exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2003-09-04

incident-2.8.tar.gz
Posted Sep 4, 2003
Authored by Viraj Alankar | Site bigfoot.com

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Various bug fixes.
tags | tool, remote, sniffer
SHA-256 | 24ec86fb42b9495fa5464f6fc03e66bab5a330c3cefadf3038ba8823739444bd
leafnode.txt
Posted Sep 4, 2003
Authored by Matthias Andree, Joshua Crawford

fetchnews, the NNTP client from leafnode, suffers from a possible denial of service vulnerability that can be triggered via malformatted Usenet news articles. Affected version: 1.01.

tags | advisory, denial of service
SHA-256 | 7942d464cd35c3cc8520ff12dc5a2bdaa10ee01de0f4d9457c7d2142218dcc81
oinkmaster-0.8.tar.gz
Posted Sep 4, 2003
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

tags | tool, perl, sniffer
systems | bsd
SHA-256 | 493788e7014c2411f59303da651df64e9f1ada3b98bd567a9f8b3129aa61996e
zacode.c
Posted Sep 4, 2003
Authored by zasta

21 byte execve("/bin/ash",0,0); shellcode for the Linux x86 architecture.

tags | x86, shellcode
systems | linux
SHA-256 | 4f10a4f74dae1b5899ad95a596246c4e3188c818647cd9764035b95d4b2b1a8d
Fasoo-Eng.txt
Posted Sep 4, 2003
Authored by STG Security | Site stgsecurity.com

STG Security Advisory SSA-20030902-04: A control vulnerability exists in Wrapsody Viewer version 3.0 that allows a malicious user to bypass the copy and paste restriction.

tags | advisory
SHA-256 | 708e5c36a624c352569629ea7c63257c01c3681b06721bf4d3d4fa7c4980d409
vbedoc.txt
Posted Sep 4, 2003
Authored by Yuji Ukai | Site eEye.com

The Visual Basic Design Time Environment library (VBE.DLL and VBE6.DLL), used by the Microsoft Office series and other Microsoft applications, contains an exploitable heap overflow vulnerability. If a malicious Office file such as .doc, .xls, etc. is opened, there is the ability for an attacker to execute arbitrary code. This buffer overflow bug also affects Internet Explorer, because some Office files are executed automatically by a helper-application when these files are received. Systems Affected: Microsoft Access 97/2000/2002, Excel 97/2000/2002, PowerPoint 97/2000/2002, Project 2000/2002, Publisher 2002, Visio 2000/2002, Word 97/98(J)/2000/2002, Works Suite 2001/2002/2003, Business Solutions Great Plains 7.5, Business Solutions Dynamics 6.0/7.0, Business Solutions eEnterprise 6.0/7.0, Business Solutions Solomon 4.5/5.0/5.5.

tags | advisory, overflow, arbitrary
SHA-256 | 9e5f80b9bc14a6f7598d5bb35cf2dd5cd9f097f59982f22db987246519d4d267
mswordcon.txt
Posted Sep 4, 2003
Authored by Yuji Ukai | Site eEye.com

The Microsoft Word WordPerfect document converter included in Microsoft Word has a buffer overflow bug. If the WordPerfect document converter is installed, which by default it is in Office 2000, and a malicious .doc file is opened, there exists the ability for an attacker to execute arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | 01b4f751a89cd097f31a7c747ac7d0760d2324742380f9b6d7d7acc6daac7241
tellurian.txt
Posted Sep 4, 2003
Authored by storm | Site securiteam.com

Tellurian TFTPDNT server version 1.8 for Windows NT and Windows 9x suffers from a buffer overflow that allows remote attackers to execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
systems | windows
SHA-256 | 934987843a4ddfbb1fb41d02028e9084c43e90a88dbcd8c1079c016552ea4f9d
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close