what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-04-24

gnit_rc1.zip
Posted Apr 24, 2000
Authored by glitch | Site security.ellicit.org

GNITvse rc1: GNIT Vulnerability Scanning Engine Release Candidate One - (for WIN2K and NT systems). Performs a port scan, and based on those findings, calls other functions. Checks for MANY windows based vulnerabilities, and grabs banners.

tags | tool, scanner, vulnerability
systems | windows, unix
SHA-256 | 1f337843a9ce01d908ccead72c80e7d43812269e422e2807368214bcf2e7c725
fssetup.zip
Posted Apr 24, 2000
Authored by Movax4c00int21h | Site geocities.com

FTP Scanner v2.2.59 is a windows application which will scan a range of IP addresses for any login and password you specify.

Changes: Fixed the overflow problem with the Socket Shutdown function. FTP Scanner now has support for 256 threads under Windows 2000.
systems | windows
SHA-256 | 38f7bab95018d3f33f227e902b67a8d2002a57b386b6a0d24812e9ded7a843fa
b0f3-ncurses.txt
Posted Apr 24, 2000
Authored by Venglin | Site b0f.com

BufferOverflow Security Advisory #3 - libncurses buffer overflow in NCURSES 1.8.6 on FreeBSD 3.4-STABLE. Setuid programs linked with libncurses can be exploited to obtain root access.

tags | overflow, root
systems | freebsd
SHA-256 | d3900b7fe44530224283ef6bcd98f8704f6c629dab6bcb828e3d5083c81ea48e
freebsd.mtr.c
Posted Apr 24, 2000
Authored by Venglin | Site freebsd.lublin.pl

FreeBSD mtr-0.41 local root exploit.

tags | exploit, local, root
systems | freebsd
SHA-256 | 8fb8c8be26e6cdcb84cb5bb42887b0e84ec53f58ef96682bfc2e84d893e90fd4
Nmap Scanning Utility 2.30 BETA 21
Posted Apr 24, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Added a bunch of new OS fingerprints, fixed a bug that completely broke RPC scanning in BETA19, listed the port ranges scanned at the top of the machine log, fixed important target IP range parsing bug, nmapfe fixes, fixed a bug which could cause Nmap to mark a port filtered based on ICMP dest. unreachable packets relating to a different host than the one being scanned, fixed output problem relating to ident scan, better netbsd compatibility, and misc bug fixes.
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | 4c9cb2a6a8c1bf58251b9e7976b690741e13813f3a85b79b11751d4a272dd128
ISS Security Advisory April 24, 2000
Posted Apr 24, 2000

Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server.

tags | remote, web, arbitrary, local
systems | linux, redhat
SHA-256 | 61d620c67900aae2e66e83528048b341915c2605077b43b58e0a2baedc393854
incognitomail2.c
Posted Apr 24, 2000
Authored by Chandler

incognitomail2.c sends fake mail using a wingate proxy to obscure the true origin of the message.

SHA-256 | 2db83f0aa98b6e3f8d8a8da4354b8fb4d3e12832b720864635806f9cb449ef61
lcdproc-exploit.c
Posted Apr 24, 2000
Authored by Andrew Hobgood

LCDproc is a system to display system information and other data on an LCD display which uses client / server communication. The server is vulnerable to remote buffer overflow allowing an attacker to remotely execute arbitrary code or cause the LCDproc server to crash. Patch available here.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 14eb38e3f0574a9702bdc7ae0cfe610a25f981b43a50cbfb49142d570cf2b5a2
CISADV000420.txt
Posted Apr 24, 2000
Authored by David Litchfield

Cerberus Information Security Advisory CISADV000420 - Windows NT/2000 cmd.exe overflow. Web servers that will execute batch files as CGI scripts on behalf of a client are therefore opened up to a Denial of Service attack. By providing an overly long string as an argument to a CGI based batch file it is possible to crash the command interpreter in the "clean up" stages.

tags | web, denial of service, overflow, cgi
systems | windows
SHA-256 | 0dcbdc1ab5da7d7148582f2f06ad1011474b95363fe58c05094dfee1821bee25
wmaker.c
Posted Apr 24, 2000
Authored by Sectorx | Site xorteam.cjb.net

Windowmaker 0.62.0 buffer overflow exploit - Although wmaker is not suid by default, this code will overflow the $DISPLAY environment variable.

tags | exploit, overflow
SHA-256 | b98763e09a49cfb34054e919d503acf4584f861224878015ea7919bd5bb66904
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close