websense (Triton version 7.6) suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | e22f9e5d133175aeae73fb7425430e73
Websense (Triton 7.6) Remote Command Execution
Posted May 2, 2012
Authored by Ben Williams | Site ngssoftware.com

Websense (Triton version 7.6) suffers from an unauthenticated remote command execution vulnerability as SYSTEM.

tags | exploit, remote
MD5 | 5b920b1d1d54d946744dca36ca5eb9b8
Websense (Triton 7.6) Authentication Bypass
Posted May 2, 2012
Authored by Ben Williams | Site ngssoftware.com

Websense (Triton version 7.6) suffers from an authentication bypass vulnerability in the report management UI.

tags | exploit, bypass
MD5 | 95c35e7dca133ded811d4ac9798a6f6f
Websense (Triton 7.6) Cross Site Scripting
Posted May 2, 2012
Authored by Ben Williams | Site ngssoftware.com

Websense (Triton version 7.6) suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7af382c6a0fd4820cc439d26949ef3a7
McAfee Email And Web Security Appliance File Download
Posted Mar 30, 2012
Authored by Ben Williams | Site ngssoftware.com

McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a file download vulnerability.

tags | advisory, web
MD5 | fd3c97933b5e4eaeeb3e082d77599ff5
McAfee Email And Web Security Appliance Password Hash
Posted Mar 30, 2012
Authored by Ben Williams | Site ngssoftware.com

McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a password cracking vulnerability.

tags | advisory, web
MD5 | 2e3d83e6b63f5251af5466466fc54367
McAfee Email And Web Security Appliance Token Disclosure
Posted Mar 30, 2012
Authored by Ben Williams | Site ngssoftware.com

McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a token disclosure vulnerability.

tags | advisory, web
MD5 | ad937e7da13f3df45649c29b4b7cb4fa
McAfee Email And Web Security Appliance Access Bypass
Posted Mar 30, 2012
Authored by Ben Williams | Site ngssoftware.com

McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from an access bypass vulnerability.

tags | advisory, web, bypass
MD5 | c2252b4480902fc219074848b7a2edec
McAfee Email And Web Security Appliance Session Hijacking
Posted Mar 29, 2012
Authored by Ben Williams | Site ngssoftware.com

McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a session hijacking vulnerability.

tags | advisory, web
MD5 | cb3230483fa1f8d464cc26f666268888
McAfee Email And Web Security Appliance Cross Site Scripting
Posted Mar 29, 2012
Authored by Ben Williams | Site ngssoftware.com

McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a cross site scripting vulnerability.

tags | advisory, web, xss
MD5 | e9c4a3579c8bb63b059f6bf6a45bb81a
SIP Username Enumerator For Asterisk
Posted Dec 23, 2011
Authored by Ben Williams

This Metasploit module exploits a SIP username enumeration vulnerability in Asterisk. Performs a REGISTER scan for numeric peer usernames having a nat setting different to global sip nat setting. Works even when alwaysauthreject=yes. For this exploit to work, the source port cannot be 5060.

tags | exploit
advisories | CVE-2011-4597
MD5 | e15f3be4b3a7f945e728b57450d88497
Websense Triton 7.6 Stored Cross Site Scripting
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from a stored cross site scripting vulnerability.

tags | advisory, xss
MD5 | 320731af5854ced68370a05f819fc144
Websense Triton Command Execution
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from unauthenticated remote command execution vulnerability.

tags | advisory, remote
MD5 | 6095b673c35c8f0d399f7a617d7651e0
Websense Triton Cross Site Scripting
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from a reflective cross site scripting vulnerability.

tags | advisory, xss
MD5 | 2024371db0bdf16c748f5f6293e22f32
Websense Triton Authentication Bypass
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | 2125ebcc92542541adecab37a1c34a23
xlockfmt.c
Posted Dec 6, 2000
Authored by Ben Williams

Xlock local format string exploit for Linux/x86. Tested on Slackware 7.1 and Redhat 6.2.

tags | exploit, x86, local
systems | linux, redhat, slackware
MD5 | 04bc002415f0a468e6a3db68dfcbd7ff
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    16 Files
  • 22
    May 22nd
    3 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close