exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-04-23

porkbind-0.99b.tar.gz
Posted Apr 23, 2000
Authored by S

Porkbind retrieves version information for the nameservers of a domain and produces a report that describes possible vulnerabilities of each.

tags | tool, scanner, vulnerability
systems | unix
MD5 | 47edcc3f2c58dafac3727bac9ae7f8fa
BufOverA.tar.gz
Posted Apr 23, 2000
Authored by Massimo Bernaschi | Site iac.rm.cnr.it

BufOverA is a set of small Linux kernel patches which detect and block buffer overflows. The archive includes a whitepaper.

tags | overflow, kernel
systems | linux
MD5 | 40710ce6da569d10cd5e44b56323af0c
cisco.00-04-20.telnet
Posted Apr 23, 2000

Cisco Security Advisory: Cisco IOS Software TELNET Option Handling Vulnerability. A defect in multiple Cisco IOS software versions will cause a Cisco router to reload unexpectedly when the router is tested for security vulnerabilities by security scanning software programs. The defect can be exploited repeatedly to produce a consistent denial of service (DoS) attack. Vulnerable releases include 11.3AA, 12.0(2) up to and including 12.0(6), and 12.0(7).

tags | denial of service, vulnerability
systems | cisco
MD5 | 27305612e78c4c70907ce2f5433761ed
cisco.00-04-19.enable
Posted Apr 23, 2000

Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability. Cisco Catalyst software permits unauthorized access to the enable mode in the 5.4(1) release. Once initial access is granted, access can be obtained for the higher level "enable" mode without a password.

tags | bypass
systems | cisco
MD5 | 37453138d933754d84c8a8577b6d9cc1
ADV-150400.txt
Posted Apr 23, 2000
Authored by Narrow | Site legion2000.cc

Microsoft Frontpage CERN Image Map Dispatcher (/cgi-bin/htimage.exe) comes by default and has three vulnerabilities. The full path to the root directory is revealed, a buffer overflow was found - remote code execution may be possable, and files on the server may be accessed.

tags | exploit, remote, overflow, cgi, root, vulnerability, code execution
MD5 | 30a39ddb21f13f12d191f2d54852f646
wpc-0_2.tar.gz
Posted Apr 23, 2000

No information is available for this file.

tags | web
MD5 | da78f9f89001044a36e9d6011bcc3350
seawall-2.7.tar.gz
Posted Apr 23, 2000
Authored by Tom Eastep | Site seawall.sourceforge.net

Seawall is an ipchains firewall that supports IP masquerading and can be used on a standalone system, on a dedicated firewall system or on a multi-use gateway/server. It supports VPN via IPIP tunnels and PPTP, has an easy to edit configuration file, and can be extended without modifying the base product. It also includes realtime monitoring with an audible alarm that sounds when suspect packets are detected.

Changes: ICQ clients may run on standalone systems, a reduced number of rules where both PPTP clients and a server are masqueraded, and standard accept rule may be overridden.
tags | tool, firewall
systems | linux
MD5 | 2f8ea162534b045d7957f64772e54775
kill_nwtcp.c
Posted Apr 23, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Novell Netware 5.1 Remote Administration Service contains a buffer overflow that could allow an attacker to launch a denial of service attack against the system, or possibly inject code into the operating system for execution. DoS exploit included.

tags | exploit, remote, denial of service, overflow
MD5 | 9bb4f32c519d5e9f52e8f2d2e59aa7da
RUS-CERT.200004-01.txt
Posted Apr 23, 2000

RUS-CERT Advisory 200004-01: GNU Emacs 20 - Several vulnerabilities were discovered in all Emacs versions up to 20.6, including allowing unprivileged local users to eavesdrop the communication between Emacs and its subprocesses, Emacs Lisp tempfile problems, and the history of recently typed keys may expose passwords. The following systems were tested vulnerable: Linux, FreeBSD (and probably other *BSD variants), HP-UX 10.x, 11.00, and AIX 4. Solaris and DG/UX are unaffected.

tags | exploit, local, vulnerability
systems | linux, solaris, freebsd, bsd, aix, hpux
MD5 | 3bc2e5edea809f6d4512ec0a69c133d0
razor.dvwssr.txt
Posted Apr 23, 2000
Authored by Simple Nomad | Site razor.bindview.com

BindView RAZOR Team Analysis of DVWSSR.DLL - The risks of having dvwssr.dll are not as severe as originally reported in media outlets Friday morning, but still severe enough that system administrators responsible for NT systems to investigate. The risks involve whether or not a certain DLL is loaded, how rights are set, and potentially how Front Page 98 is used.

tags | exploit
MD5 | 741bdf7a183e2d3d358a281a462d6d51
panda-sec.zip
Posted Apr 23, 2000
Authored by Deepzone Security | Site ntsecurity.net

Panda Security 3.0 for Windows 95 and 98 can be bypassed. Panda Security 3.0 is vulnerable to indirect registry key modifications, which allow Panda Security keys to be manipulated by any logged-on user. Because of a lack in system integrity checks, the entire software package could be uninstalled by a user. This zipfile contains demonstration exploit code.

tags | exploit, registry
systems | windows, 9x
MD5 | 207e284fd9c737d880eb2eb5599effef
regback.asm
Posted Apr 23, 2000
Authored by Freddy Laplaine | Site asmbeginer.com

regback.asm is a backdoor for NT written in pure asm.

MD5 | 4ddb1703b127da9916bc98d1c7f287a2
sentinel-0.8.tar.gz
Posted Apr 23, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now threaded!
tags | tool, remote, intrusion detection
systems | unix
MD5 | a924a702a1c2ee4378ddd8ccfa9bb211
Page 1 of 1
Back1Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    10 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close