exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-04-23

Posted Apr 23, 2000
Authored by S

Porkbind retrieves version information for the nameservers of a domain and produces a report that describes possible vulnerabilities of each.

tags | tool, scanner, vulnerability
systems | unix
MD5 | 47edcc3f2c58dafac3727bac9ae7f8fa
Posted Apr 23, 2000
Authored by Massimo Bernaschi | Site iac.rm.cnr.it

BufOverA is a set of small Linux kernel patches which detect and block buffer overflows. The archive includes a whitepaper.

tags | overflow, kernel
systems | linux
MD5 | 40710ce6da569d10cd5e44b56323af0c
Posted Apr 23, 2000

Cisco Security Advisory: Cisco IOS Software TELNET Option Handling Vulnerability. A defect in multiple Cisco IOS software versions will cause a Cisco router to reload unexpectedly when the router is tested for security vulnerabilities by security scanning software programs. The defect can be exploited repeatedly to produce a consistent denial of service (DoS) attack. Vulnerable releases include 11.3AA, 12.0(2) up to and including 12.0(6), and 12.0(7).

tags | denial of service, vulnerability
systems | cisco
MD5 | 27305612e78c4c70907ce2f5433761ed
Posted Apr 23, 2000

Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability. Cisco Catalyst software permits unauthorized access to the enable mode in the 5.4(1) release. Once initial access is granted, access can be obtained for the higher level "enable" mode without a password.

tags | bypass
systems | cisco
MD5 | 37453138d933754d84c8a8577b6d9cc1
Posted Apr 23, 2000
Authored by Narrow | Site legion2000.cc

Microsoft Frontpage CERN Image Map Dispatcher (/cgi-bin/htimage.exe) comes by default and has three vulnerabilities. The full path to the root directory is revealed, a buffer overflow was found - remote code execution may be possable, and files on the server may be accessed.

tags | exploit, remote, overflow, cgi, root, vulnerability, code execution
MD5 | 30a39ddb21f13f12d191f2d54852f646
Posted Apr 23, 2000

No information is available for this file.

tags | web
MD5 | da78f9f89001044a36e9d6011bcc3350
Posted Apr 23, 2000
Authored by Tom Eastep | Site seawall.sourceforge.net

Seawall is an ipchains firewall that supports IP masquerading and can be used on a standalone system, on a dedicated firewall system or on a multi-use gateway/server. It supports VPN via IPIP tunnels and PPTP, has an easy to edit configuration file, and can be extended without modifying the base product. It also includes realtime monitoring with an audible alarm that sounds when suspect packets are detected.

Changes: ICQ clients may run on standalone systems, a reduced number of rules where both PPTP clients and a server are masqueraded, and standard accept rule may be overridden.
tags | tool, firewall
systems | linux
MD5 | 2f8ea162534b045d7957f64772e54775
Posted Apr 23, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Novell Netware 5.1 Remote Administration Service contains a buffer overflow that could allow an attacker to launch a denial of service attack against the system, or possibly inject code into the operating system for execution. DoS exploit included.

tags | exploit, remote, denial of service, overflow
MD5 | 9bb4f32c519d5e9f52e8f2d2e59aa7da
Posted Apr 23, 2000

RUS-CERT Advisory 200004-01: GNU Emacs 20 - Several vulnerabilities were discovered in all Emacs versions up to 20.6, including allowing unprivileged local users to eavesdrop the communication between Emacs and its subprocesses, Emacs Lisp tempfile problems, and the history of recently typed keys may expose passwords. The following systems were tested vulnerable: Linux, FreeBSD (and probably other *BSD variants), HP-UX 10.x, 11.00, and AIX 4. Solaris and DG/UX are unaffected.

tags | exploit, local, vulnerability
systems | linux, solaris, freebsd, bsd, aix, hpux
MD5 | 3bc2e5edea809f6d4512ec0a69c133d0
Posted Apr 23, 2000
Authored by Simple Nomad | Site razor.bindview.com

BindView RAZOR Team Analysis of DVWSSR.DLL - The risks of having dvwssr.dll are not as severe as originally reported in media outlets Friday morning, but still severe enough that system administrators responsible for NT systems to investigate. The risks involve whether or not a certain DLL is loaded, how rights are set, and potentially how Front Page 98 is used.

tags | exploit
MD5 | 741bdf7a183e2d3d358a281a462d6d51
Posted Apr 23, 2000
Authored by Deepzone Security | Site ntsecurity.net

Panda Security 3.0 for Windows 95 and 98 can be bypassed. Panda Security 3.0 is vulnerable to indirect registry key modifications, which allow Panda Security keys to be manipulated by any logged-on user. Because of a lack in system integrity checks, the entire software package could be uninstalled by a user. This zipfile contains demonstration exploit code.

tags | exploit, registry
systems | windows, 9x
MD5 | 207e284fd9c737d880eb2eb5599effef
Posted Apr 23, 2000
Authored by Freddy Laplaine | Site asmbeginer.com

regback.asm is a backdoor for NT written in pure asm.

MD5 | 4ddb1703b127da9916bc98d1c7f287a2
Posted Apr 23, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now threaded!
tags | tool, remote, intrusion detection
systems | unix
MD5 | a924a702a1c2ee4378ddd8ccfa9bb211
Page 1 of 1

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    7 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By