Exploit the possiblities
Showing 1 - 25 of 299 RSS Feed

Files Date: 2003-10-01 to 2003-10-31

xscreensaver-4.14.tar.gz
Posted Oct 30, 2003
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.

Changes: New modules fontglide, apple2, xanalogtv, pong, gleidescope, mirrorblob, and blinkbox. Updates were made to glsnake, bsod, and endgame. Screen grabbing now works on Mac OS X. Various minor fixes were made.
tags | root
systems | unix
MD5 | 84ef242bab91fc64a4370cbb90df06ed
radmind-1.2.1.tgz
Posted Oct 30, 2003
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Bug Fixes.
tags | tool, intrusion detection
systems | unix
MD5 | 9c78f741a721c42573b9ba91e8cea74e
nstx-1.1-beta3.tgz
Posted Oct 30, 2003
Authored by Florian Heinz | Site nstx.dereference.de

NSTX (the Nameserver Transfer Protocol) makes it possible to create IP tunnels using DNS queries and replies for IP packet encapsulation where IP traffic other than DNS isn't possible.

Changes: Large parts of the program were rewritten and enhanced. The client only polls if there are not enough packets waiting at the server, which results in less name server traffic, much more bandwidth, and better interactive performance.
tags | protocol
systems | unix
MD5 | 7960f43b11c12b8df6f1cd3d005c710c
fp-2.4.22.patch.gz
Posted Oct 30, 2003
Authored by Folkert van Heusden | Site vanheusden.com

The Linux-kernel security patch for kernel v2.4.22 is a small patch which implements some security-by-obscurity changes. Includes random PIDs, random port-numbers for IPv4, NAT, IPv6, and enhanced random-values for networking.

tags | kernel, patch
systems | linux, unix
MD5 | c1d28e0a1038ab27c8fa6729f13eaa85
sensorTrends-0.6.tar.gz
Posted Oct 30, 2003
Authored by John Weidley | Site packetshack.org

sensorTrends is a GPL web-based application that displays a high-level view of the ports that are being scanned over the course of time. The display is similar to the look and feel of Internet Storm Center (here.

tags | tool, web, intrusion detection
systems | unix
MD5 | e038e47abfe3838a0ae230d2465c1cf1
mod_dosevasive.1.9.tar.gz
Posted Oct 30, 2003
Authored by Jonathan A. Zdziarski | Site nuclearelephant.com

The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack. Also support iPlanet and Netscape webservers.

Changes: Support for NSAPI has been added (SunONE Servers: iPlanet, Netscape). A TEMP_HOME definition has been added to make changing the location of temporary data easier.
tags | web
MD5 | 994333fa0ea901ae035919ce869332b0
x-ws_ftp.c
Posted Oct 30, 2003
Authored by Eyas | Site xfocus.net

WS_FTP server <= v4.0.1 for Windows 2000 remote stack overflow exploit which binds a shell to a port. Requires a ftp account.

tags | exploit, remote, overflow, shell
systems | windows, 2k
MD5 | d1c0de9f904bf4d9a6e68e991267a850
reboot.c
Posted Oct 30, 2003
Authored by NrAziz | Site geekz.nl

Linux_x86 shellcode for reboot(). Shuts down the system uncleanly.

tags | shellcode
MD5 | d30241f9310ddde80058f94ef78ffc16
brutus.pl
Posted Oct 30, 2003
Authored by Marco Ivaldi

Brutus.pl v1.3 tries to break in remotely using password bruteforcing for TELNET, FTP and POP3 protocols. Login list generation through SMTP vrfy/expn and CISCO login information leaks is also supported.

tags | cracker, protocol
systems | cisco
MD5 | 74cd9acac01cbdd1b74be6b35ae1bc7a
php-nuke.6.5.php.txt
Posted Oct 30, 2003
Authored by Blade | Site fihezine.tsx.to

PHP-Nuke v6.5 and Spaiz-nuke v1.2 SQL injection exploit written in PHP. Adds an admin account.

tags | exploit, php, sql injection
MD5 | 075b3b2c3a8864197675515e90a3342d
telecondex.pl
Posted Oct 30, 2003
Authored by Blade | Site fihezine.tsx.to

Denial of service buffer overflow exploit for the TelCondex web server v2.12.30210 Build 3285 and below which overflows the HTTP referrer. Fix available Oliver Karow.

tags | exploit, web, denial of service, overflow
MD5 | 20c79a1ea93315692bf563efa676c67d
macosx-screenlock-bypass.txt
Posted Oct 30, 2003
Authored by CodeSamurai

Mac OS X v10.3 Build 7B85 contains a vulnerability in the screen lock which allows malicious local users to use the computer for a short amount of time, until the authentication window is displayed. Exploit information included.

tags | advisory, local
systems | apple, osx
MD5 | a4448def57fd48f6b7e034d1594360c9
thttpd.2.2.3.txt
Posted Oct 30, 2003
Authored by Joel Soderberg, Christer Oberg

Thttpd v2.2.1 through 2.23b1 contain a remotely exploitable buffer overflow in defang() which can allow remote code execution. Fix available here.

tags | advisory, remote, overflow, code execution
MD5 | 57ba2199816ae7ee306b0679bb7dceaa
ls_ftp.pl
Posted Oct 30, 2003
Authored by Druid

Denial of service exploit in ls, which is exploited remotely via wu-ftpd v2.6.2. In perl.

tags | exploit, denial of service, perl
MD5 | d172d1ad48e70d1f43bf8781bae6f7f1
taper.txt
Posted Oct 30, 2003
Authored by Polygrithm | Site geekz.nl

The taper program in Redhat 7.3 contains a stack overflow. Note that taper is not setuid.

tags | exploit, overflow
systems | linux, redhat
MD5 | 22f491634bf9f13060313a42fd059611
Atstake Security Advisory 03-10-28.3
Posted Oct 30, 2003
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A102803-3 - It is possible to cause the the Mac OS X kernel prior to v10.3 to crash by specifying a long command line argument. While this primarily affects local users there may be conditions where this situation is remotely exploitable if a program which receives network input spawns another process with user input. It is possible to use this condition to dump small portions of memory back to an attacker.

tags | kernel, local
systems | apple, osx
MD5 | bef10aee5d88035bc65507a618971cbb
Atstake Security Advisory 03-10-28.1
Posted Oct 30, 2003
Authored by David Goldsmith, Atstake | Site atstake.com

Mac OS X prior to v10.3, if running with core files enabled, allows local attackers with shell access to overwrite any file and read core files created by root owned processes.

tags | shell, local, root
systems | apple, osx
MD5 | ac6a7fa0e8348991b06323304526a603
WebTide-Eng.txt
Posted Oct 30, 2003
Authored by STG Security | Site stgsecurity.com

InfronTech's J2EE Web Application Server, WebTide v7.04 and below has a directory traversal vulnerability.

tags | advisory, web
MD5 | 89814865583f7b8520d11ece19ac57d9
SiteKiosk.txt
Posted Oct 30, 2003
Authored by Zrekam

SiteKiosk v4.x and 5.x contain vulnerabilities which allow users to bypass URL restrictions and/or browse for free because the software fails to check if the supplied URL contains a wildcard DNS entry.

tags | advisory, vulnerability
MD5 | c1e1aeb9fed59419616fc25e4f39805c
sh-httpd.txt
Posted Oct 30, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.

tags | exploit, remote, cgi
MD5 | 0a6560a983f4d7c86c1eb4c1f8375ba8
javascriptbug.txt
Posted Oct 30, 2003
Authored by Boshcash

Javascript infinite loop bug which causes browsers to crash.

tags | denial of service, javascript
MD5 | 8481266d6b7875507e6537971c4010d5
yax-phpnuke.sh
Posted Oct 30, 2003
Authored by Flux

Php-nuke v6.6 and spaiz-nuke below v1.2beta remote exploit which allows you to take over the administrator account. In Spanish.

tags | exploit, remote, php
MD5 | d0db271a1958e0baff9284c3401640c7
libnids.tcp.reassembly.txt
Posted Oct 30, 2003
Authored by Robert Watson

Libnids v1.17 and below contains memory corruption vulnerabilities in the TCP stream reassembly code. Applications such as dsniff which are linked with libnids can be remotely exploited by sending overly long, specially crafted TCP packets. Fix available here.

tags | advisory, tcp, vulnerability
MD5 | 4aa6532d60104b6993cc7abc151325ca
wuftpd-skey.txt
Posted Oct 30, 2003
Authored by Michael Hendrickx

Wu-ftpd v2.6.2 contains a remote root vulnerability if SKEY support has been enabled. Patch included.

tags | advisory, remote, root
MD5 | b86a6c7f01741d36eeb7dbe29acea703
mailslap.c
Posted Oct 30, 2003
Authored by c0w3

Unix C Based MailBomber.

tags | denial of service
systems | unix
MD5 | cfc5ce56c298159757a0e59d3346687f
Page 1 of 12
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close