exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2001-11-20 to 2001-11-21

Internet Security Systems Security Advisory November 20, 2001
Posted Nov 20, 2001
Site iss.net

Internet Security Systems (ISS) X-Force has discovered a vulnerability in the HP-UX line printer daemon (rlpdaemon). This vulnerability may allow a remote or local attacker to execute arbitrary code with superuser privilege.

tags | remote, arbitrary, local, root
systems | hpux
SHA-256 | fc8855c32af05bfe561174dc0946a2ed415b60808e50f138370be7dc3d2426dc
Posted Nov 20, 2001
Site qdefense.com

qDefense Security Advisory QDAV-2001-11-1 - A vulnerability in Hypermail SSI has been discovered that allows users to execute arbitrary commands on a server running Hypermail and SSI.

tags | arbitrary
SHA-256 | 1f00acda38a91de5892bf56ba2d321748d458c17881de94dda4ec2e0d925c6d9
Posted Nov 20, 2001
Site microsoft.com

Microsoft Security Advisory MS01-056 - A buffer overflow in the handling of ASF files was discovered in Windows Media Player 6.4, allows remote attackers to execute of arbitrary code with the privileges of the user running a specially crafted ASF file. Anyone running versions 6.4, 7, or 7.1 is affected.

tags | remote, overflow, arbitrary
systems | windows
SHA-256 | e6c8b663e12c7020989589d518ede4f01f13fbc872e51249b2a57769ebc3249a
Posted Nov 20, 2001
Site iSecureLabs.com

iSecureLabs Security Advisory - Cabezon Aurelien has discovered a vulnerability in the Network Tool 0.2 Addon for PHPNuke that allows remote users to run arbitrary commands with the privileges of the httpd daemon, thanks to the failure of the addon to filter shell meta-characters.

tags | remote, arbitrary, shell
SHA-256 | 793e2c2c5f0e428af223241b631f0f5aa4c00fbb72c90e0e4b899fb9bbc0d1f1
Posted Nov 20, 2001
Site iSecureLabs.com

iSecureLabs Security Advisory - Cabezon Aurelien has discovered a reverse directory traversal vulnerability in the Gallery Addon for PHPNuke that allows users to view arbitrary files on the remote system that are owned or readable by the httpd daemon.

tags | remote, arbitrary
SHA-256 | fb56723b90987185c743733ccbeb618508f8f8601f8af9aefd50e2cfd6a70c9d
SGI Security Advisory 20011101-01-I
Posted Nov 20, 2001
Site sgi.com

SGI Security Advisory 20011101-01-I - Multiple local Sendmail vulnerabilities have been discovered, potentially causing information loss, disclosure of possibly sensitive information, and possible mail system compromise. Affected versions include all Sendmail versions prior to 8.12.1 without the "RestrictQRun" option enabled.

tags | local, vulnerability
SHA-256 | 0bb90dd02aa4d1ebe8eecbb55fa74f395f0e1610f305f926cc0eb9b53a9475d0
Posted Nov 20, 2001
Authored by Pilot | Site monkey.org

Arirang is a powerful webserver security scanner with many features. Checks over 700 vulnerabilities.

tags | cgi, vulnerability
systems | unix
SHA-256 | f2a7a1591d5801786fd38bc50b816071eedf69d7db14a5039f15f0f3d05b65cb
Posted Nov 20, 2001
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: A problem in checksum functions was fixed and minor feature enhancements were added.
tags | udp, tcp
systems | unix
SHA-256 | 69c7166aa92aa5ff96825b882a68fbedb6d3678ed2cbd63d8072ec2a447669ba
Posted Nov 20, 2001
Site sourceforge.net

IP Accounter is an IP accounting package for Linux. It collects, summarizes, and nicely displays IP accounting data. Its output can be a simple ASCII table, or graph images. Ipchains and iptables are supported. Logs are stored in files, gdbm, or even a PostgreSQL database.

Changes: Many little patches and fixes were added.
systems | linux
SHA-256 | cf6e02322b7f2b263433d8c97a4cc3e8456b6c406ac7f9fe38bed34bce71046d
Posted Nov 20, 2001
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: A solaris compile fix.
tags | tool
systems | unix
SHA-256 | 73a7d6c576f813710a76ad482b8e167d00beaa3193612d4d1f1a3bec08dfec93
Posted Nov 20, 2001
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and Cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Small fixes in whois code, mode selection, endianness, and realtime response with destination port distinction.
tags | tool, firewall
systems | cisco, unix
SHA-256 | b7cf234b303157f154dc27868cb784b0ccac2eb0799f29311afd4309c2c015d2
Posted Nov 20, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: Speed-ups to configuration file parsing, and some other minor improvements.
systems | unix, bsd
SHA-256 | 12056fffe29840e8ed48231a0859e2d669c6279581c0927ef6dc72e62b411320
Page 1 of 1

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By