exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 1999-11-03

squid.exploit.txt
Posted Nov 3, 1999
Authored by Oezguer Kesim

Remote exploit for squid-2.2-STABLE5 or below.

tags | exploit, remote
SHA-256 | 812fce62394bc0e251588aa9af7d50731d9621e19a0263b63dceba4d3492ccb0
debian.lpr-old.txt
Posted Nov 3, 1999

The version of lpr that was distributed with Debian GNU/Linux 2.1 suffers from a couple of problems. There was a race in lpr that could be exploited by users to print files they can not normally read, and lpd did not check permissions of queue-files. As a result by using the -s flag it could be tricked into printing files a user can otherwise not read. This has been fixed in version 0.46-1-0slink1. We recommend you upgrade your lpr package immediately. Debian security homepage here.

systems | linux, debian
SHA-256 | 0e87d8210d38143d57f0251abf1b80fc8c61dfcb5ca60645c696d90c09041c9c
masquerading.html.txt
Posted Nov 3, 1999
Authored by Gomorrah | Site blacksun.box.sk

A simple guide on what IP masquerading is, what is it good for, how to work with it etc for newbies in that subject.

tags | paper, protocol
SHA-256 | a8374609c77bf091c7d1940e63b17d077f5d6d8d672ca0960035a504a19f7620
RFP9907.txt
Posted Nov 3, 1999
Authored by rain forest puppy | Site wiretrip.net

Advisory RFP9907 - You, your servers, RDS, and thousands of script kiddies. .gov, .mil, and even microsoft.com haven fallen lately to the hands of website defacers. Turns out, it's all been because of RDS. This paper is the straight story on fixing the RDS hole.

tags | paper
SHA-256 | a1562ec8e6c3de504d8609d33290529e67aa77bd45c35abf8a3f834df5775bd8
sendmail.8.9.x.txt
Posted Nov 3, 1999
Authored by Michal Zalewski

Sendmail 8.x.x - any user may rebuild aliases database causing local denial of service.

tags | denial of service, local
SHA-256 | ee87fe08a43899cadbac39a3e8a3cf5421bda9c8ff62986e65f41d6271f83a96
winsd.110299.txt
Posted Nov 3, 1999
Authored by winsd

[ Windows Security Digest ] 1999 - November 2. Contains analysis of 8 windows vulnerabilities that have come out in the past 2 weeks, plus Ongoing MDAC Attacks Against IIS, IIS 5.0's New Security Features, Tools of the Trade, Top 10 Cracks of All Time, and Internet Scanner vs CyberCop. www.ntsecurity.net

tags | vulnerability, magazine
systems | windows
SHA-256 | a5b0722634118b6f7925bcfc66f9a6e384388015d987e474d69a1d92fb1bb48a
boping.zip
Posted Nov 3, 1999
Site members.home.com

A scanner for the infamous Back Orifice program. This is many times faster than the ping sweeper built in to the original client program. I have included the ability to notify detected victims by sending them a BO messagebox message directly from within the program. This is intended as a vigilante tool to notify victims who unknowingly have the trojan on their system. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | ab621f8f8467be5903834ceaf7b26b57f370f5ad827e9d952a9d5e14d7997907
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close