what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2003-05-31

NSSA-200305.txt
Posted May 31, 2003
Authored by NSFOCUS | Site nsfocus.com

A buffer overflow vulnerability exists in the way a dynamic linking library (ssinc.dll)that is shipped with Microsoft IIS 4.0/5.0 handles the files it contains. Exploiting the vulnerability, local attackers could gain local system privileges.

tags | advisory, overflow, local
SHA-256 | 80719fd500d2b9d91176bd0bb701df5bd2e4fa86a32fd7e6ccc2f7e5f15285f1
amap-2.5.tar.gz
Posted May 31, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Bug fix in the -o output and RPC scanning.
tags | tool, protocol
SHA-256 | 6df1e33d4c0dea8aae82e949aa3198c14cb677bce90ca0f5998b50a39229a476
bind_optdos.c
Posted May 31, 2003
Authored by Spybreak

Remote exploit that makes use of the BIND OPT vulnerability to create a denial of service attack.

tags | exploit, remote, denial of service
SHA-256 | d61ba95c78e60ced442db0b1497f20317a5b8b1fca1b31a131906138f13acf11
mod_sigcups.c
Posted May 31, 2003

Cups v1.1.17 and below remote exploit which spawns a shell as lp. Modified version of the original sigcups.c exploit.

tags | exploit, remote, shell
SHA-256 | 5a88fad62d69412d2762fa193f415a3d84cba3182a07cc0ff828178c6b46a28d
idsa-053003.txt
Posted May 31, 2003
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 05.30.03: Passing an overly long string to the apr_psprintf() APR library function that is used by the Apache HTTP Server could cause an application to reference memory that should have already been returned to the heap allocation pool.

tags | advisory, web
SHA-256 | 8f14d25b16284066d16c7efda2e0561997eb563778e85bcaa8276dd562be3cf7
ne0.c
Posted May 31, 2003
Authored by Shashank Pandey

Microsoft IIS versions 5.0 and 5.1 remote denial of service exploit that makes use of the vulnerability recently published by SPI dynamics. Full advisory located here.

tags | exploit, remote, denial of service
SHA-256 | 0a6e5ac42e64c1fced6fe1563d8830a3225d3aa638b65db1f8bb43dce8edea88
nmapgrep.c
Posted May 31, 2003
Authored by blh | Site sr-71.nu

nmapgrep is a small tool customized to grep regular expression patterns from a nmap log file and output the IP addresses that match the pattern.

tags | tool, nmap
systems | unix
SHA-256 | bad869c123e08b3b618205f22b3b15a4d14f3711bec321aea024ca3156bf31b7
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close