exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-02-10

suse.make.txt
Posted Feb 10, 2000

A security hole was discovered in the GNU make package version 3.77-44 distributed with SuSE 6.1 and 6.3. If Makefile contents are fed in via stdin, files will be created in /tmp without checking if there is a symbolic link with the same name. Implications are command execution as the user running make. Other distributions are also affected. SuSE security site here.

systems | linux, suse
SHA-256 | ea08e1d1f74ae57dec28f0224d6ad7a4b1254790603ed556b334ded009d41465
suse.util.txt
Posted Feb 10, 2000

A security hole was discovered in the util package (mount and umount commands) installed by default on SuSE and other flavors of linux. Local root compromise possible. SuSE security site here.

tags | local, root
systems | linux, suse
SHA-256 | d5441c0cfdf9c9b309b67e8539ad4feae7ae7d635226df5cbeedc83b7c860831
linux-2.2.14-stealth3.diff
Posted Feb 10, 2000
Authored by Sean Trifero | Site innu.org

Patch for linux kernel 2.2.14 to discard packets that many OS detection tools use to query the TCP/IP stack.

Changes: Patch3 actually works! Includes logging of the dropped query packets.
tags | kernel, tcp
systems | linux
SHA-256 | c84594838465fe09706a766e9b8530454728fe6dcbf3ef3079659c0e2e691eb2
kppp-1.6.14.txt
Posted Feb 10, 2000
Authored by Rarez

Kppp 1.6.14 has a vulnerability that allows a local user to display the saved PPP password.

tags | exploit, local
SHA-256 | 8d19332151732e5697e7f7163003d6acf0c93e1dbfc58fe97ed5779abc51b4cb
inetserv-3.0.c
Posted Feb 10, 2000
Authored by Dr. Fdisk | Site raza-mexicana.org

InetServ 3.0 remote DoS exploit.

tags | exploit, remote
SHA-256 | 745955650f792ca0b47cdd962de7a7acf7142588a0956916494311e2965dafa0
winsd.021000.txt
Posted Feb 10, 2000
Authored by winsd

Windows 2000 Magazene Security Digest - New vulnerabilities include RDISK Race Condition: Update, Bypass surfControl URL Blocking, WWWThreads Elevates Privileges, Web Server Scripting Issues, Microsoft Java Exposes Files, and Windows NT Recycle Bin Goes Unchecked. Also contains articles on serious DoS attacks, IIS Administrator, FBI and CERT Warn Users Against Web-Based Scripting, and ZoneAlarm 2.0.

tags | java, web, vulnerability, magazine
systems | windows
SHA-256 | aefd83c89746659843b6c1be6a5a6cdf9f3be4950de270b7fb995fce23408f15
iss.00-02.ddos
Posted Feb 10, 2000
Site xforce.iss.net

ISS Security Alert - Denial of Service Attack using the TFN2K and Stacheldraht programs. These attacks are more powerful than any previous denial of service attack observed on the Internet.

tags | denial of service
SHA-256 | b62da56635635d524817aaca0d701afa8f1d51b1075b2f5942b15e54cba18a0e
axis700.txt
Posted Feb 10, 2000
Authored by Ian Vitek

Bypassing authentication on Axis 700 Network Scanner - By modifying an URL, outsiders can access administrator URLs without entering username and password. Tested on Axis 700 Network Scanner Server version 1.12.

tags | exploit
SHA-256 | 62be7cce360cae03aa7cf171c9411f06a344a3d1ae4af8abcb8218e26c1b8673
sco.snmpd.txt
Posted Feb 10, 2000
Authored by Shawn Bracken

The default configuration of SCO OpenServer 5.0.5 allows local users read/write access to SNMPD via a default writable community string. This configuration has been verified on SCO OpenServer 5.0.5 and may be present in earlier versions.

tags | exploit, local
SHA-256 | 3c82f312504d022a8c22babfcbc6580fa23cc95dd9cd9e92a5e994687ae533a7
mysql.txt
Posted Feb 10, 2000
Authored by Emphyrio

There exists a vulnerability in the password checking routines in the latest versions of the MySQL server, that allows any user on a host that is allowed to connect to the server, to skip password authentication, and access databases. All versions of MySQL up to 3.22.26a are vulnerable.

tags | exploit
SHA-256 | 5f5a4fb2100d5e175dc80ad904c3a600382a5f0b6c8153e8084244e2328cedac
Page 1 of 1
Back1Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close