exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2002-10-25 to 2002-10-26

Rapid7 Security Advisory 8
Posted Oct 25, 2002
Authored by Rapid7 | Site rapid7.com

Rapid 7 Advisory R7-0008 - IBM Web Traffic Express Caching Proxy server is vulnerable to cross site scripting. The Caching Proxy server allows script code to be injected into pages using standard cross-site scripting techniques. A second, variant attack allows the HTTP headers to be manipulated.

tags | web, xss
SHA-256 | 2b24d3cf784653c24b81047d80228ae940e783257cf9ce49567fa86d564bdaeb
Rapid7 Security Advisory 7
Posted Oct 25, 2002
Authored by Rapid7 | Site rapid7.com

Rapid 7 Advisory R7-0007 - The Caching Proxy component of IBM's WebSphere Edge Server v2.0 is vulnerable to a denial-of-service attack against one of the default CGI programs. A malformed HTTP request for /cgi-bin/helpout.exe will cause ibmproxy.exe to crash and cease functioning.

tags | web, cgi
SHA-256 | d5444f4faa351e594a4559c2bf2fb5cf0491766c5ae89f6adfc2ce7c94802ffe
webserver4everyone.txt
Posted Oct 25, 2002
Authored by Tamer Sahin, David Endler | Site idefense.com

iDEFENSE Security Advisory 10.15.02 - RadioBird Software's WebServer 4 Everyone v1.27 and below contains denial of service and directory traversal vulnerabilities allowing any file on the system to be downloaded. Fix available here.

tags | denial of service, vulnerability
advisories | CVE-2002-1212, CVE-2002-1213
SHA-256 | ee7ce09231d4ce9d177866165f5d433f9b62ebfe59e76ea0613c5ecc5fd837e8
tftp.dos.pl
Posted Oct 25, 2002
Authored by D4rkGr3y | Site dhgroup.org

Solarwinds TFTP server v5.0.55 and below remote denial of service exploit in perl.

tags | exploit, remote, denial of service, perl
SHA-256 | 165893e2a72b6c7b01bf0b5e59020ebd0ef42cf6184037b8c607536b68ae7f46
ou-audit2002.msi
Posted Oct 25, 2002
Authored by Security Storm | Site securitystorm.net

Opticon Users 2002 is a simple tool to show administrators who is logged onto the network and from what workstation that user is accessing the network from. Information about the workstation used to logon from, the domain, the logon server, and the date/time of logon is also displayed. This tool makes it easy to spot unauthorized logons from a certain workstation or logons using an administrative account.

SHA-256 | 7363cf87bc3f361f4ba537b96a7a2040148781aaca2bceecd4a21b540aab2c6b
badblue.1.7.txt
Posted Oct 25, 2002
Authored by Tamer Sahin | Site securityoffice.net

The BadBlue web server v1.7 for Windows allows remote attackers to access files in password protected directories by sending a special web request. Tested on Windows 2000 Sp3 and 98SE.

tags | remote, web
systems | windows
SHA-256 | 99d05374da83f582e4c1a538df787b729ffaa4edb6e65cda12d5bea1cb47a8a5
liteserve.2.0.txt
Posted Oct 25, 2002
Authored by Tamer Sahin | Site securityoffice.net

The Liteserve Web Server v2.0 for Windows allows remote attackers to access files in password protected directories by sending a special web request. Tested on Windows 2000 Sp3 and 98SE.

tags | remote, web
systems | windows
SHA-256 | 1ad0b43d131843b5736e0561fcc1a675759e988ac4a519a13fc34d067e8ed50f
webweaver.1.01.txt
Posted Oct 25, 2002
Authored by Tamer Sahin | Site securityoffice.net

The BRS WebWeaver Web Server v1.01 for Windows allows remote attackers to access files in password protected directories by sending a special web request. Tested on Windows 2000 Sp3 and 98SE.

tags | remote, web
systems | windows
SHA-256 | 952d6a2e38bf73ed6659426d07625a19fe392c8b246d7ec67b52f1f0b7264132
TunnelFinder.zip
Posted Oct 25, 2002
Authored by OblivionBlack

Tunnel finder is a particular proxy checker that can display information from a list of proxies by searching for proxy servers that permit the CONNECT command allowing an end user to achieve a higher level of anonymity.

tags | web
SHA-256 | 04f9dee370118f4214730926d3a378e63fa4c58b145ca7bcb65f65b3693a1376
virgil.txt
Posted Oct 25, 2002
Authored by KALIF research group, Joschka Fischer

Virgil CGI Scanner by Mark Ruef has a vulnerability where user input is trusted without being sanitized and is actually populating bash variables which end up getting executed. Simple exploit examples are included.

tags | exploit, cgi, bash
SHA-256 | d904fe4eeff1617f799ad5d492b310acc2605145158faff2c8c8a7b7a546cdac
winrpcnuke.c
Posted Oct 25, 2002
Authored by Lion | Site cnhonker.com

Microsoft Windows RPC Denial of Service utility.

tags | denial of service
systems | windows
SHA-256 | 14210ab9185d541e6e0cd8c76e93e68f6cf19be6fc42f04ea56bb85b67e5e8ef
mig-logcleaner11.tar.gz
Posted Oct 25, 2002
Authored by no1 | Site greyhats.za.net

Log wiping utility used to sanitize logs from utmp, wtmp, utmpx, wtmpx, lastlog files. Capabilities also allow modification and addition of entries.

tags | tool, rootkit
systems | unix
SHA-256 | 7d68a83410f500bb5b1ecadd45370d96ed4e69ce4f1b607f6b1bc9a7ea7b61da
idefense.solarwinds.txt
Posted Oct 25, 2002
Authored by David Endler, Matthew Murphy | Site idefense.com

iDEFENSE Security Advisory 10.24.02 - The Solarwinds TFTP server v5.0.55 and below contains a directory traversal bug which allows remote users to download any file on the system.

tags | remote
SHA-256 | a7a4ff629f7e930a627e2df7c2e09b6d40a316d099e31b0a622bdad02850eb20
gm012-more-ie.txt
Posted Oct 25, 2002
Authored by GreyMagic Software | Site security.greymagic.com

Microsoft Internet Explorer versions 5.5 and 6.0 are susceptible to 9 attacks involving object caching. When communicating between windows, security checks ensure that both pages are in the same security zone and on the same domain. These crucial security checks wrongly assume that certain methods and objects are only going to be called through their respective window. This assumption enables some cached methods and objects to provide interoperability between otherwise separated documents.

tags | exploit
systems | windows
SHA-256 | 0d493f1ee4c0342068a311e12ade60a725672891b23957e14ce2b5cbe1e6e675
wc.tar.gz
Posted Oct 25, 2002
Authored by Aion

Two modified versions of the slapper worm exploit made more user-friendly with simple interaction to define what host and port will be hit with the exploit.

tags | exploit, worm
SHA-256 | 33f0ab9cc7a39a816dbc6dddc8b1952feeb6871f5ad68e60decab4626431eb7c
iptables.txt
Posted Oct 25, 2002
Authored by Fog

Iptables shell script. Some Brazilian comments.

tags | tool, shell, firewall
systems | linux
SHA-256 | 4a4d7de414db7c905e2217bf7d07d40927e0c013b2effde9a9f8880838c68278
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close