exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2001-11-20

Internet Security Systems Security Advisory November 20, 2001
Posted Nov 20, 2001
Site iss.net

Internet Security Systems (ISS) X-Force has discovered a vulnerability in the HP-UX line printer daemon (rlpdaemon). This vulnerability may allow a remote or local attacker to execute arbitrary code with superuser privilege.

tags | remote, arbitrary, local, root
systems | hpux
SHA-256 | fc8855c32af05bfe561174dc0946a2ed415b60808e50f138370be7dc3d2426dc
Posted Nov 20, 2001
Site qdefense.com

qDefense Security Advisory QDAV-2001-11-1 - A vulnerability in Hypermail SSI has been discovered that allows users to execute arbitrary commands on a server running Hypermail and SSI.

tags | arbitrary
SHA-256 | 1f00acda38a91de5892bf56ba2d321748d458c17881de94dda4ec2e0d925c6d9
Posted Nov 20, 2001
Site microsoft.com

Microsoft Security Advisory MS01-056 - A buffer overflow in the handling of ASF files was discovered in Windows Media Player 6.4, allows remote attackers to execute of arbitrary code with the privileges of the user running a specially crafted ASF file. Anyone running versions 6.4, 7, or 7.1 is affected.

tags | remote, overflow, arbitrary
systems | windows
SHA-256 | e6c8b663e12c7020989589d518ede4f01f13fbc872e51249b2a57769ebc3249a
Posted Nov 20, 2001
Site iSecureLabs.com

iSecureLabs Security Advisory - Cabezon Aurelien has discovered a vulnerability in the Network Tool 0.2 Addon for PHPNuke that allows remote users to run arbitrary commands with the privileges of the httpd daemon, thanks to the failure of the addon to filter shell meta-characters.

tags | remote, arbitrary, shell
SHA-256 | 793e2c2c5f0e428af223241b631f0f5aa4c00fbb72c90e0e4b899fb9bbc0d1f1
Posted Nov 20, 2001
Site iSecureLabs.com

iSecureLabs Security Advisory - Cabezon Aurelien has discovered a reverse directory traversal vulnerability in the Gallery Addon for PHPNuke that allows users to view arbitrary files on the remote system that are owned or readable by the httpd daemon.

tags | remote, arbitrary
SHA-256 | fb56723b90987185c743733ccbeb618508f8f8601f8af9aefd50e2cfd6a70c9d
SGI Security Advisory 20011101-01-I
Posted Nov 20, 2001
Site sgi.com

SGI Security Advisory 20011101-01-I - Multiple local Sendmail vulnerabilities have been discovered, potentially causing information loss, disclosure of possibly sensitive information, and possible mail system compromise. Affected versions include all Sendmail versions prior to 8.12.1 without the "RestrictQRun" option enabled.

tags | local, vulnerability
SHA-256 | 0bb90dd02aa4d1ebe8eecbb55fa74f395f0e1610f305f926cc0eb9b53a9475d0
Posted Nov 20, 2001
Authored by Pilot | Site monkey.org

Arirang is a powerful webserver security scanner with many features. Checks over 700 vulnerabilities.

tags | cgi, vulnerability
systems | unix
SHA-256 | f2a7a1591d5801786fd38bc50b816071eedf69d7db14a5039f15f0f3d05b65cb
Posted Nov 20, 2001
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: A problem in checksum functions was fixed and minor feature enhancements were added.
tags | udp, tcp
systems | unix
SHA-256 | 69c7166aa92aa5ff96825b882a68fbedb6d3678ed2cbd63d8072ec2a447669ba
Posted Nov 20, 2001
Site sourceforge.net

IP Accounter is an IP accounting package for Linux. It collects, summarizes, and nicely displays IP accounting data. Its output can be a simple ASCII table, or graph images. Ipchains and iptables are supported. Logs are stored in files, gdbm, or even a PostgreSQL database.

Changes: Many little patches and fixes were added.
systems | linux
SHA-256 | cf6e02322b7f2b263433d8c97a4cc3e8456b6c406ac7f9fe38bed34bce71046d
Posted Nov 20, 2001
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: A solaris compile fix.
tags | tool
systems | unix
SHA-256 | 73a7d6c576f813710a76ad482b8e167d00beaa3193612d4d1f1a3bec08dfec93
Posted Nov 20, 2001
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and Cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Small fixes in whois code, mode selection, endianness, and realtime response with destination port distinction.
tags | tool, firewall
systems | cisco, unix
SHA-256 | b7cf234b303157f154dc27868cb784b0ccac2eb0799f29311afd4309c2c015d2
Posted Nov 20, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: Speed-ups to configuration file parsing, and some other minor improvements.
systems | unix, bsd
SHA-256 | 12056fffe29840e8ed48231a0859e2d669c6279581c0927ef6dc72e62b411320
Page 1 of 1

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    19 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By