what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-02-10

suse.make.txt
Posted Feb 10, 2000

A security hole was discovered in the GNU make package version 3.77-44 distributed with SuSE 6.1 and 6.3. If Makefile contents are fed in via stdin, files will be created in /tmp without checking if there is a symbolic link with the same name. Implications are command execution as the user running make. Other distributions are also affected. SuSE security site here.

systems | linux, suse
SHA-256 | ea08e1d1f74ae57dec28f0224d6ad7a4b1254790603ed556b334ded009d41465
suse.util.txt
Posted Feb 10, 2000

A security hole was discovered in the util package (mount and umount commands) installed by default on SuSE and other flavors of linux. Local root compromise possible. SuSE security site here.

tags | local, root
systems | linux, suse
SHA-256 | d5441c0cfdf9c9b309b67e8539ad4feae7ae7d635226df5cbeedc83b7c860831
linux-2.2.14-stealth3.diff
Posted Feb 10, 2000
Authored by Sean Trifero | Site innu.org

Patch for linux kernel 2.2.14 to discard packets that many OS detection tools use to query the TCP/IP stack.

Changes: Patch3 actually works! Includes logging of the dropped query packets.
tags | kernel, tcp
systems | linux
SHA-256 | c84594838465fe09706a766e9b8530454728fe6dcbf3ef3079659c0e2e691eb2
kppp-1.6.14.txt
Posted Feb 10, 2000
Authored by Rarez

Kppp 1.6.14 has a vulnerability that allows a local user to display the saved PPP password.

tags | exploit, local
SHA-256 | 8d19332151732e5697e7f7163003d6acf0c93e1dbfc58fe97ed5779abc51b4cb
inetserv-3.0.c
Posted Feb 10, 2000
Authored by Dr. Fdisk | Site raza-mexicana.org

InetServ 3.0 remote DoS exploit.

tags | exploit, remote
SHA-256 | 745955650f792ca0b47cdd962de7a7acf7142588a0956916494311e2965dafa0
winsd.021000.txt
Posted Feb 10, 2000
Authored by winsd

Windows 2000 Magazene Security Digest - New vulnerabilities include RDISK Race Condition: Update, Bypass surfControl URL Blocking, WWWThreads Elevates Privileges, Web Server Scripting Issues, Microsoft Java Exposes Files, and Windows NT Recycle Bin Goes Unchecked. Also contains articles on serious DoS attacks, IIS Administrator, FBI and CERT Warn Users Against Web-Based Scripting, and ZoneAlarm 2.0.

tags | java, web, vulnerability, magazine
systems | windows
SHA-256 | aefd83c89746659843b6c1be6a5a6cdf9f3be4950de270b7fb995fce23408f15
ISS Security Alert February 9, 2000
Posted Feb 10, 2000
Site xforce.iss.net

A new form of Distributed Denial of Service (DDoS) attack has been discovered following the release of the trin00 and Tribe Flood Network (TFN) denial of service programs (see December 7, 1999 ISS Security Alert at http://xforce.iss.net/alerts/advise40.php3). These attacks are more powerful than any previous denial of service attack observed on the Internet. A Distributed Denial of Service attack is designed to bring a network down by flooding target machines with large amounts of traffic. This traffic can originate from many compromised machines, and can be managed remotely using a client program. ISS X-Force considers this attack a high risk since it can potentially impact a large number of organizations. DDoS attacks have proven to be successful and are difficult to defend against.

tags | denial of service
SHA-256 | b62da56635635d524817aaca0d701afa8f1d51b1075b2f5942b15e54cba18a0e
axis700.txt
Posted Feb 10, 2000
Authored by Ian Vitek

Bypassing authentication on Axis 700 Network Scanner - By modifying an URL, outsiders can access administrator URLs without entering username and password. Tested on Axis 700 Network Scanner Server version 1.12.

tags | exploit
SHA-256 | 62be7cce360cae03aa7cf171c9411f06a344a3d1ae4af8abcb8218e26c1b8673
sco.snmpd.txt
Posted Feb 10, 2000
Authored by Shawn Bracken

The default configuration of SCO OpenServer 5.0.5 allows local users read/write access to SNMPD via a default writable community string. This configuration has been verified on SCO OpenServer 5.0.5 and may be present in earlier versions.

tags | exploit, local
SHA-256 | 3c82f312504d022a8c22babfcbc6580fa23cc95dd9cd9e92a5e994687ae533a7
mysql.txt
Posted Feb 10, 2000
Authored by Emphyrio

There exists a vulnerability in the password checking routines in the latest versions of the MySQL server, that allows any user on a host that is allowed to connect to the server, to skip password authentication, and access databases. All versions of MySQL up to 3.22.26a are vulnerable.

tags | exploit
SHA-256 | 5f5a4fb2100d5e175dc80ad904c3a600382a5f0b6c8153e8084244e2328cedac
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close