what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 1999-11-12

adm-nxt.c
Posted Nov 12, 1999
Authored by horizon/plaguez

ADM named 8.2/8.2.1 NXT remote overflow exploit. Includes shellcode for linux x86, Solaris/Sparc, and NetBSD (with and without chroot). Slightly broken to discourage script kiddies.

tags | exploit, remote, overflow, x86, shellcode
systems | linux, netbsd, solaris
SHA-256 | e34031f3f343e58dd2155719b49f877be36a74f1455787d8c32c17baeacace25
xipdump-1.5.1.tgz
Posted Nov 12, 1999
Authored by Vianney Rancurel

Xipdump is a protocol analyzer and tester. It's a kind of graphical tcpdump(8) which adds the possibility of changing packet values and resending them. The graphical representation of a packet is intended to offer a complete, customizable view at a glance.

Changes: More stability, and a port to OpenBSD.
tags | tool, sniffer, protocol
SHA-256 | 3f069aa05dbaed1efeba5015624838fc33cce790e16957b350c4182c74bd10a1
unix7.var-sadm.txt
Posted Nov 12, 1999
Authored by Shane A. Macaulay

When patches/fixes are applied to binaries on UnixWare 7, the original, unpatched binary files (with the suid/sgid bits maintained) are stored in /var/sadm. By default, the permissions on this directory is 755. This allows normal users to execute and exploit old binaries leftover from patching.

tags | exploit
systems | unixware
SHA-256 | ddcc3aea580eae13df34903d75ef698ba2a71c314c68aee75fb50df4903aaa5d
formhandler.cgi.txt
Posted Nov 12, 1999
Authored by Mnemonix

FormHandler.cgi uses hard coded physical path names for templates so it is possible to read any file on the system.

tags | exploit, cgi
SHA-256 | 982f352a5e509b2e9e1fc85b0d6714be542e0e546c96f5882dc578ee003c3f13
bind.nxt.txt
Posted Nov 12, 1999

A bug in the processing of NXT records allows attackers remote access to DNS servers at the priveledge level that the DNS server runs at. All versions of Bind below 8.2.2 patchlevel 3 are vulnerable. Updated with a little more detailed information about the bug and the handling of NXT records. Advisory from isc here.

tags | exploit, remote
SHA-256 | 0f62614994f9e3c303188367fb4933c80f550e5e69a744404d32c72ec099ca7d
xscreensaver-3.20.tar.gz
Posted Nov 12, 1999
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. More than 100 display modes are included in this package.

Changes: New hacks 'ripples' and 'sierpinski3d', 'xscreensaver-demo' now comes up with the most-recently-run hack selected by default, the GTK version of 'xscreensaver-demo' has been rewritten (it's a lot easier to use now), and various other fixes have been made.
tags | root
systems | unix
SHA-256 | adbe820a7007830ceb7292460bf3ce59a79efc33f6a25d450bbd287742ed2843
ms99-048
Posted Nov 12, 1999

Patch Available for "Active Setup Control" Vulnerability. This vulnerability allows anyone to email you code to be executed and disguise it as a safe type of attachment. The malicious code will execute when you open the attachment.

SHA-256 | dba60650f122a47119f9cd469b81b592b33cac0c45b12015986d938e5b17d604
smartserver3.remote.txt
Posted Nov 12, 1999
Authored by Andrew Reiter | Site bindview.com

There is a buffer overflow in NetCPlus' SmartServer3 POP3 server which can allow a remote attacker to execute arbitrary code on the machine. Affected are windows 95/98/NT machines running NetCPlus' SmartServer3 program with the POP3 server started. The version tested was 3.51.1.

tags | exploit, remote, overflow, arbitrary
systems | windows
SHA-256 | 33c1d77e009be8792bfdf0e14f137ed0d95f798035b257ffb85809fe276c7cff
oracle.iss.txt
Posted Nov 12, 1999
Site iss.net

ISS Security Advisory: Multiple Root Compromise Vulnerabilities in Oracle Application Server for Solaris. An account on the target system is required to exploit these vulnerabilities. Oracle Application Server prior to release 4.0.8 is affected by these vulnerabilities.

tags | exploit, root, vulnerability
systems | solaris
SHA-256 | efb4afb5de23974d9b3bcdbaf09f000d1e0757705e82f4e88a4061c72070a989
nstreams-1.0.0.tar.gz
Posted Nov 12, 1999
Authored by Renaud Deraison | Site hsc.fr

nstreams is a program that analyzes the networks streams occuring on a network and prints them in a human readable form. This is useful when you want to set up a firewall but do not know your needs/the needs of your customers. nstreams can read tcpdump output files or directly listen on a given interface, and may even produce ipchains (Linux) or ipfw (BSD) firewall rules instead of printing the streams, letting you build your firewall automagically.

tags | tool, sniffer
systems | linux, bsd
SHA-256 | 7085cf4f5e9be9ca948d4fa228b324010b012953df4b43b539bf90bf9eaa8bed
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close