what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2003-06-17

SecurityWire_6_2_03.zip
Posted Jun 17, 2003
Authored by Troy Thompson | Site relevanttechnologies.com

Relevant Technologies product review paper on InsideOut Firewall Reporter by Stonylake Solutions. This product is a Java-based server application that runs on both Windows and Linux and has a demo version available.

tags | paper, java
systems | linux, windows
SHA-256 | 4931f309c78c79b5d634d31e379a0bfcb5ecd85736eb5c0787b5279f4e9b4f04
EnceladusServerSuite3.9.11.txt
Posted Jun 17, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

Enceladus Server Suite v3.9.11 contains buffer overflows in its ftp server that allow a remote attacker to crash the server with the possibility of remote command execution.

tags | exploit, remote, overflow
SHA-256 | 56660bf541dcb85e78cbce689ad870ff26fee9f883be3a7b0de8e42b51f1c7fe
amap-2.7.tar.gz
Posted Jun 17, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Added the ability to compile under Cygwin, Added some triggers and responses, and various bug fixes.
tags | tool, protocol
SHA-256 | 94fab83628b9447bc141df6b16c39f31750777f88ee84a8d1eb31ceb8b387221
lednews.txt
Posted Jun 17, 2003
Authored by Gilbert Vilvoorde

LedNews v0.7 lacks any filtering allowing a remote attacker to embed javascript or various HTML tags. It may also be possible to add server side include tags into news posts as well.

tags | exploit, remote, javascript
SHA-256 | bb8bdc61aef9712a1297bda410fd6d68cf2a865fc673e5a6a79779178914d42e
pMachine.txt
Posted Jun 17, 2003
Authored by Frog Man | Site frog-man.org

Pmachine version 2.2.1 has a fault Include() routine that allows a remote attacker to supply a malicious URL that in turn can be a script that the webserver will then execute.

tags | exploit, remote
SHA-256 | 3a954f23f36da44d1a53b9c709a5c45c9eee6bf4b1b93f9c0048194f7b4eb754
iDEFENSE Security Advisory 2003-06-16.t
Posted Jun 17, 2003
Authored by Karol Wiesek, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.16.03: The pam_wheel module of Linux-PAM uses getlogin() in an insecure manner, thereby allowing attackers to bypass certain restrictions. The pam_wheel module is often used with the su command to allow users belonging to a trusted group to utilize the command without supplying a password. The module utilizes the getlogin() function to determine the name of the currently logged in user. This name is then compared against a list of members of a trusted group as specified in the configuration file. If the trust option is enabled in the pam_wheel configuration file and the use_uid option is disabled, any local user may spoof the username returned by getlogin() and gain access to a super-user account without supplying a password.

tags | exploit, local, spoof
systems | linux
SHA-256 | c65f3b99c2e44aca0273c3c270501fa89200aeeec261693c53ac01a45de16c3e
idscenter11rc3.zip
Posted Jun 17, 2003
Authored by Ueli Kistler | Site engagesecurity.com

IDScenter is a control and management front-end for the Windows platform. Main features: Snort 2.0/1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.

Changes: Snort 2.0 Support and more.
tags | tool, sniffer
systems | windows
SHA-256 | f9b7423c7841bf496874eb4b6958f826ddcecd9c8631065cef6dfd7aa797770e
morpheus.c
Posted Jun 17, 2003
Authored by Shashank Pandey

Shellcode that print What is The M4Tr1X ?! and then exits.

tags | shellcode
SHA-256 | 24613700722f04736909af821d62b7e6bc1c78910a71e75776a1e46bce154fb9
5HP0G1FAAC.txt
Posted Jun 17, 2003
Site SecurITeam.com

The product Mailtraq suffers from multiple vulnerabilities that range from access to files that reside outside the bounding HTML root directory through decryption of locally stored password, to a cross site scripting vulnerability in the web mail interface.

tags | exploit, web, root, vulnerability, xss
SHA-256 | 0fccaf9934ee9baa9e271e3755695428f4343300ad90ccad092c5010d7861a0e
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close