what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-06-07

netsec16.txt
Posted Jun 7, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 16 - 07.05.2000 - Covers weekly roundups of security related events. In this issue: Outlook patch which lets administrators selectively permit some attachments could cause compatibility problems with software meant to work with Outlook, Microsoft Brasil web site defaced, ech0 security scanner, domain hijacking, Allegro-Software-RomPager vulnerable to DoS, Linux-Mandrake bind no longer runs as root, Linux-Mandrake Xlockmore security update, Checkpoint Firewall-1 IP Fragmentation Vulnerability, vbs gnutella worm, vbs_timofonica virus, and more.

tags | worm, web, root, virus
systems | linux, mandrake
SHA-256 | 98ceee0ab94aec7441a4a451c471432cab56af962c32da56b3b2189a98f3b536
mdma-5.savant.txt
Posted Jun 7, 2000
Authored by Wizdumb | Site subversion.za.org

MDMA Advisory #5 - It is possible to view the source of CGI scripts running under the Savant Webserver by omitting the HTTP version from your request.

tags | exploit, web, cgi
SHA-256 | 1724fba392451be3b3274800afadb12de1c0b9bc1ae2d9480be7bf44fb177af0
linux-security.1-6.txt
Posted Jun 7, 2000
Authored by Benjamin Thomas, Dave Wreski | Site linuxsecurity.com

Linux Security Magazine June 5, 2000. In this issue - Articles: An Introduction to IP Masquerading - Part 2, Firewall placement, Cracked! Part 4: The Sniffer, Who's Sniffing Your Network?, Update: Blocking "Killer Resume", Buffer Overrun Vulnerabilities in Kerberos, popa3d v0.4 contributed Kerberos, Linux Deleted File Recovery Tool, Mission Critical Linux, and Domain Hijacking Raises Security Issue. Advisories: RedHat Majordomo, Turbolinux users can view shadowed password file, PGP 5.0 Key generation weakness, SuSE kmulti local root compromise, Mandrake kdesu vulnerability, NetBSD Local "cpu-hog" denial of service, NetBSD SysV semaphore denial-of-service, NetBSD /etc/ftpchroot parsing broken, NetBSD Exploitable Vulnerability in Xlockmore, OpenBSD Xlockmore vulnerability, OpenBSD ipf vulnerability.

tags | denial of service, overflow, local, root, vulnerability
systems | linux, redhat, netbsd, suse, openbsd, mandrake
SHA-256 | f0f51e6bebaced28e0897a3a32124913bf3c6f78a6cd621e702bf62b3c0902bf
ie-iframe.txt
Posted Jun 7, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #12 - Internet Explorer 5.01 under Windows 98 (other versions are also vulnerable) allows circumventing "Cross frame security policy" by accessing the DOM of documents using JavaScript, IFRAME and WebBrowser control. This exposes the whole DOM of the target document and opens lots of security risks, such as reading local files, reading files from any host, window spoofing, getting cookies, etc. Exploit code included. Demonstration available here.

tags | exploit, local, spoof, javascript
systems | windows
SHA-256 | 8aa57814b27a04133662e4ce2ca66e82e2d3cbb4f03b5ed71b69ebd2cf052c2c
firewall-1.fragment.txt
Posted Jun 7, 2000
Authored by Lance Spitzner | Site enteract.com

DoS attack for all platforms of Checkpoint Firewall-1 has been identified. Large numbers of fragmented packets cause the CPU to hit 100% utilization, and the system locks up. Some systems may also crash, depending on OS type. The rulebase can not be used to block the attack, and nothing is logged. More information on Firewall-1's state table available here.

tags | exploit
SHA-256 | 443e72af7463c692428baddc50b3b04477971f4a89888b58f9bd92548ef83428
mdma-6.eserv.txt
Posted Jun 7, 2000
Authored by Wizdumb | Site subversion.za.org

MDMA Advisory #6 - EServ v2.92 and prior are vulnerable to a logging heap overflow vulnerability. Java proof of concept exploit code included.

tags | exploit, java, overflow, proof of concept
SHA-256 | 8f8294582a025b703fc4bcc38a6d47de57ed4735dddb9a13e1f4b02168d4ba63
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close