exploit the possibilities
Showing 1 - 5 of 5 RSS Feed

Files Date: 2000-08-22

xslrnpull.c
Posted Aug 22, 2000
Authored by vade79, realhalo | Site realhalo.org

Slrnpull.c exploits a local buffer overflow vulnerability in slrnpull version 0.9.6.2, which is setgid news. Tested against RedHat 6.2.

tags | exploit, overflow, local
systems | linux, redhat
MD5 | 71914e4011b9a4a07c80e1c6268761eb
windump203.zip
Posted Aug 22, 2000
Authored by Foundstone Labs | Site foundstone.com

WinDump: TCPdump for Windows NT - Version 2.03 - This is a dynamically loadable version of WinDump, a network capture program developed by Network Research Group (NRG) of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley National Laboratory (LBNL) in Berkeley, California. Originally available only on UNIX platform, this is a port to Windows NT 4.0 / Win95. It consists of an executable (the windump main program) with a network capture driver.

tags | tool, sniffer
systems | windows, 9x, unix, nt
MD5 | 1e97cd11d972743b8225e1bfe1bbc0ab
ms00-059
Posted Aug 22, 2000

Microsoft Security Bulletin (MS00-059) - Microsoft has released a patch for a security vulnerability in the Microsoft virtual machine (Microsoft VM). If a malicious web site operator were able to coax a user into visiting his site, the vulnerability could allow him to masquerade as the user, visit other sites using his identity, and relay the information back to his site. Microsoft FAQ on this issue available here

tags | web
MD5 | e4efe9ea6ba83f46ebe02567337f86c3
FPipe_2.01
Posted Aug 22, 2000
Authored by Foundstone Labs | Site foundstone.com

FPipe is a TCP source port forwarder/redirector that can be used to force a TCP stream to always connect using a specific source port. This tool can be used to get around firewalls that only accept traffic originating from common source ports.

tags | tcp
MD5 | b5c77897d256fcead84f898462dccf06
netsec26.txt
Posted Aug 22, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 26 - 21.08.2000 - Covers weekly roundups of security related events. In this issue: Updated perl and mailx packages to address potential local exploit, widespread suseptibility to IIS 4.0/5.0 "Specialized Header" vulnerability, Rapidstream VPN Appliances root compromise, IRIX tenetd vulnerability, Hotmail/Microsoft Instant Messanger issue, Watchguard Firebox Authentication DOS, OS/2 WARP 4.5 FTP Server DOS, IMAIL web service remote DOS attack v.2, and a paper presented at the Black Hat briefings titled, "A Stateful Inspection of Firewall-1."

tags | remote, web, local, root, perl
systems | irix
MD5 | 290bac84855ce531f7f948345816ea06
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close