exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2000-05-11 to 2000-05-12

ms00-030
Posted May 11, 2000

Microsoft Security Bulletin (MS00-030) - Patch Available for "Malformed Extension Data in URL" Vulnerability. Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server. The vulnerability could be used to slow the performance of an affected server, or temporarily stop it altogether. Microsoft FAQ on this issue available here.

SHA-256 | 0666fde59bbaa3d9fe8958d4a3e68e0a73b4c29517505c79d5b9cee0a78141d3
napstir.c
Posted May 11, 2000
Authored by S

Gnapster and possibly other napster clients do not check the integrity of filenames in download requests. Any filename that the client user has read access to may be downloaded. Also includes some service denial techniques.

tags | exploit
SHA-256 | 5712de51a767ac94e1223643e7f8b24f6f5b3594014d86267156adb3b30b5091
sara-3.0.3.tar.gz
Posted May 11, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Fixed mstream test (PONG vs pong), Added test for timbuktu, Added tutorial for pcanywhere and timbuktu, and Incorporated Steve Rader's new relay.sara (many more tests).
tags | tool, cgi, scanner
systems | unix
SHA-256 | dd029b6b8d61c2d6fca7cfa2dc6903da6be5b0f2cac146c0a5a2a5620aa8940b
winsd.041000.txt
Posted May 11, 2000
Authored by winsd | Site win2000mag.com

Windows Security Update May 10 - In this issue: Aladdin eToken Allows Physical Access to Data, DMailWeb Buffer Overflow, DNewsWeb Buffer Overflow, Listserv Web Archives Buffer Overflow, News: New Virus Loves You, News: Microsoft Publishes Details of Kerberos Authorization Data, Software Prevents Receipt of Love Bug, Online Scanning Service Cleans Systems, Tip: Limit Buffer Size on IIS, and Writing Secure Code: Writing a Secure POP3 Server.

tags | web, overflow, virus, magazine
systems | windows
SHA-256 | 1a28e581ba2bcb95f16cb5e74bc2baa0c5068e20bbdc3e630f88a1426f13892b
saint-2.0.2.beta3.tar.gz
Posted May 11, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 4d15a04df4cc55612833c627a1ea694d2d23ebe56b176c68bb44e450cc133969
hack-hm-1.1.txt
Posted May 11, 2000
Authored by Hawaiian Superman

Hotmail is vulnerable to yet another serious security problem involving javascript. Windows, MacOS, and Linux users are affected. Consequences include hotmail account takeover, redirecting a hotmail user to any site, or access to the users computer if combined with other known exploits.

tags | exploit, javascript
systems | linux, windows
SHA-256 | b5c11b65292e58dd2677389be22affdd1c3df87cc7488c5d48a5d785938ef4f6
netsol.c
Posted May 11, 2000
Authored by r00tabega, Bansh33 | Site r00tabega.com

Exploit for the (patched) major security issue with networksolutions.com(easysteps.pl) which would have set up a bindshell if it had been run.

SHA-256 | 9341f14a0079af7d87506afc61d98b1ef1589d7eeb8b50a03d204c3b48807cbf
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close