Exploit the possiblities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-10-06

ms00-071
Posted Oct 6, 2000

Microsoft Security Bulletin (MS00-071) - Microsoft has released a patch that eliminates the "Word Mail Merge" security vulnerability in Microsoft Word 2000 and 97. If an Access database is specified as a data source via DDE in a Word mail merge document, macro code can run without the user's approval when the user opens that document. If a user could be enticed into opening a specially constructed mail merge Word document, which was provided either as an e-mail attachment or as a link hosted on a hostile web site, it is possible to cause arbitrary code to run on the user's machine. Microsoft FAQ on this issue available here.

tags | web, arbitrary
MD5 | e93208985af85fdd8a37955835d08a53
33_su.c
Posted Oct 6, 2000
Authored by Kil3r of Lam3rz

Immunix OS stackguard evading LC glibc + su + msgfmt local root exploit. Tested on Immunix OS (Stackguarded Redhat 6.2). Patch available here.

tags | exploit, local, root
systems | linux, redhat
MD5 | 02402c03254c5da91d6dc0b2216ce25a
slackware.wuftpd.txt
Posted Oct 6, 2000
Site slackware.com

Slackware Security Advisory - Wu-ftpd version 2.6.0 has a remote root hole in it. Upgrade to version 2.6.1.

tags | remote, root
systems | linux, slackware
MD5 | 8c228dd3b46d54e8f52f642105a31398
csm.proxy.bypass.txt
Posted Oct 6, 2000
Authored by Hermann Tischendorf

The CSM proxy server's siteblocker feature can be bypassed by setting up your web browser to use an external proxy.

tags | exploit, web
MD5 | 0a7ad2c061a8fb7df08d92978e52e4f9
obsd_fun.c
Posted Oct 6, 2000
Authored by anonymous | Site segfault.net

OpenBSD 2.6 local / remote denial of service attack. Sends a large number of ARP packets, causing the kernel to run out of memory and panic. Only works on machines connected to the same network segment.

tags | remote, denial of service, kernel, local
systems | openbsd
MD5 | e2cf1426738d4693c162a1bb329c0a2f
lbl-traceroute.txt
Posted Oct 6, 2000
Authored by Dvorak | Site synnergy.net

/usr/bin/traceroute local root format string exploit for LBNL traceroute, distributed with Red Hat 6.1/6.2 and Debian 2.2.

tags | exploit, local, root
systems | linux, redhat, debian
MD5 | 9d10b3b9c0e1049d66f48df73cca397c
xlockx.c
Posted Oct 6, 2000
Authored by noir

OpenBSD 2.6 and 2.7 xlock local root format string exploit.

tags | exploit, local, root
systems | openbsd
MD5 | 32519bf64b8cf0a582df4d0797f4ab60
guninski23.txt
Posted Oct 6, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #23 - Internet Explorer 5.5/Outlook allow executing arbitray programs after viewing web page or email message. This very serious vulnerability may easily lead to taking full control over user's computer. The problem is the com.ms.activeX.ActiveXComponent java object, which allows creating and scripting arbitrary ActiveX objects, including those not marked safe for scripting. Demonstration available here.

tags | exploit, java, web, arbitrary, activex
MD5 | cd308ec05b7a2b26be70588e9af754ac
NCR2K001.TXT
Posted Oct 6, 2000
Site gmx.net

How to become elite.

tags | paper
MD5 | 2d7fab83c16f4e3c3b94667bdee5045d
arping-0.95.tar.gz
Posted Oct 6, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: A man page has been added!
tags | tool
systems | unix
MD5 | a9647360fc8b5b4caeec38bd3256228c
Samhain File Integrity Checker
Posted Oct 6, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Bug fix release which fixes problems with IP address caching and null characters in passwords.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 7740c355236a2fa61e3e22375e0b7fe7
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close