exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2003-09-04

incident-2.8.tar.gz
Posted Sep 4, 2003
Authored by Viraj Alankar | Site bigfoot.com

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Various bug fixes.
tags | tool, remote, sniffer
SHA-256 | 24ec86fb42b9495fa5464f6fc03e66bab5a330c3cefadf3038ba8823739444bd
leafnode.txt
Posted Sep 4, 2003
Authored by Matthias Andree, Joshua Crawford

fetchnews, the NNTP client from leafnode, suffers from a possible denial of service vulnerability that can be triggered via malformatted Usenet news articles. Affected version: 1.01.

tags | advisory, denial of service
SHA-256 | 7942d464cd35c3cc8520ff12dc5a2bdaa10ee01de0f4d9457c7d2142218dcc81
oinkmaster-0.8.tar.gz
Posted Sep 4, 2003
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

tags | tool, perl, sniffer
systems | bsd
SHA-256 | 493788e7014c2411f59303da651df64e9f1ada3b98bd567a9f8b3129aa61996e
zacode.c
Posted Sep 4, 2003
Authored by zasta

21 byte execve("/bin/ash",0,0); shellcode for the Linux x86 architecture.

tags | x86, shellcode
systems | linux
SHA-256 | 4f10a4f74dae1b5899ad95a596246c4e3188c818647cd9764035b95d4b2b1a8d
Fasoo-Eng.txt
Posted Sep 4, 2003
Authored by STG Security | Site stgsecurity.com

STG Security Advisory SSA-20030902-04: A control vulnerability exists in Wrapsody Viewer version 3.0 that allows a malicious user to bypass the copy and paste restriction.

tags | advisory
SHA-256 | 708e5c36a624c352569629ea7c63257c01c3681b06721bf4d3d4fa7c4980d409
vbedoc.txt
Posted Sep 4, 2003
Authored by Yuji Ukai | Site eEye.com

The Visual Basic Design Time Environment library (VBE.DLL and VBE6.DLL), used by the Microsoft Office series and other Microsoft applications, contains an exploitable heap overflow vulnerability. If a malicious Office file such as .doc, .xls, etc. is opened, there is the ability for an attacker to execute arbitrary code. This buffer overflow bug also affects Internet Explorer, because some Office files are executed automatically by a helper-application when these files are received. Systems Affected: Microsoft Access 97/2000/2002, Excel 97/2000/2002, PowerPoint 97/2000/2002, Project 2000/2002, Publisher 2002, Visio 2000/2002, Word 97/98(J)/2000/2002, Works Suite 2001/2002/2003, Business Solutions Great Plains 7.5, Business Solutions Dynamics 6.0/7.0, Business Solutions eEnterprise 6.0/7.0, Business Solutions Solomon 4.5/5.0/5.5.

tags | advisory, overflow, arbitrary
SHA-256 | 9e5f80b9bc14a6f7598d5bb35cf2dd5cd9f097f59982f22db987246519d4d267
mswordcon.txt
Posted Sep 4, 2003
Authored by Yuji Ukai | Site eEye.com

The Microsoft Word WordPerfect document converter included in Microsoft Word has a buffer overflow bug. If the WordPerfect document converter is installed, which by default it is in Office 2000, and a malicious .doc file is opened, there exists the ability for an attacker to execute arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | 01b4f751a89cd097f31a7c747ac7d0760d2324742380f9b6d7d7acc6daac7241
tellurian.txt
Posted Sep 4, 2003
Authored by storm | Site securiteam.com

Tellurian TFTPDNT server version 1.8 for Windows NT and Windows 9x suffers from a buffer overflow that allows remote attackers to execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
systems | windows
SHA-256 | 934987843a4ddfbb1fb41d02028e9084c43e90a88dbcd8c1079c016552ea4f9d
Page 1 of 1
Back1Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close