Umuwa Home
  Web     Image     Video     News  
 
Showing results for smg_Smxcfg30.exe

    Web Results
 
 
3105002 : ScanMail smg_Smxcfg30.exe authentication bypass ... 
 
www.iss.net/security_center/reference/3105002.html
HTTP_ScanMail_Auth_Bypass: This signature checks for an HTTP GET matching the pattern 'smg_Smxcfg30.exe'.  
 
 
 
ScanMail smg_Smxcfg30.exe authentication bypass (HTTP ... 
 
www.iss.net/security_center/reference/vuln/HTTP_ScanMail...
ScanMail smg_Smxcfg30.exe authentication bypass (HTTP_ScanMail_Auth_Bypass) About this signature or vulnerability. IBM Security Host Protection for Servers (Unix), Virtual Server Protection for Vmware, Proventia Server IPS for Linux technology, Proventia Network IPS, IBM Security Network ...  
 
 
 
ScanMail smg_Smxcfg30.exe authentication bypass 
 
xforce.iss.net/xforce/xfdb/11061
ScanMail is installed with the smg_Smxcfg30.exe program by default. A remote attacker could send a specially-crafted URL request to the smg_Smxcfg30.exe program, which would allow the attacker to bypass password authentication and gain unauthorized access to the Web management interface.    
 
 
Trend Micro Scanmail up to 6.0 Web Management Interface smg ... 
 
www.scip.ch/en/?vuldb.21266
VulDB: Trend Micro Scanmail up to 6.0 Web Management Interface smg_Smxcfg30.exe vcc Backdoor weak authentication General. scipID: 21266 Affected: Trend Micro Scanmail up to 6.0    
 
 
CVE-2003-1343 - Naked Security 
 
nakedsecurity.com/cve/CVE-2003-1343
12/31/2003 CVE-2003-1343 Trend Micro ScanMail for Exchange (SMEX) before 3.81 and before 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote attackers to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".    
 
 
Trend Micro ScanMail For Exchange Authentication Bypass ... 
 
www.juniper.net/security/auto/vulnerabilities/vuln6619.html
An attacker can exploit this vulnerability by making a request for the 'smg_Smxcfg30.exe' resource and modifying the 'vcc' URI parameter. This will grant an attacker access to the web-based management page for ScanMail. Affected Products:  
 
 
 
SecurityFocus 
 
www.securityfocus.com/archive/88/308129
An attacker can exploit this vulnerability by making a request for the 'smg_Smxcfg30.exe' resource and modifying the 'vcc' URI parameter. This will grant an attacker access to the web-based management page for ScanMail.  
 
 
 
Trend Micro ScanMail For Exchange 3.8 Authentication Bypass ... 
 
www.exploit-db.com/exploits/22174
... to bypass existing authentication mechanisms and obtain access to ScanMail's management system. http://x.x.x.x:16372/smg_Smxcfg30.exe?vcc=3560121183d3    
 
 
CVE security vulnerabilities related to CWE (Common Weakness ... 
 
www.cvedetails.com/vulnerability-list.php?vendor_id=0...
Trend Micro ScanMail for Exchange (SMEX) before 3.81 and before 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote attackers to gain access to the web management interface via the vcc parameter, possibly "3560121183d3". 170 CVE-2003-1442: 287:  
 
 
 
NEOHAPSIS - Peace of Mind Through Integrity and Insight 
 
archives.neohapsis.com/archives/vulnwatch/2003-q1/0020.html
http://x.x.x.x:16372/smg_Smxcfg30.exe?vcc=3560121183d3. Some magical backdoor Trend installed to bypass authentication into their web management page for Scanmail for Exchange. Does it work on other Scanmail versions? *****Trend Micro TVCS Log Collector*****  
 
 
 
CVE-2003-1343 : Trend Micro ScanMail for Exchange (SMEX ... 
 
www.cvedetails.com/cve/CVE-2003-1343
CVE-2003-1343 : Trend Micro ScanMail for Exchange (SMEX) before 3.81 and before 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote attackers to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".  
 
 
 
Trend Micro Scanmail bis 6.0 Web Management Interface smg ... 
 
www.scip.ch/?vuldb.21266
VulDB: Trend Micro Scanmail bis 6.0 Web Management Interface smg_Smxcfg30.exe vcc Backdoor schwache Authentisierung Allgemein. scipID: 21266 Betroffen: Trend Micro Scanmail bis 6.0    
 
 
Petsex.com FULL SCAN. #OpOutrageBeastiality - Pastebin.com 
 
pastebin.com/FDVsEuLt
+ /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Micro Officescan 'backdoor'. + /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, ...    
 
 
Hello! 
 
https://www.cirt.net/nikto/UPDATES/1.23/scan_database.db
","GET","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). CA-2000-02." "generic","/ticket.php?id=99999","expects first argument","GET","ZenTrack from http://zentrack.phpzen.net/ versions v2.0.3, v2.0.2beta and older reveal the web root with certain errors."  
 
 
 
scan_database.db - opensourcejavaphp.net Opensource Java ... 
 
opensourcejavaphp.net/python/w3af/plugins/discovery/...
"generic", "/smg_Smxcfg30.exe?vcc=3560121183d3", "200", "GET", "This may be a Trend Officesan 'backdoor'." "generic", "/examples/servlets/index.html", "Servlet Examples", "GET", "Apache Tomcat default JSP pages present."  
 
 
 
results - Pastebin.com - #1 paste tool since 2002! 
 
pastebin.com/AV4GWKHa
+ /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Officesan 'backdoor'. ... + OSVDB-3501: /_private/form_results.html: This file may contain information submitted by other web users via forms. CVE-1999-1052. + OSVDB-3501: ...    
 
 
Sambar Server - CIRT.net | Suspicion Breeds Confidence 
 
https://www.cirt.net/nikto/UPDATES/1.32/scan_database.db
CA-2000-02." "generic","/syshelp/stmex.stm?foo= "," ","GET","Sambar Server default script is vulnerable to Cross Site Scripting (XSS). CA-2000-02."&bar=456 "generic","/sysuser/docmgr/create.stm?path= "," ","GET","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).  
 
 
 
phoile.kattare.com 
 
phoile.kattare.com/stats/data/petrodigital.com.au/aw...
... /payment/classifieds/Site_Admin/admin.php 1 - /vgn/legacy/edit 1 - /Petroleum/script/password_reminder.php 1 - /smg_Smxcfg30.exe 1 - /Petroleum/about_us/webspirs.cgi 1 - /Petroleum/products/upload.php 1 - /boot/ 2 - /Petroleum/images/home/inserter.cgi 1 - /Petroleum/myevent.php 1 ...  
 
 
 
phoile.kattare.com 
 
phoile.kattare.com/stats/data/efieldforce.com/awstats...
... 2 - /cgi-bin/smartsearch.cgi 2 - /ifrFNgJW.apw 1 - /cgi-bin/stat.pl 2 - /cgi-bin/ezman.cgi 2 - /vgn/legacy/edit 2 - /smg_Smxcfg30.exe 2 - /cgi-bin/www-sql 2 - /signing_system-admin/index.php 2 - //zen-cart/admin/includes/stylesheet.css 1 - /boot/ 4 - /cfappman/index.cfm 2 - /cgi-local ...  
 
 
 
CGI_XPlatform.fuzz.txt - fuzzdb - Attack and Discovery ... 
 
code.google.com/p/fuzzdb/source/browse/trunk/discovery/...
Attack and Discovery Pattern Database for Application Fuzz Testing. Project Home Downloads Wiki Issues Source Export to GitHub. Checkout Browse Changes  
 
 
 
CVE-2003-1343漏洞详情 - SCAP中文社区 
 
cve.scap.org.cn/CVE-2003-1343.html
[原文] Trend Micro ScanMail for Exchange (SMEX) before 3.81 and before 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote attackers to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".    
 
 
www.bnjcomp.com 
 
www.bnjcomp.com/bnjftp/tmp/awstats/awstats072009.bnjcomp...
... /cgi-sys/photo/protected/manage.cgi 1 - /cgi-sys/sensepost.exe 1 - /stats-bin-p/ 3 - /cgi-sys/hsx.cgi 1 - /manual/ 3 - /smg_Smxcfg30.exe 1 - /boot/ 3 - /source/ 3 - /reports/ 3 - /iisadmpwd/..%c0%af../winnt/system32/cmd.exe 1 - /smreports/ 3 - /.cobalt/ 3 - /nethome/ 3 - /mpcgi/ 1 ...  
 
 
 
paste bin - dcpdata - post number 2950900 
 
www.pastebin.ca/2950900
paste bin - dcpdata - post number 2950900    
 
 
db_tests - inguma - A Free Penetration Testing And ... 
 
code.google.com/p/inguma/source/browse/data/db_tests?r=2...
A Free Penetration Testing And Vulnerability Research Toolkit. Project Home Downloads Wiki Issues Source. Repository: ...  
 
 
 
forum.ducatodelporno.org 
 
forum.ducatodelporno.org/hosting2/images/4930c23beddba
forum.ducatodelporno.org  
 
 
 
www.kostochnaring.se 
 
www.kostochnaring.se/awstats/data/awstats072013...
AWSTATS DATA FILE 6.8 (build 1.910) # If you remove this file, all statistics for date 201307 will be lost/reset. # Position (offset in bytes) in this file of beginning of each section for # direct I/O access.  
 
 
 
www.tecnologicolasamericas.com 
 
www.tecnologicolasamericas.com/awstats/awstats102007.tec...
AWSTATS DATA FILE 6.4 (build 1.814) # If you remove this file, all statistics for date 2007-10 will be lost/reset. # Position (offset in bytes) in this file of beginning of each section for # direct I/O access.  
 
 
 
awstats.inera.it 
 
awstats.inera.it/www.bibliotecauniversitaria.ge.it/stats/......
AWSTATS DATA FILE 6.95 (build 1.943) # If you remove this file, all statistics for date 201205 will be lost/reset. # Last config file used to build this data file was /etc/awstats/awstats.www.bibliotecauniversitaria.ge.it.conf. # Position (offset in bytes) in this file for beginning of each ...  
 
 
 
www.ethicalhack3r.co.uk 
 
www.ethicalhack3r.co.uk/files/misc/amihackerproof.txt
www.ethicalhack3r.co.uk  
 
 
 
www.computec.ch 
 
www.computec.ch/projekte/vulscan/download/scipvuldb.csv
www.computec.ch  
 
 
 


No more results ...
Copyright © 2016 Umuwa. All Rights Reserved. About us / Privacy Policy / Sitemap Most searched