exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2002-07-11

lsof_4.64.tar.gz
Posted Jul 11, 2002
Authored by Vic Abell

Lsof is an extremely powerful unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port. FAQ available here.

Changes: This release has various fixes and feature enhancements for FreeBSD, NetBSD, Darwin, OpenBSD, HP-UX, OpenUnix, and Solaris.
tags | tool, intrusion detection
systems | unix
SHA-256 | 7720fceff4e2052bd743ba4c6d29110e7fde5dc3615c90189669e0bbf07a24e8
CA-2002-20.tooltalk
Posted Jul 11, 2002
Site cert.org

CERT Advisory CA-2002-20 - Two serious remote vulnerabilities have been found in systems running CDE ToolTalk (rpc.ttdbserverd). The first vulnerability allows remote attackers to delete arbitrary files, cause a denial of service, or possibly execute arbitrary code or commands. The second vulnerability allows local attackers to overwrite arbitrary files with contents of the attacker's choice.

tags | remote, denial of service, arbitrary, local, vulnerability
SHA-256 | 22c0fd9625e7507ac7ba436ba2683fe7805e6397f326d1f3c38231551ea33b69
eeye.pgp.txt
Posted Jul 11, 2002
Authored by Marc Maiffret | Site eEye.com

Eeye Advisory - The NAI PGP Outlook plug-in in NAI PGP Freeware 7.0.3, PGP Personal Security 7.0.3, and PGP Desktop Security 7.0.4 contains a remotely exploitable heap overflow which can lead to code execution. NAI patch available here.

tags | overflow, code execution
SHA-256 | e7216236aa140bde90e0b6a185d4054a32eb6585e3527ebacfa7d3f1141d1b94
snmpXauto.c
Posted Jul 11, 2002
Authored by tracewar

SnmpXdmid auto rooter based on snmpXdmid exploit from http://lsd-pl.net.

tags | exploit, web
SHA-256 | 94ebe956f7f5a101e3099ef94b7ebd458085d3ce2490d32e37966d74a51c61e6
wp-02-0012.txt
Posted Jul 11, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

Westpoint Security Advisory wp-02-0012 - The Carello shopping cart v1.3 uses hidden fields to specify names of executables on the server, allowing an attacker to run arbitrary commands.

tags | arbitrary
SHA-256 | 9887d380b7d1e54dae208b58a265e0fcad7f19f519c4c30e79789a422c384c4c
wp-02-0008.txt
Posted Jul 11, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

Westpoint Security Advisory wp-02-0008 - Apache Tomcat v4.0.3 is vulnerable to cross site scripting attacks by using the /servlet/ mapping. Linux and Win32 versions of Tomcat are vulnerable.

tags | xss
systems | linux, windows
SHA-256 | 7c8753a353b10b9fcac8e6d4fcd9c7fd8be17eae6139f7796cc2b8b8fa6dea83
wp-02-0001.txt
Posted Jul 11, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

Westpoint Security Advisory wp-02-0001 - The GoAhead Web Server v2.1 for Windows NT/98/95/CE, Embedded Linux, Netware, and others contains directory traversal and cross site scripting vulnerabilities. Exploit URL's included.

tags | web, vulnerability, xss
systems | linux, windows
SHA-256 | 3e2b101f0ae13c006aead327c7e7c21f64f42fc6791980b2cd6bb6c96186df8d
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close