Twenty Year Anniversary
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-03-04

Posted Mar 4, 2000
Authored by LSD | Site

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
MD5 | 2f117b3fcceb11a27bd2e4924725d9e5
Posted Mar 4, 2000
Authored by l-n1nja | Site

sXe sends IGMP packets, denying service to windows machines. If you can figure out how to use this, you can create quite an effective attack from even a 14kbs modem.

tags | exploit
systems | windows
MD5 | bb83e80359ad9e3003efa5ae30eae779
Posted Mar 4, 2000
Authored by Jared

Irix 6.5 InfoSearch is a web-based interface to books, manpages, and relnotes, distributed by SGI. infosrch.cgi can execute commands remotely.

tags | exploit, web, cgi
systems | irix
MD5 | 3536615dd0985d711d41b0dd562fccc8
Posted Mar 4, 2000
Authored by Cruz

AOL Instant Messenger can be crashed remotely with upper ascii symbols, version 3.5 tested, others most likely vulnerable. Unofficial patch available on the homepage, here.

tags | exploit, denial of service
MD5 | 8dc152bd7055edb9071046aeb23c66f2
Posted Mar 4, 2000
Authored by Gregory Duchemin | Site

Trendmicro Officescan 3.5 has severe remote vulnerabilities, allowing a malicious user to remotely uninstall the anti virus, remotely stop the scan, remotely make the anti virus inefficient by modifying the scan configuration file through the network on the target pc, and finally, remotely write anywhere on the target file system! Includes exploit instructions.

tags | exploit, remote, vulnerability, virus
MD5 | 4431e88e2b6d7f7432ae00eb637b6f9c
Posted Mar 4, 2000
Authored by Balazs Scheidler | Site

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Important new feature - macro expansion in destination filenames. Also contains stability and portability enhancements, and lots of code cleanup.
tags | system logging
systems | unix
MD5 | 5245d975a4ef394c1d1af75a7b6334f6
Posted Mar 4, 2000
Authored by Zoa_Chien

Many Windows programs crash if they access c:/con/con. IE and servU-FTP v 2.4a among others are vulnerable.

tags | exploit
systems | windows
MD5 | 0af0fb7ddfa8bdf566beb63dad61ad17
Posted Mar 4, 2000
Authored by Nick Kurshev | Site

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

systems | linux
MD5 | b2ce070901ee1e0b2949a595bf3c087f
Posted Mar 4, 2000
Authored by Gerald Combs | Site

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: The new version lets you open a single packet's decode tree in a separate window. New protocol support includes Cisco's Group Management Protocol and Virtual Trunking Protocol, Time Protocol, SMB Mailslot and Netlogon, DHIS, and Sinec H1. Other protocol decoders were improved and fixed. Support for HPUX 11 nettl files was added, and the win32 port was enhanced to use the WinDump libpcap library and to use plugins.
tags | tool, sniffer, protocol
systems | unix
MD5 | e1a31df80484535c4c0d773b696630f3
Posted Mar 4, 2000
Authored by Tom Wu | Site

Secure Remote Password (SRP) is a password-based authentication and key exchange mechanism where no information about the password is leaked during the authentication process. It does not require any public key infrastructure, and uses two DH keypairs so if one were to eavesdrop on the authentication process no information which would aid in guessing the password can be obtained. There are some modified telnet and ftp clients and servers available for use with SRP already.

Changes: OpenBSD support, a new license, integrity-protected encryption, and bugfixes.
tags | remote, encryption
MD5 | 2e1771d5930e7594a04b03f3dfc6ab02
Posted Mar 4, 2000
Authored by Gerald Combs | Site

Ethereal for Windows - Although the Ethereal source code now supports the WinDump libpcap library, my win32 build system still does not have a good version of this library, so the binary I have uploaded does *not* have capturing enabled. Included in the zip file is a file called "README.win32" which talks about both compiling and running Ethereal on Win32 platforms.

tags | tool, sniffer
systems | windows, 32
MD5 | c1be75754e1a371f5bf02d6aaf19dc44
Posted Mar 4, 2000
Authored by Paseante, set | Site

Saqueadores Edicion Tecnica Issue #22 (En Espanol). Featuring everything about GPS&GLONASS, Random Numbers how's and why's, Electronics (lots of), Linux Kernel Modules Games, MacroVision Anti-Tapping and V-Chip, Cisco Routers on X.25 networks and more.

tags | kernel, magazine
systems | cisco, linux
MD5 | b809ce5cbba67c655635e3376074ded4
Posted Mar 4, 2000
Authored by Chopsui-cide | Site

sps3.c - Spaghetti Proxy Server 3.0 DoS attack. It does not appear as though arbitrary code could be execute using this vulnerability.

tags | exploit, arbitrary
MD5 | 9e650d8949757a5298f8ab4dc6401c87
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    8 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By