exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2003-10-30

Posted Oct 30, 2003
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.

Changes: New modules fontglide, apple2, xanalogtv, pong, gleidescope, mirrorblob, and blinkbox. Updates were made to glsnake, bsod, and endgame. Screen grabbing now works on Mac OS X. Various minor fixes were made.
tags | root
systems | unix
SHA-256 | bf47f838c0048976180fb7a69deed2b6e750183a6a8fa0593b7126dfdf287d5a
Posted Oct 30, 2003
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Bug Fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | b47a90cd7dde89a1a86c71334495b513cccfba64ec51e73e32f88619b3176d73
Posted Oct 30, 2003
Authored by Florian Heinz | Site nstx.dereference.de

NSTX (the Nameserver Transfer Protocol) makes it possible to create IP tunnels using DNS queries and replies for IP packet encapsulation where IP traffic other than DNS isn't possible.

Changes: Large parts of the program were rewritten and enhanced. The client only polls if there are not enough packets waiting at the server, which results in less name server traffic, much more bandwidth, and better interactive performance.
tags | protocol
systems | unix
SHA-256 | f7d739b1c75b571b3e253612e3410353be9978f0f3a175695779b154cc9ad688
Posted Oct 30, 2003
Authored by Folkert van Heusden | Site vanheusden.com

The Linux-kernel security patch for kernel v2.4.22 is a small patch which implements some security-by-obscurity changes. Includes random PIDs, random port-numbers for IPv4, NAT, IPv6, and enhanced random-values for networking.

tags | kernel, patch
systems | linux, unix
SHA-256 | 3274705b80f10bfa2cfe4288f7267283b54aec56f4ee9c82fbdec2aa28d2e959
Posted Oct 30, 2003
Authored by John Weidley | Site packetshack.org

sensorTrends is a GPL web-based application that displays a high-level view of the ports that are being scanned over the course of time. The display is similar to the look and feel of Internet Storm Center (here.

tags | tool, web, intrusion detection
systems | unix
SHA-256 | b3fd36012ec19d153c94b1299b471ba97331843543cd3f6b0ffcd9ad07accfd0
Posted Oct 30, 2003
Authored by Jonathan A. Zdziarski | Site nuclearelephant.com

The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack. Also support iPlanet and Netscape webservers.

Changes: Support for NSAPI has been added (SunONE Servers: iPlanet, Netscape). A TEMP_HOME definition has been added to make changing the location of temporary data easier.
tags | web
SHA-256 | ac048aa4e535e0ae01efc2abf9d6aac6faacb8dedaf19933f38233971e3ac0bb
Posted Oct 30, 2003
Authored by Eyas | Site xfocus.net

WS_FTP server <= v4.0.1 for Windows 2000 remote stack overflow exploit which binds a shell to a port. Requires a ftp account.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | b1f4ed5c9d225b1fb7ea0311a240a900e083988c7518ec87774a8c6f0b4fb4fd
Posted Oct 30, 2003
Authored by NrAziz | Site geekz.nl

Linux_x86 shellcode for reboot(). Shuts down the system uncleanly.

tags | shellcode
SHA-256 | dc2cb717ec7192609d43a42968860ff03476aa390460611cad10eef5a4bd7edf
Posted Oct 30, 2003
Authored by Marco Ivaldi

Brutus.pl v1.3 tries to break in remotely using password bruteforcing for TELNET, FTP and POP3 protocols. Login list generation through SMTP vrfy/expn and CISCO login information leaks is also supported.

tags | cracker, protocol
systems | cisco
SHA-256 | 22a1eae37ef2eaae85ec019318e53838a23b29963e6428dc3f6fe36d3c8ca01c
Posted Oct 30, 2003
Authored by Blade | Site fihezine.tsx.to

PHP-Nuke v6.5 and Spaiz-nuke v1.2 SQL injection exploit written in PHP. Adds an admin account.

tags | exploit, php, sql injection
SHA-256 | 47cd69171dda836213caa1d223b99cca8f4117002517f1b0aadbde2461f80ce7
Posted Oct 30, 2003
Authored by Blade | Site fihezine.tsx.to

Denial of service buffer overflow exploit for the TelCondex web server v2.12.30210 Build 3285 and below which overflows the HTTP referrer. Fix available Oliver Karow.

tags | exploit, web, denial of service, overflow
SHA-256 | cdf578b6896a5021d91c7ec240930f6c8c497603540962d784da890cb64b8c6d
Posted Oct 30, 2003
Authored by CodeSamurai

Mac OS X v10.3 Build 7B85 contains a vulnerability in the screen lock which allows malicious local users to use the computer for a short amount of time, until the authentication window is displayed. Exploit information included.

tags | advisory, local
systems | apple, osx
SHA-256 | ef57f472ad9ea7e8279fc7e6035e71ddc0f6360fbdae55b2422ed2fa30258365
Posted Oct 30, 2003
Authored by Joel Soderberg, Christer Oberg

Thttpd v2.2.1 through 2.23b1 contain a remotely exploitable buffer overflow in defang() which can allow remote code execution. Fix available here.

tags | advisory, remote, overflow, code execution
SHA-256 | 49b0a9d6196d61e74ed7eb1273e385487a96371557543a1e9a566551756bb100
Posted Oct 30, 2003
Authored by Druid

Denial of service exploit in ls, which is exploited remotely via wu-ftpd v2.6.2. In perl.

tags | exploit, denial of service, perl
SHA-256 | 7f8789561a1fa3a055ba0e37829696c2e35a87b3a2129c718de82f609d2c8592
Posted Oct 30, 2003
Authored by Polygrithm | Site geekz.nl

The taper program in Redhat 7.3 contains a stack overflow. Note that taper is not setuid.

tags | exploit, overflow
systems | linux, redhat
SHA-256 | 89a935c740c96748fa0a62389876ff938ee1fb09b87005b568f271a93db7ee97
Atstake Security Advisory 03-10-28.3
Posted Oct 30, 2003
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A102803-3 - It is possible to cause the the Mac OS X kernel prior to v10.3 to crash by specifying a long command line argument. While this primarily affects local users there may be conditions where this situation is remotely exploitable if a program which receives network input spawns another process with user input. It is possible to use this condition to dump small portions of memory back to an attacker.

tags | kernel, local
systems | apple, osx
SHA-256 | 319ce15f5986529ed5010d67654eb62e5341d237edf4d5f20e5bf93b121fe0a7
Atstake Security Advisory 03-10-28.1
Posted Oct 30, 2003
Authored by David Goldsmith, Atstake | Site atstake.com

Mac OS X prior to v10.3, if running with core files enabled, allows local attackers with shell access to overwrite any file and read core files created by root owned processes.

tags | shell, local, root
systems | apple, osx
SHA-256 | 55cac7ecd548a05acacef22ad370bb0adceada6e580cad95af9f0d9d18d3a9cc
Posted Oct 30, 2003
Authored by STG Security | Site stgsecurity.com

InfronTech's J2EE Web Application Server, WebTide v7.04 and below has a directory traversal vulnerability.

tags | advisory, web
SHA-256 | ed3724d201f6106bff77d5b92d7fc95bbdfb5df88fa576432260612cd3f19c2c
Posted Oct 30, 2003
Authored by Zrekam

SiteKiosk v4.x and 5.x contain vulnerabilities which allow users to bypass URL restrictions and/or browse for free because the software fails to check if the supplied URL contains a wildcard DNS entry.

tags | advisory, vulnerability
SHA-256 | 47dff8e13deba387ab3498641097b00700a232599411910947ded0a5dd09786b
Posted Oct 30, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.

tags | exploit, remote, cgi
SHA-256 | a0ae3eee45856fba670f376c41e9f3a32c4c4558388732713876b66cc0eabf20
Posted Oct 30, 2003
Authored by Boshcash

Javascript infinite loop bug which causes browsers to crash.

tags | denial of service, javascript
SHA-256 | cb659e99b5bf938af4e0dc13a6661a83aed4e0787be577c0ff6fac56ee32b2d3
Posted Oct 30, 2003
Authored by Flux

Php-nuke v6.6 and spaiz-nuke below v1.2beta remote exploit which allows you to take over the administrator account. In Spanish.

tags | exploit, remote, php
SHA-256 | fea203fbdd282ac0f1ddebfc46fcc776162fbcc14818517c43a9ca33da3b0b37
Posted Oct 30, 2003
Authored by Robert Watson

Libnids v1.17 and below contains memory corruption vulnerabilities in the TCP stream reassembly code. Applications such as dsniff which are linked with libnids can be remotely exploited by sending overly long, specially crafted TCP packets. Fix available here.

tags | advisory, tcp, vulnerability
SHA-256 | fb5edefbf4ddd44e195c518d2f20fc7a815a6c6f1699e73b57c10278c89efd11
Posted Oct 30, 2003
Authored by Michael Hendrickx

Wu-ftpd v2.6.2 contains a remote root vulnerability if SKEY support has been enabled. Patch included.

tags | advisory, remote, root
SHA-256 | 40a0ce3539a007074bcdc02b3be11b15fc0feb8fb09046d9beabf48081bace89
Posted Oct 30, 2003
Authored by c0w3

Unix C Based MailBomber.

tags | denial of service
systems | unix
SHA-256 | 5a0dbec087ff6bd31b8ef9eb1d679cdc2a31bc250839820ec4c086b35871faff
Page 1 of 2

File Archive:

November 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    1 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    219 Files
  • 14
    Nov 14th
    19 Files
  • 15
    Nov 15th
    66 Files
  • 16
    Nov 16th
    38 Files
  • 17
    Nov 17th
    9 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    11 Files
  • 22
    Nov 22nd
    56 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    36 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    14 Files
  • 28
    Nov 28th
    30 Files
  • 29
    Nov 29th
    35 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By