exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2003-10-30

xscreensaver-4.14.tar.gz
Posted Oct 30, 2003
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.

Changes: New modules fontglide, apple2, xanalogtv, pong, gleidescope, mirrorblob, and blinkbox. Updates were made to glsnake, bsod, and endgame. Screen grabbing now works on Mac OS X. Various minor fixes were made.
tags | root
systems | unix
SHA-256 | bf47f838c0048976180fb7a69deed2b6e750183a6a8fa0593b7126dfdf287d5a
radmind-1.2.1.tgz
Posted Oct 30, 2003
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Bug Fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | b47a90cd7dde89a1a86c71334495b513cccfba64ec51e73e32f88619b3176d73
nstx-1.1-beta3.tgz
Posted Oct 30, 2003
Authored by Florian Heinz | Site nstx.dereference.de

NSTX (the Nameserver Transfer Protocol) makes it possible to create IP tunnels using DNS queries and replies for IP packet encapsulation where IP traffic other than DNS isn't possible.

Changes: Large parts of the program were rewritten and enhanced. The client only polls if there are not enough packets waiting at the server, which results in less name server traffic, much more bandwidth, and better interactive performance.
tags | protocol
systems | unix
SHA-256 | f7d739b1c75b571b3e253612e3410353be9978f0f3a175695779b154cc9ad688
fp-2.4.22.patch.gz
Posted Oct 30, 2003
Authored by Folkert van Heusden | Site vanheusden.com

The Linux-kernel security patch for kernel v2.4.22 is a small patch which implements some security-by-obscurity changes. Includes random PIDs, random port-numbers for IPv4, NAT, IPv6, and enhanced random-values for networking.

tags | kernel, patch
systems | linux, unix
SHA-256 | 3274705b80f10bfa2cfe4288f7267283b54aec56f4ee9c82fbdec2aa28d2e959
sensorTrends-0.6.tar.gz
Posted Oct 30, 2003
Authored by John Weidley | Site packetshack.org

sensorTrends is a GPL web-based application that displays a high-level view of the ports that are being scanned over the course of time. The display is similar to the look and feel of Internet Storm Center (here.

tags | tool, web, intrusion detection
systems | unix
SHA-256 | b3fd36012ec19d153c94b1299b471ba97331843543cd3f6b0ffcd9ad07accfd0
mod_dosevasive.1.9.tar.gz
Posted Oct 30, 2003
Authored by Jonathan A. Zdziarski | Site nuclearelephant.com

The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack. Also support iPlanet and Netscape webservers.

Changes: Support for NSAPI has been added (SunONE Servers: iPlanet, Netscape). A TEMP_HOME definition has been added to make changing the location of temporary data easier.
tags | web
SHA-256 | ac048aa4e535e0ae01efc2abf9d6aac6faacb8dedaf19933f38233971e3ac0bb
x-ws_ftp.c
Posted Oct 30, 2003
Authored by Eyas | Site xfocus.net

WS_FTP server <= v4.0.1 for Windows 2000 remote stack overflow exploit which binds a shell to a port. Requires a ftp account.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | b1f4ed5c9d225b1fb7ea0311a240a900e083988c7518ec87774a8c6f0b4fb4fd
reboot.c
Posted Oct 30, 2003
Authored by NrAziz | Site geekz.nl

Linux_x86 shellcode for reboot(). Shuts down the system uncleanly.

tags | shellcode
SHA-256 | dc2cb717ec7192609d43a42968860ff03476aa390460611cad10eef5a4bd7edf
brutus.pl
Posted Oct 30, 2003
Authored by Marco Ivaldi

Brutus.pl v1.3 tries to break in remotely using password bruteforcing for TELNET, FTP and POP3 protocols. Login list generation through SMTP vrfy/expn and CISCO login information leaks is also supported.

tags | cracker, protocol
systems | cisco
SHA-256 | 22a1eae37ef2eaae85ec019318e53838a23b29963e6428dc3f6fe36d3c8ca01c
php-nuke.6.5.php.txt
Posted Oct 30, 2003
Authored by Blade | Site fihezine.tsx.to

PHP-Nuke v6.5 and Spaiz-nuke v1.2 SQL injection exploit written in PHP. Adds an admin account.

tags | exploit, php, sql injection
SHA-256 | 47cd69171dda836213caa1d223b99cca8f4117002517f1b0aadbde2461f80ce7
telecondex.pl
Posted Oct 30, 2003
Authored by Blade | Site fihezine.tsx.to

Denial of service buffer overflow exploit for the TelCondex web server v2.12.30210 Build 3285 and below which overflows the HTTP referrer. Fix available Oliver Karow.

tags | exploit, web, denial of service, overflow
SHA-256 | cdf578b6896a5021d91c7ec240930f6c8c497603540962d784da890cb64b8c6d
macosx-screenlock-bypass.txt
Posted Oct 30, 2003
Authored by CodeSamurai

Mac OS X v10.3 Build 7B85 contains a vulnerability in the screen lock which allows malicious local users to use the computer for a short amount of time, until the authentication window is displayed. Exploit information included.

tags | advisory, local
systems | apple, osx
SHA-256 | ef57f472ad9ea7e8279fc7e6035e71ddc0f6360fbdae55b2422ed2fa30258365
thttpd.2.2.3.txt
Posted Oct 30, 2003
Authored by Joel Soderberg, Christer Oberg

Thttpd v2.2.1 through 2.23b1 contain a remotely exploitable buffer overflow in defang() which can allow remote code execution. Fix available here.

tags | advisory, remote, overflow, code execution
SHA-256 | 49b0a9d6196d61e74ed7eb1273e385487a96371557543a1e9a566551756bb100
ls_ftp.pl
Posted Oct 30, 2003
Authored by Druid

Denial of service exploit in ls, which is exploited remotely via wu-ftpd v2.6.2. In perl.

tags | exploit, denial of service, perl
SHA-256 | 7f8789561a1fa3a055ba0e37829696c2e35a87b3a2129c718de82f609d2c8592
taper.txt
Posted Oct 30, 2003
Authored by Polygrithm | Site geekz.nl

The taper program in Redhat 7.3 contains a stack overflow. Note that taper is not setuid.

tags | exploit, overflow
systems | linux, redhat
SHA-256 | 89a935c740c96748fa0a62389876ff938ee1fb09b87005b568f271a93db7ee97
Atstake Security Advisory 03-10-28.3
Posted Oct 30, 2003
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A102803-3 - It is possible to cause the the Mac OS X kernel prior to v10.3 to crash by specifying a long command line argument. While this primarily affects local users there may be conditions where this situation is remotely exploitable if a program which receives network input spawns another process with user input. It is possible to use this condition to dump small portions of memory back to an attacker.

tags | kernel, local
systems | apple, osx
SHA-256 | 319ce15f5986529ed5010d67654eb62e5341d237edf4d5f20e5bf93b121fe0a7
Atstake Security Advisory 03-10-28.1
Posted Oct 30, 2003
Authored by David Goldsmith, Atstake | Site atstake.com

Mac OS X prior to v10.3, if running with core files enabled, allows local attackers with shell access to overwrite any file and read core files created by root owned processes.

tags | shell, local, root
systems | apple, osx
SHA-256 | 55cac7ecd548a05acacef22ad370bb0adceada6e580cad95af9f0d9d18d3a9cc
WebTide-Eng.txt
Posted Oct 30, 2003
Authored by STG Security | Site stgsecurity.com

InfronTech's J2EE Web Application Server, WebTide v7.04 and below has a directory traversal vulnerability.

tags | advisory, web
SHA-256 | ed3724d201f6106bff77d5b92d7fc95bbdfb5df88fa576432260612cd3f19c2c
SiteKiosk.txt
Posted Oct 30, 2003
Authored by Zrekam

SiteKiosk v4.x and 5.x contain vulnerabilities which allow users to bypass URL restrictions and/or browse for free because the software fails to check if the supplied URL contains a wildcard DNS entry.

tags | advisory, vulnerability
SHA-256 | 47dff8e13deba387ab3498641097b00700a232599411910947ded0a5dd09786b
sh-httpd.txt
Posted Oct 30, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.

tags | exploit, remote, cgi
SHA-256 | a0ae3eee45856fba670f376c41e9f3a32c4c4558388732713876b66cc0eabf20
javascriptbug.txt
Posted Oct 30, 2003
Authored by Boshcash

Javascript infinite loop bug which causes browsers to crash.

tags | denial of service, javascript
SHA-256 | cb659e99b5bf938af4e0dc13a6661a83aed4e0787be577c0ff6fac56ee32b2d3
yax-phpnuke.sh
Posted Oct 30, 2003
Authored by Flux

Php-nuke v6.6 and spaiz-nuke below v1.2beta remote exploit which allows you to take over the administrator account. In Spanish.

tags | exploit, remote, php
SHA-256 | fea203fbdd282ac0f1ddebfc46fcc776162fbcc14818517c43a9ca33da3b0b37
libnids.tcp.reassembly.txt
Posted Oct 30, 2003
Authored by Robert Watson

Libnids v1.17 and below contains memory corruption vulnerabilities in the TCP stream reassembly code. Applications such as dsniff which are linked with libnids can be remotely exploited by sending overly long, specially crafted TCP packets. Fix available here.

tags | advisory, tcp, vulnerability
SHA-256 | fb5edefbf4ddd44e195c518d2f20fc7a815a6c6f1699e73b57c10278c89efd11
wuftpd-skey.txt
Posted Oct 30, 2003
Authored by Michael Hendrickx

Wu-ftpd v2.6.2 contains a remote root vulnerability if SKEY support has been enabled. Patch included.

tags | advisory, remote, root
SHA-256 | 40a0ce3539a007074bcdc02b3be11b15fc0feb8fb09046d9beabf48081bace89
mailslap.c
Posted Oct 30, 2003
Authored by c0w3

Unix C Based MailBomber.

tags | denial of service
systems | unix
SHA-256 | 5a0dbec087ff6bd31b8ef9eb1d679cdc2a31bc250839820ec4c086b35871faff
Page 1 of 2
Back12Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close