exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-07-19

xscreensaver-3.25.tar.gz
Posted Jul 19, 2000
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Improvments to about a dozen modules, and a new module, nerverot.
tags | root
systems | unix
SHA-256 | 47693caee2ceae1d822ec08f5060574217f4d110c178ad2438892dcd950190c5
VIGILANTE-2000004.txt
Posted Jul 19, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #4 - HP Jetdirect FTP service has a remote denial of service vulnerability affecting versions 8.20 and below. A long quote command causes the printer to crash, requiring a power cycle.

tags | exploit, remote, denial of service
SHA-256 | 1760e48ed7729a901d201f966befad75e524963895c62e5c4145172f6c551d13
outlook.advisory.txt
Posted Jul 19, 2000
Authored by Aaron Drew

Microsoft Outlook Advisory and Remote Exploit - A bug in a shared component of Microsoft Outlook and Outlook Express mail clients can allow a remote user to write arbitrary data to the stack. This bug has been found to exist in all versions of MS Outlook and Outlook Express on both Windows 95/98 and Windows NT 4. Includes in depth discussion and proof-of-point exploit that, when placed in the header field of a message or MIME attached message, will download and execute an executable from the web.

tags | exploit, remote, web, arbitrary
systems | windows
SHA-256 | 924dc94a7e9e122649116ef845008adf1d26be73434d2b03a7a0aebee8190822
labs50.txt
Posted Jul 19, 2000
Site ussrback.com

Advisory #50 - An exploitable buffer overflow has been found in all versions of Microsoft Outlook. The vulnerability could enable a malicious sender of an e-mail message with a malformed header to cause and exploit a buffer overrun on a user's machine. The buffer overrun could crash Outlook Express, Outlook e-mail client, or cause arbitrary code to run on the user's machine. The danger in this vulnerability is that the buffer overrun would occur even if the user does not open or preview the e-mail message.

tags | overflow, arbitrary
SHA-256 | 3ac1c77969b0584ae303da959fdb8a320f93d58dd3415315da364ebff37b560f
outoutlook.zip
Posted Jul 19, 2000

Microsoft Outlook remote exploit - Tested on Outlook Express 5.0, Outlook 2000, Outlook 97.0, and Outlook 98. Includes Unix Perl version and windows source / binary. The included shellcode causes the victim computer to visit http://www.ussrback.com.

tags | remote, web, perl, shellcode
systems | windows, unix
SHA-256 | 085dddfa2bd4ab473d84d0b82e4c65819d4e26e0cd1c0a68942ef5f759e74c63
ip-fil3.4.7.tar.gz
Posted Jul 19, 2000
Authored by Darren Reed | Site coombs.anu.edu.au

IP Filter is a TCP/IP packet filter suitable for use in a firewall environment. To use, it can either be run as a loadable kernel module (recommended) or incorporated into your UNIX kernel. Scripts are provided to install and patch system files as required.

Changes: Bug fixes.
tags | tool, kernel, tcp, firewall
systems | unix
SHA-256 | 01365d6ccef85bdc33799b5b0784e8dfefcd84217b0ecc5ac0a1e23c7e491057
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close