Twenty Year Anniversary
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-04-27
Posted Apr 27, 2000
Authored by SnakeByte | Site

TFAK v3.0 is a client for 22 remote access trojans, and removes 257 remote access trojans and 9 file joiners. This is the first and only trojan scanner which is able to find new, unknown trojans. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Improved heuristics, the ability to scan entire folders, added the option to edit the autostarted files, automatic autostart file monitoring.
tags | remote, trojan
MD5 | 5a1aab513e67ad9e9a705dde2308a8c8
Posted Apr 27, 2000

fgets() is unsafely used in qpopper version 2.53.

tags | exploit
MD5 | d8c98f6f77bed4579d8a40dcbe530673
Posted Apr 27, 2000
Authored by Matt Power

Meeting Maker is a networked calendaring/scheduling software package that's estimated to be installed on over 700,000 desktops. Clients send passwords to a Meeting Maker server encoded using a polyalphabetic substitution cipher. Included perl script will decode passwords sent over the net.

tags | exploit, perl
MD5 | 6aa12572911a2db11e972569d941f6aa
Posted Apr 27, 2000
Authored by noir | Site

/usr/bin/lpset vulnerability in Solaris/SPARC 2.7.

tags | exploit
systems | solaris
MD5 | 54d2bd2b4f12959c9ef21f1ec38d019b
Posted Apr 27, 2000
Authored by Kil3r | Site

redhat 6.1 /usr/bin/man exploit.

tags | exploit
systems | linux, redhat
MD5 | 615c44e4e6b424aeadbc606befd53fa1
Posted Apr 27, 2000

Red Hat Security Advisory RHSA-2000:014-16 - The GUI portion of Piranha may allow any remote attacker to execute commands on the server. This may allow a remote attacker to launch additional exploits against a web site from inside the web server. This is an updated release that disables Piranha's web GUI interface unless the site administrator enables it explicitly.

tags | remote, web
systems | linux, redhat
MD5 | 06734cf99f93f95374a6dce7ba47e718
Posted Apr 27, 2000
Authored by DiGiT

Solaris 2.7 /usr/bin/lp local exploit, i386.

tags | exploit, local
systems | solaris
MD5 | d6d4028df3254b92a693b7db70dd2ced
Posted Apr 27, 2000
Authored by DiGiT

xsun2.c is a Solaris 7 x86 local root stack overflow for /usr/openwin/bin/Xsun.

tags | exploit, overflow, x86, local, root
systems | solaris
MD5 | 86c69c7b9a4bfb93d65ad4dae756f4f5
Posted Apr 27, 2000
Authored by Laurent Levier

/usr/bin/lpset local root exploit for sparc.

tags | exploit, local, root
MD5 | 039315a1ae2ffc9d35d71111e4ad05b9
Posted Apr 27, 2000
Authored by Funkysh

imwheel local root exploit (as discussed in RHSA-2000:016-02).

tags | exploit, local, root
MD5 | 3921848bcb87f1605cb4c04cd19564ba
Posted Apr 27, 2000
Authored by David Litchfield | Site

Cerberus Information Security Advisory CISADV000427 - Cart32 secret password Backdoor. he Cerberus Security Team has discovered a serious security hole in Cart32 ( that can only be described as a blatant backdoor. Within cart32.exe, the main file that provides the cart's functionality, there is a secret hidden password that can be used to gain vital information such as other passwords and using these an attacker can modify the shopping cart's properties so that arbitary commands may be run on the server as well as gain access to customers' credit card details, shipping addresses and other highly sensitive information.

tags | web
MD5 | aaafc304f4c732e5e8a33ca3531727cf
Posted Apr 27, 2000
Authored by Lance Spitzner | Site

Passive Fingerprinting is a method to learn more about the enemy, without them knowing it. Specifically, you can determine the operating system and other characteristics of the remote host using nothing more then sniffer traces. Though not 100% accurate, you can get surprisingly good results by looking at the TTL, TOS, Window Size, and DF bit. Includes information on changing your machines fingerprint on Linux and Solaris.

tags | paper, remote
systems | linux, unix, solaris
MD5 | 8bee07cbafbcbd2801a8aff717f7959d
Posted Apr 27, 2000
Authored by eth0 | Site

Timbuktu Pro 2.0b650 denial of service exploit.

tags | denial of service
MD5 | 9f2830f69b5d9919739d014f885ba830
Posted Apr 27, 2000
Authored by winsd | Site

Windows Security Update April 19 - In this issue: FrontPage 2000 Exposes Win2K Accounts, Buffer Overflow in Cmd.exe, Active Directory Mixed Object Access, Cisco IOS Subject to Denial of Service, Real Server Denial of Service, Netscape Communicator Exposes Local Files, Buffer Overflow and Path Exposure in HTimage, Internet Explorer 5.01 Allows Cross-Frame Navigation, Netware 5.1 Remote Administration Overflow, and Panda Security 3.0 Can Be Bypassed.

tags | remote, denial of service, overflow, local, magazine
systems | cisco, windows, 2k
MD5 | dab51a1fc4ea87162425f1819b5bd7bc
Posted Apr 27, 2000
Authored by djHD

Vulnerability found in cgi DNEWSWEB used for reading news groups from web. Its possible to overflow stack and read any file from remote host with web server rights. All versions and for all OSes exploitable. Example of reading file /etc/passwd for Linux included. Fixed in dnews 5.4c1, available here.

tags | exploit, remote, web, overflow, cgi
systems | linux
MD5 | 7fecf06e0095216f42b4c27cdb41a8d8
Posted Apr 27, 2000
Authored by Mike Richardson | Site

KSnuffle is a network packet sniffer for KDE. It supports multiple concurrent sniffers, packet filtering (aka tcpdump), event triggers and commands, text and binary logging (and replay), remote sniffing (via a demon process), and dynamically loadable plugins. Network traffic is displayed graphically and in detail; supplied plugins summarise traffic by direction (incoming, outgoing), source, and destination.

tags | tool, remote, sniffer
MD5 | 69c2f97e99e3fe2738ecad7b90f97cd0
Posted Apr 27, 2000

CERT Advisory CA-2000-03 - Continuing Compromises of DNS servers. Many systems are vulnerable to remote root bind bugs which are increasingly being exploited. A significant number of delegates DNS servers in the tree are running outdated version of DNS software as well. CERT

tags | remote, root
MD5 | 32549c6a877570f9948d9f777077df64
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    7 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By