exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-02-10 to 2000-02-11

suse.make.txt
Posted Feb 10, 2000

A security hole was discovered in the GNU make package version 3.77-44 distributed with SuSE 6.1 and 6.3. If Makefile contents are fed in via stdin, files will be created in /tmp without checking if there is a symbolic link with the same name. Implications are command execution as the user running make. Other distributions are also affected. SuSE security site here.

systems | linux, suse
SHA-256 | ea08e1d1f74ae57dec28f0224d6ad7a4b1254790603ed556b334ded009d41465
suse.util.txt
Posted Feb 10, 2000

A security hole was discovered in the util package (mount and umount commands) installed by default on SuSE and other flavors of linux. Local root compromise possible. SuSE security site here.

tags | local, root
systems | linux, suse
SHA-256 | d5441c0cfdf9c9b309b67e8539ad4feae7ae7d635226df5cbeedc83b7c860831
linux-2.2.14-stealth3.diff
Posted Feb 10, 2000
Authored by Sean Trifero | Site innu.org

Patch for linux kernel 2.2.14 to discard packets that many OS detection tools use to query the TCP/IP stack.

Changes: Patch3 actually works! Includes logging of the dropped query packets.
tags | kernel, tcp
systems | linux
SHA-256 | c84594838465fe09706a766e9b8530454728fe6dcbf3ef3079659c0e2e691eb2
kppp-1.6.14.txt
Posted Feb 10, 2000
Authored by Rarez

Kppp 1.6.14 has a vulnerability that allows a local user to display the saved PPP password.

tags | exploit, local
SHA-256 | 8d19332151732e5697e7f7163003d6acf0c93e1dbfc58fe97ed5779abc51b4cb
inetserv-3.0.c
Posted Feb 10, 2000
Authored by Dr. Fdisk | Site raza-mexicana.org

InetServ 3.0 remote DoS exploit.

tags | exploit, remote
SHA-256 | 745955650f792ca0b47cdd962de7a7acf7142588a0956916494311e2965dafa0
winsd.021000.txt
Posted Feb 10, 2000
Authored by winsd

Windows 2000 Magazene Security Digest - New vulnerabilities include RDISK Race Condition: Update, Bypass surfControl URL Blocking, WWWThreads Elevates Privileges, Web Server Scripting Issues, Microsoft Java Exposes Files, and Windows NT Recycle Bin Goes Unchecked. Also contains articles on serious DoS attacks, IIS Administrator, FBI and CERT Warn Users Against Web-Based Scripting, and ZoneAlarm 2.0.

tags | java, web, vulnerability, magazine
systems | windows
SHA-256 | aefd83c89746659843b6c1be6a5a6cdf9f3be4950de270b7fb995fce23408f15
ISS Security Alert February 9, 2000
Posted Feb 10, 2000
Site xforce.iss.net

A new form of Distributed Denial of Service (DDoS) attack has been discovered following the release of the trin00 and Tribe Flood Network (TFN) denial of service programs (see December 7, 1999 ISS Security Alert at http://xforce.iss.net/alerts/advise40.php3). These attacks are more powerful than any previous denial of service attack observed on the Internet. A Distributed Denial of Service attack is designed to bring a network down by flooding target machines with large amounts of traffic. This traffic can originate from many compromised machines, and can be managed remotely using a client program. ISS X-Force considers this attack a high risk since it can potentially impact a large number of organizations. DDoS attacks have proven to be successful and are difficult to defend against.

tags | denial of service
SHA-256 | b62da56635635d524817aaca0d701afa8f1d51b1075b2f5942b15e54cba18a0e
axis700.txt
Posted Feb 10, 2000
Authored by Ian Vitek

Bypassing authentication on Axis 700 Network Scanner - By modifying an URL, outsiders can access administrator URLs without entering username and password. Tested on Axis 700 Network Scanner Server version 1.12.

tags | exploit
SHA-256 | 62be7cce360cae03aa7cf171c9411f06a344a3d1ae4af8abcb8218e26c1b8673
sco.snmpd.txt
Posted Feb 10, 2000
Authored by Shawn Bracken

The default configuration of SCO OpenServer 5.0.5 allows local users read/write access to SNMPD via a default writable community string. This configuration has been verified on SCO OpenServer 5.0.5 and may be present in earlier versions.

tags | exploit, local
SHA-256 | 3c82f312504d022a8c22babfcbc6580fa23cc95dd9cd9e92a5e994687ae533a7
mysql.txt
Posted Feb 10, 2000
Authored by Emphyrio

There exists a vulnerability in the password checking routines in the latest versions of the MySQL server, that allows any user on a host that is allowed to connect to the server, to skip password authentication, and access databases. All versions of MySQL up to 3.22.26a are vulnerable.

tags | exploit
SHA-256 | 5f5a4fb2100d5e175dc80ad904c3a600382a5f0b6c8153e8084244e2328cedac
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close