exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files Date: 2001-12-21

ms01-060
Posted Dec 21, 2001

Microsoft Security Advisory MS01-060 - SQL Server 7.0 and 2000 have several vulnerabilities. Some allow remote code execution while others are denial of service attacks. An attacker could exploit the vulnerabilities in either of two ways. The most direct way would be for the attacker to simply load and execute a database query that calls one of the affected functions. Alternatively, if a web site or other database front-end would accept and process arbitrary queries, it could be possible for the attacker to provide inputs that would cause the query to call an affected function with the appropriate parameters. Microsoft FAQ on this issue available here.

tags | remote, web, denial of service, arbitrary, vulnerability, code execution
SHA-256 | 0530d56484cb8b2a5215cdfe4eb3ed9d93faf7299a0ea4afaab538a52aa688f5
ms01-059
Posted Dec 21, 2001

Microsoft Security Advisory MS01-059 - Two unrelated buffer overflows have been found in the Microsoft UPnP service. A overflow in the NOTIFY directive allows remote attackers to execute arbitrary code. The second vulnerability crashes the machine. Windows ME and XP include native UPnP services; Windows 98 and 98SE do not include a native UPnP service, but one can be installed. Microsoft FAQ on this issue available here.

tags | remote, overflow, arbitrary
systems | windows
SHA-256 | a44bee6a9162db8db90b17837abd4cad322825fb0c509ebb1aad45b1e928b6cc
ftester-0.4.tar.gz
Posted Dec 21, 2001
Authored by Andrea Barisani

The Firewall Tester consists of two simple perl scripts, the client part (ftest.pl) and the listening "daemon" (ftestd.pl). The client injects custom marked packets, while the daemon listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall.

Changes: Added command line packet injection option, packets are now tracked also with IP ID field, added freport for automatically parse ftest and ftestd log files. Requires: Net::RawIP, Net::PcapUtils, Net::Packet.
tags | tool, perl, firewall
systems | unix
SHA-256 | 53aba6a00e93b66c9d0092c9704525d2851c6e2f20d70e521e5046590cf7376d
sec-2.0.tar.gz
Posted Dec 21, 2001
Authored by Risto Vaarandi | Site kodu.neti.ee

Sec is a free and platform independent event correlation tool that was designed for network and application management, but it can be applied for solving any other task where similar event correlation operations are relevant. Since sec uses powerful regular expression concept for matching input and also supports named pipes as input files, it can not merely be used for matching events from a single logfile, but also for more general purposes. You can integrate sec with arbitrary network management (or other) application, provided that output from that application can be directed to a named pipe, which most modern network management platforms provide. Written in perl, works on Unix and Windows. FAQ here.

tags | arbitrary, perl, system logging
systems | windows, unix
SHA-256 | 207a4804d03e2d8b75b7babeaa2ffa17d2483ed2719354c92c2d8ed7e76345ac
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close