exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-03-08

Posted Mar 8, 2000
Site safermag.com

S.A.F.E.R. Security Bulletin 000309.EXP.1.4 - StarOffice comes with a nice groupware server, called StarScheduler, which includes a web server that is vulnerable to several security problems, leading to remote code exection and root access.

tags | remote, web, root
MD5 | 7638b30db584cbbd94e068974d39ef42
Posted Mar 8, 2000
Authored by vade79, realhalo

Most webservers can be DoS'd by creating a large number of tcp connections from the same host. Simple, lame, and not spoofed, but effective nonetheless.

tags | denial of service, spoof, tcp
MD5 | c317a1a85163cd490d37fdc411ac25cd
Posted Mar 8, 2000
Authored by winsd | Site win2000mag.com

Windows Security Digest - March 8, 2000. In this issue: Buffer Overflow in Clip Art Gallery, Device Names in a URL Can Crash Windows 9x, Internet Explorer 5.0 Allows Arbitrary Code Execution, Omniback Subject to Denial of Service, Feature: Kerberos in Windows 2000, HowTo: Maximizing Proxy Server Security, Review: Synch Passwords with SAM/PS or P-Synch 3.5, and How to Analyze Internal and External Firewall Activity.

tags | denial of service, overflow, arbitrary, code execution, magazine
systems | windows, 2k, 9x
MD5 | 8e8e93ceceaf3579e6150f7b49cb9d92
Posted Mar 8, 2000
Authored by winsd | Site win2000mag.com

Windows Security Alert - Serious buffer overflow in Microsoft's ClipArt Gallery Live Update that could allow an intruder to gain control over a remote machine. Because clipart updates can be received from sites other than Microsoft, a malicious Web site operator can launch an exploit against an unsuspecting user. Affected Microsoft products include Office 2000, Works 2000, PictureIt 2000, HP 2000, Publisher99, and PhotoDraw 2000 Version 1.

tags | remote, web, overflow, magazine
systems | windows
MD5 | 6cbb82852c85db88edd810125c207f89
Posted Mar 8, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
MD5 | 900fd265583eaf17ede071b915c32caa
Posted Mar 8, 2000
Authored by Gridmark

Toast is a shell script which launches 56 different DoS attacks against a victim IP. Binaries and source included.

Changes: Added couple more exploits, Complete script rewrite. now has preset attacks for Win95, win98/2k/NT, Linux, and *BSD. Automatic OS Selection via queso.
tags | denial of service, shell
MD5 | ad85ebfb8a63995df3fb3c0ebfc10123
Posted Mar 8, 2000
Authored by Carlos Eduardo Oliveira

Fix for bugregcon.vbs, a small script that added c:/con/con to the registry, rendering a windows system useless.

tags | registry
systems | windows
MD5 | a161cb76b1ce2eec070c1583f2ea1e62
Posted Mar 8, 2000
Authored by Ian Hall-Beyer | Site ipchains.nerdherd.net

ipchains-firewall is an easily-configurable shell script to establish masquerading and firewalling rules using ipchains. The package contains a script to establish firewalling for a single machine connected to the network without masquerading, a script to establish firewalling for a system acting as a router routing to non-private IP space, a script to establish firewalling and masquerading for a system acting as a router routing to private IP address space, and one to establish firewalling and masquerading for a system acting as a router, routing to multiple RFC1918 subnets over multiple interfaces. The distribution also includes a copy of midentd v1.6, to enable identd over the masqueraded network.

Changes: Single script operation. Detects network environment and runs out of the box.
tags | tool, shell, firewall
systems | linux
MD5 | 988e1abe16a5a80edbbd882a759a3f54
Page 1 of 1

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By