what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-03-09

ms00-014
Posted Mar 9, 2000

Microsoft Security Bulletin (MS00-014) - Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0. The vulnerability allows the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database or on the underlying system that was hosting the SQL Server or MSDE database. Microsoft FAQ on this issue available here.

tags | remote
SHA-256 | 8d650d7fe06feed9d6f924164a526de1a196bb37989f31654e55b160cb9fc6d2
etherape-0.2.4.tar.gz
Posted Mar 9, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: Removal of non-blocking reverse lookups, a major bug fix with fill_names, cleanup.
tags | tool, sniffer
SHA-256 | af5a3f6322396ee300dffa541d0902f8100c6b57793c100f90495e87d0310a52
etherape-0.2.6.tar.gz
Posted Mar 9, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: Links not in use slowly fade out, and ethernet protocols are presented in different colors.
tags | tool, sniffer
SHA-256 | 632f77c87e73173885b742cad8f0bb57fd19a7848c771aa8f034e2fae4aa6813
redhat-printtool.txt
Posted Mar 9, 2000
Authored by Cho Kyong-won

By default, printtool leaves world readable printer passwords on Redhat 6.1 and 6.2B.

tags | exploit
systems | linux, redhat
SHA-256 | 83f0b23844e3d51becdd970b58879110654e3fa689b5b2e538daa609a6c683df
TFN2k_Analysis-1.3.txt
Posted Mar 9, 2000
Authored by Jason Barlow | Site www2.axent.com

This document is a technical analysis of the Tribe Flood Network 2000 (TFN2K) distributed denial-of-service (DDoS) attack tool, the successor to the original TFN Trojan by Mixter. Additionally, countermeasures for this attack are also covered.

Changes: This revision includes several new discoveries, corrections, and clarifications. Many thanks to those who responded with feedback and comments to the original posting of this paper.
tags | denial of service, trojan
SHA-256 | 52ca3aa11a97181fd8f458991f35f7642c2e78842154cb4db563dd4b37504103
ConConFix2.zip
Posted Mar 9, 2000
Authored by Arisme

Unofficial fix for the /con/con vulnerability. Win 95/98/se server operators may want to give it a try.

Changes: Fixes all devices, not just con/con.
SHA-256 | a635bc88b5678393faa4c2557a2cbd5c81f473f66f7c9eae1ec7f9cbef6f267d
debian.mtr.txt
Posted Mar 9, 2000

Debian Security Advisory - The version of mtr as distributed in Debian GNU/Linux 2l1 did not drop root privileges correctly. While there are no known exploits it is conceivable that a weakness in gtk or ncurses could be used to exploit this. Debian security homepage here.

tags | root
systems | linux, debian
SHA-256 | 700b8cd7130f87834567c495ee277853ced57c9ca1b4d0cf4ca2798f7791f817
ms-clipart.txt
Posted Mar 9, 2000
Authored by Dildog | Site L0pht.com

L0pht Research Labs Advisory - Microsoft ClipArt Gallery Overflow. An attacker can seize control of a Windows 95, 98, NT, or 2000 machine via any HTML source, including Microsoft Outlook e-mail. Proof of conccept exploit included.

tags | exploit, overflow
systems | windows
SHA-256 | 2ec7de2c3c3d0f143a2c07d960d34afb1a67c52f1b03a5b7f8a09bed7e065237
iis-enumerate.txt
Posted Mar 9, 2000
Authored by Jason Lutz

Another new way to find the web root directory of an IIS 4.0 webserver, if it is run on a share, by requesting a .idq file.

tags | exploit, web, root
SHA-256 | 6d259cef445a382e76d7f2c57cdb31eb4e7c9398b37fca02edd6435795568276
pocsag.txt
Posted Mar 9, 2000
Authored by Kuji

Pocsag v2.05, a popular pager decoding software by default accepts connections on port 8000 with a default password, even remote access is not enabled, allowing anyone to view the decoded data.

tags | exploit, remote
SHA-256 | 03c142a6dd83e470a50a1c6cce1fe8e287e9b2fe23130ae7f6ad2b167c84d37b
rhsa.2000-006-01.nmh
Posted Mar 9, 2000
Authored by creating specially formed MIME headers, it was possible to have nmh's 'mhshow' utility execute arbitrary shell code

Red Hat Security Advisory - New nmh packages are available to fix a remote vulnerability in nmh.

tags | remote
systems | linux, redhat
SHA-256 | 180cf743dd3838fcaeafbfb168f90185b0525bc0ba12b216f4aee5952a760ac7
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close