exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-03-08

safer.000309.EXP.1.4
Posted Mar 8, 2000
Site safermag.com

S.A.F.E.R. Security Bulletin 000309.EXP.1.4 - StarOffice comes with a nice groupware server, called StarScheduler, which includes a web server that is vulnerable to several security problems, leading to remote code exection and root access.

tags | remote, web, root
SHA-256 | 20d5c4fc9990de97aeb124f4e5c58bf4dce2d6d9da6be61b3c34503af0ffcd43
httpd_flood.pl
Posted Mar 8, 2000
Authored by vade79, realhalo

Most webservers can be DoS'd by creating a large number of tcp connections from the same host. Simple, lame, and not spoofed, but effective nonetheless.

tags | denial of service, spoof, tcp
SHA-256 | 742f8b8c58b74086dd6f9e8870807bede34139f4d3d48adb713b24fbf53308f2
winsd.030800.txt
Posted Mar 8, 2000
Authored by winsd | Site win2000mag.com

Windows Security Digest - March 8, 2000. In this issue: Buffer Overflow in Clip Art Gallery, Device Names in a URL Can Crash Windows 9x, Internet Explorer 5.0 Allows Arbitrary Code Execution, Omniback Subject to Denial of Service, Feature: Kerberos in Windows 2000, HowTo: Maximizing Proxy Server Security, Review: Synch Passwords with SAM/PS or P-Synch 3.5, and How to Analyze Internal and External Firewall Activity.

tags | denial of service, overflow, arbitrary, code execution, magazine
systems | windows
SHA-256 | 6a8c9ed6cebe9b223ea141995ee14ce777b5b49b054b3802d778ae2a59be4aa9
winsd.030700.txt
Posted Mar 8, 2000
Authored by winsd | Site win2000mag.com

Windows Security Alert - Serious buffer overflow in Microsoft's ClipArt Gallery Live Update that could allow an intruder to gain control over a remote machine. Because clipart updates can be received from sites other than Microsoft, a malicious Web site operator can launch an exploit against an unsuspecting user. Affected Microsoft products include Office 2000, Works 2000, PictureIt 2000, HP 2000, Publisher99, and PhotoDraw 2000 Version 1.

tags | remote, web, overflow, magazine
systems | windows
SHA-256 | ad675d94704391ceb1013ac6d344640026895f7d321265f61298c341963b4d1c
saint-2.0.beta2.tar.gz
Posted Mar 8, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 5cbe1d1d292d519db4d8dc7a90e264fab5d367227a8af23f769b69c42d94e8d4
toast.0.2.tgz
Posted Mar 8, 2000
Authored by Gridmark

Toast is a shell script which launches 56 different DoS attacks against a victim IP. Binaries and source included.

Changes: Added couple more exploits, Complete script rewrite. now has preset attacks for Win95, win98/2k/NT, Linux, and *BSD. Automatic OS Selection via queso.
tags | denial of service, shell
SHA-256 | 4fa3d3b152d95cc046b06a63aaee0189105039f39f35848f758dc03de2d43c65
buGregCon-hotfix.EXE
Posted Mar 8, 2000
Authored by Carlos Eduardo Oliveira

Fix for bugregcon.vbs, a small script that added c:/con/con to the registry, rendering a windows system useless.

tags | registry
systems | windows
SHA-256 | 502de921b52b8e55a2b6084c73b22e406dc59dbe11c10a156bd27f6337b604c1
ipchains-firewall-1.7.0.tar.gz
Posted Mar 8, 2000
Authored by Ian Hall-Beyer | Site ipchains.nerdherd.net

ipchains-firewall is an easily-configurable shell script to establish masquerading and firewalling rules using ipchains. The package contains a script to establish firewalling for a single machine connected to the network without masquerading, a script to establish firewalling for a system acting as a router routing to non-private IP space, a script to establish firewalling and masquerading for a system acting as a router routing to private IP address space, and one to establish firewalling and masquerading for a system acting as a router, routing to multiple RFC1918 subnets over multiple interfaces. The distribution also includes a copy of midentd v1.6, to enable identd over the masqueraded network.

Changes: Single script operation. Detects network environment and runs out of the box.
tags | tool, shell, firewall
systems | linux
SHA-256 | cf88ed66335d82924a292f83db2889c6f309b9bcb9e7cdce3480bee29185d543
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close