what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-07-19

xscreensaver-3.25.tar.gz
Posted Jul 19, 2000
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Improvments to about a dozen modules, and a new module, nerverot.
tags | root
systems | unix
SHA-256 | 47693caee2ceae1d822ec08f5060574217f4d110c178ad2438892dcd950190c5
VIGILANTE-2000004.txt
Posted Jul 19, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #4 - HP Jetdirect FTP service has a remote denial of service vulnerability affecting versions 8.20 and below. A long quote command causes the printer to crash, requiring a power cycle.

tags | exploit, remote, denial of service
SHA-256 | 1760e48ed7729a901d201f966befad75e524963895c62e5c4145172f6c551d13
outlook.advisory.txt
Posted Jul 19, 2000
Authored by Aaron Drew

Microsoft Outlook Advisory and Remote Exploit - A bug in a shared component of Microsoft Outlook and Outlook Express mail clients can allow a remote user to write arbitrary data to the stack. This bug has been found to exist in all versions of MS Outlook and Outlook Express on both Windows 95/98 and Windows NT 4. Includes in depth discussion and proof-of-point exploit that, when placed in the header field of a message or MIME attached message, will download and execute an executable from the web.

tags | exploit, remote, web, arbitrary
systems | windows
SHA-256 | 924dc94a7e9e122649116ef845008adf1d26be73434d2b03a7a0aebee8190822
labs50.txt
Posted Jul 19, 2000
Site ussrback.com

Advisory #50 - An exploitable buffer overflow has been found in all versions of Microsoft Outlook. The vulnerability could enable a malicious sender of an e-mail message with a malformed header to cause and exploit a buffer overrun on a user's machine. The buffer overrun could crash Outlook Express, Outlook e-mail client, or cause arbitrary code to run on the user's machine. The danger in this vulnerability is that the buffer overrun would occur even if the user does not open or preview the e-mail message.

tags | overflow, arbitrary
SHA-256 | 3ac1c77969b0584ae303da959fdb8a320f93d58dd3415315da364ebff37b560f
outoutlook.zip
Posted Jul 19, 2000

Microsoft Outlook remote exploit - Tested on Outlook Express 5.0, Outlook 2000, Outlook 97.0, and Outlook 98. Includes Unix Perl version and windows source / binary. The included shellcode causes the victim computer to visit http://www.ussrback.com.

tags | remote, web, perl, shellcode
systems | windows, unix
SHA-256 | 085dddfa2bd4ab473d84d0b82e4c65819d4e26e0cd1c0a68942ef5f759e74c63
ip-fil3.4.7.tar.gz
Posted Jul 19, 2000
Authored by Darren Reed | Site coombs.anu.edu.au

IP Filter is a TCP/IP packet filter suitable for use in a firewall environment. To use, it can either be run as a loadable kernel module (recommended) or incorporated into your UNIX kernel. Scripts are provided to install and patch system files as required.

Changes: Bug fixes.
tags | tool, kernel, tcp, firewall
systems | unix
SHA-256 | 01365d6ccef85bdc33799b5b0784e8dfefcd84217b0ecc5ac0a1e23c7e491057
Page 1 of 1
Back1Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close