exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Michael Scheidell

Email addressscheidell at secnap.net
First Active2003-05-30
Last Active2014-07-13
United.com Insecure Transit
Posted Jul 13, 2014
Authored by Michael Scheidell

User credentials sent to united.com did not transit over HTTPS upon submission.

tags | exploit, web
SHA-256 | b8e25796c63cdf0f3589e2be7707e41dd0340542c486725ce5ef88b491926261
comcastWebmail.txt
Posted Jul 22, 2004
Authored by Michael Scheidell | Site secnap.com

Comcast Webmail AT+T Message Center version 1 had a flaw that allowed arbitrary code execution client-side due to the allowance of inbound HTML mail to be executed outside of the restricted zone.

tags | advisory, arbitrary, code execution
SHA-256 | 07e88e9a638298baf1818d056ec714b8942bfdcd19ae5d8f7e063df84ee54129
3COMdos.txt
Posted May 3, 2004
Authored by Michael Scheidell

SECNAP Network Security Advisory - 3com NBX IP VOIP NetSet(r) Configuration Manager is susceptible to a denial of service attack due to insufficient user input checking.

tags | advisory, denial of service
SHA-256 | c99d772735d7831ba12cfb81734ff1a51c3a3ace98a5c750624b8716c881fe00
symbol.txt
Posted Nov 14, 2003
Authored by Michael Scheidell

The Symbol PDT 8100 does not attempt to change its default existing WEP keys during installation. If not changed, the PDT 8100 will reveal the WEP keys to any user in plain text by taping on the wireless icon on lower right hand of 8100 and scrolling to the 'encryption tab'. A stolen PDT 8100 or copied keys can allow an insider the ability to totally compromise the Wi-Fi network.

tags | advisory
advisories | CVE-2003-0934
SHA-256 | 0ef878b8880cfbb42ed45bacdfc32fa99f275624901e1d58461985859e733d1f
goldmine.txt
Posted May 30, 2003
Authored by Michael Scheidell | Site secnap.net

The Goldmine mail agent can run arbitrary code via a malicious formed HTML e-mail. It does not even run the email in the 'security zone' as does Microsoft Outlook, but passes anything that looks like HTML to be executed unrestricted directly to the default Browser, which for many is usually Internet Explorer.

tags | advisory, arbitrary
SHA-256 | 1b72a78af77f5a6ac40daf2d853841dc47e50923fa1bb291243b012faeec5599
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close