exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2002-12-14

zyxbrut.c
Posted Dec 14, 2002
Authored by BetaFly Computer Team

Zyxbrut.c is a brute force program written for the ZyXel router telnet service.

tags | exploit
SHA-256 | 09a2e8873fc29128a79a933087fd6b993b20bc25a6fb311b7d0228b7d714db16
obstruct.tgz
Posted Dec 14, 2002
Authored by Osek

Obstruct.tgz is a denial of service attack against IRC servers. Warning: Code was found on a compromised machine, use caution. Opens a IRC server port on the target +machine and sends SERVER You_were_owned_by_obstruct.c 1 data and then loops again and floods the server. Floods all of the open sockets on the server until it can no longer accept connections. Floods the IRC Operator server notices so that the IRC operator cannot view legit traffic.

tags | denial of service
SHA-256 | 438e11ef32a07129806dc28198dbf61dfaa6361de812ac75e0d0fec11e649929
eeye.png.txt
Posted Dec 14, 2002
Authored by eEye Digital Security | Site eEye.com

EEye Security Advisory - During a review of the PNG image format implemented in Microsoft Windows, pngfilt.dll, serious vulnerabilities were discovered related to the interpretation of PNG image data. The more serious bug is a heap overflow which can be exploited to execute code when the malicious PNG image is viewed. IE 5.01-6.0 is vulnerable, along with the IE web control for Outlook, Access 2000, Backoffice, Microsoft Visual Studio .NET 2002, Office 2000, Office XP pro, Project 2002 Professional, Publisher 98, SNA Server 4.0, SQL Server 7.0, Visio 2002, Visual Basic .NET Standard 2002, Visual C, Visual C++ .NET Standard 2002, Visual FoxPro 7.0, Visual Studio 6.0, Windows 2000, Windows 95, Windows 98, NT, and XP. Microsoft advisory is ms02-066.

tags | advisory, web, overflow, vulnerability
systems | windows
SHA-256 | f11b994b879980c3165d71f5cef07811d6d5feb5f65c16286a58a35a2b0cacf3
mysql.4.0.5a.txt
Posted Dec 14, 2002
Authored by Stefan Esser | Site security.e-matters.de

The MySQL database versions <= 3.23.53a and <= 4.0.5a contains local and remote vulnerabilities allowing remote attackers to bypass the MySQL password check and execute arbitrary code with the privileges of the user running mysqld. An arbitrary size heap overflow within the mysql client library and another vulnerability which allows '\0' to be written to any memory address allow DOS attacks against or arbitrary code execution within anything linked against libmysqlclient.

tags | advisory, remote, overflow, arbitrary, local, vulnerability, code execution
SHA-256 | b385bbffd26b7aac37dec468afd6558f47557fa4ccb25456b032f8f0f3e77828
fetchmail.6.1.3.txt
Posted Dec 14, 2002
Authored by Stefan Esser | Site security.e-matters.de

A heap overflow has been found in Fetchmail v6.1.3 and below which allows remote attackers to execute code with the privileges of the user running fetchmail on Linux. It is a denial of service vulnerability on BSD. Fixed in v6.2.0.

tags | advisory, remote, denial of service, overflow
systems | linux, bsd
SHA-256 | 00367f13a6c9121041c44e2a0b3582239a66f54aeae1714fc5cf1dc427242f38
whcc-0.6.64.exe
Posted Dec 14, 2002
Authored by Jeffrey Barber | Site ussysadmin.com

Web Hack Control Center is an administrative tool that scans web servers for known vulnerabilities. Scans HTTP and HTTPS (SSL) servers, and it's exploits database contains over 1500 vulnerabilities. WHCC can be used as your primary browser or be launched from Internet Explorer.

tags | web, vulnerability
SHA-256 | 4ed49210b62bc99ca619b59ab8b64bf528871e8dc7d905737ece72d9bbcdd912
suse.grub.txt
Posted Dec 14, 2002
Authored by Matthias Andree

SuSE 8.1's "gfxmenu" which is configured into GRUB by default on many machines allows the user to pass in additional kernel boot parameters without entering the password, allowing users who can locally reboot the machine to easily spawn a root shell.

tags | advisory, shell, kernel, root
systems | linux, suse
SHA-256 | 8835b98c7e6cc1122e66d91619047a0fcc3b5ad373a989202c6f9b7dbbe592f8
Samhain File Integrity Checker
Posted Dec 14, 2002
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Bug fixes.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 558bc757ee8a6481d9b014417a2378a9d3bc6e01e240f1411ccf84a919f8d209
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close