Reply Sun 14 Sep, 2003 09:05 pm
1 of the admins might wanna contact me I see like 15 holes in the server.
  • Topic Stats
  • Top Replies
  • Link to this Topic
Type: Discussion • Score: 2 • Views: 1,936 • Replies: 15
No top replies

 
Craven de Kere
 
  1  
Reply Sun 14 Sep, 2003 09:11 pm
Like?
0 Replies
 
safecracker
 
  1  
Reply Sun 14 Sep, 2003 09:13 pm
u want me to make em public? a couple cant be fixed but some can.
0 Replies
 
Craven de Kere
 
  1  
Reply Sun 14 Sep, 2003 09:14 pm
Sure, post them.
0 Replies
 
safecracker
 
  1  
Reply Sun 14 Sep, 2003 09:23 pm
MyAbraCadaWeb Path Disclosure Vulnerability

something related to the Benjamin Lefevre Dobermann Forum Remote File Include Vulnerability

ProFTPD SQL Injection mod_sql Vulnerability

Univ. Of Washington imapd Buffer Overflow Vulnerabilities- 2 of them

YaBB Login Cross-Site Scripting Vulnerability

EZ Publish Multiple Cross Site Scripting Vulnerabilities

Geeklog Multiple Cross Site Scripting Vulnerabilities

Portix-PHP Index.PHP Directory Traversal Vulnerability- 2 of em

Py-Membres Index.PHP Unauthorized Access Vulnerability..well related to it

PHP Nuke Error Message Web Root Disclosure Vulnerability

SMTP without AuthLogin

Email List...not really a hole but ya

A list of the scripts in your dir...could be used for more exploits.
0 Replies
 
Craven de Kere
 
  1  
Reply Sun 14 Sep, 2003 09:25 pm
Please explain, most of what you posted are old exploits from securityfocus.com and oddly enough are exploits for software that does not reside on A2K servers.
0 Replies
 
safecracker
 
  1  
Reply Sun 14 Sep, 2003 09:26 pm
is a2k ip 66.98.158.38? and yes I know they are old.
0 Replies
 
Craven de Kere
 
  1  
Reply Sun 14 Sep, 2003 09:28 pm
Yes
0 Replies
 
Craven de Kere
 
  1  
Reply Sun 14 Sep, 2003 10:52 pm
I think you used an outdated version of SSS to scan. I just scanned and found a lot less than you did.

They were all false alarms. Most of them are for software I do not even have on any of the servers. Others are for things that are not vulnerabilities at all (e.g. the mail ones simply mean they found email addresses, and all apache installations have email addresses on teh apache docs). Other ones were for software that I do not run (e.g. ProFTP, I use PureFTP).
0 Replies
 
husker
 
  0  
Reply Sun 14 Sep, 2003 11:02 pm
bm
0 Replies
 
safecracker
 
  1  
Reply Mon 15 Sep, 2003 12:14 am
kool im 2 damn tired to look for myself just caught some sleep maybe i will later SSS is just so much quicker lol I run it as a 1st method seems to work ok most of the time, for anyone that donno how craven knew i used SSS I had PMed him. Craven did you quick scan or complete?
0 Replies
 
Craven de Kere
 
  1  
Reply Mon 15 Sep, 2003 12:26 am
I did a complete scan. But SSS gets lots of false alarms. Even so, the false alarms it gives were not exploits we'd be vulnerable to as most were local exploits and since I don't host anyone they don't spply.
0 Replies
 
safecracker
 
  1  
Reply Mon 15 Sep, 2003 12:51 am
well some of then can be executed from a account without full access, I would never try to harm this site just looking out for it. I rescanned it same thing. I wouldn't take the time to go after any sites lol too busy with my own. I'll see if I can manually find some exploits later Smile
0 Replies
 
Craven de Kere
 
  1  
Reply Thu 18 Sep, 2003 12:52 am
I'd not bother looking. The reason why I didn't mind you posting the exploits here is because I'd installed a new kernel the day before and had made sure everythingis patched.
0 Replies
 
safecracker
 
  1  
Reply Thu 18 Sep, 2003 03:09 am
ahh kool, I've been too busy anyway....could probably find some but I don't think you have to worry it doesn't seem like anyone skilled is attacking anyway. Keep up the good work.
0 Replies
 
Craven de Kere
 
  1  
Reply Thu 18 Sep, 2003 03:15 am
Ah, they are attacking alright (tonight in fact, most visible sites are sporadically attacked in some way) but with no credit card information etc on this server there's really no point. In a worst case scenario I'd simply have to restore the site on a new server after a temporary disruption.
0 Replies
 
 

Related Topics

Webdevelopment and hosting - Question by harisit2005
Showing an Ico File - Discussion by Brandon9000
how to earn money in internet - Discussion by rizwanaraj
The version 10 bug. Worse then Y2K! - Discussion by Nick Ashley
CSS Border style colors - Question by meesa
There is no Wisdom in Crowds - Discussion by ebrown p
THANK YOU CRAVEN AND NICK!!! - Discussion by dagmaraka
I'm the developer - Discussion by Nick Ashley
 
  1. Forums
  2. » admins
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 0.03 seconds on 04/25/2024 at 11:59:15