Exploit the possiblities
Showing 1 - 17 of 17 RSS Feed

Operating System: DEC VAX

SSRT4866.txt
Posted Mar 3, 2005
Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS VAX version 7.x and 6.x and OpenVMS Alpha Version 7.x or 6.x that may allow a local authorized user to gain unauthorized privileged access to data and system resources.

tags | advisory, local
systems | vax
MD5 | e66e3ed9d1547351b44ccc372e680af3
psibrute.com.txt
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users.

systems | vax
MD5 | 9890000f54a0213e136a51bd7d083523
sysuaf.zip
Posted Aug 26, 2002

The VAX/VMS SYSUAF.DAT file

tags | bbs
systems | vax
MD5 | 645ca1923619a7d35137c53bf198ed7c
vmsguide.zip
Posted Aug 26, 2002

User's Guide to VAX/VMS

tags | bbs
systems | vax
MD5 | 3bc692962e43864b89f200b1fbd24650
modern11.zip
Posted Aug 26, 2002

Modernz #11. VMS / VAX

tags | bbs
systems | vax
MD5 | 1653d9c2e032b4a6a7c5da561c26589c
nia-66.zip
Posted Aug 26, 2002

CERT Advisory - VAX/VMS Breakins

tags | bbs
systems | vax
MD5 | f798fa874650c78970881fbc6c58393a
nia-68.zip
Posted Aug 26, 2002

DECnet, UNIX UUCP files, VAX - Tekno DCS help,

tags | bbs
systems | unix, vax
MD5 | 64290bece59995a12630c2f8a1b1e49a
cccvax.zip
Posted Aug 26, 2002

Pretty complete file on hacking VAX/VMS machines

tags | bbs
systems | vax
MD5 | 8cb93208f4cb82eb5b2415a1f17292e1
password.zip
Posted Aug 26, 2002

Default passwords for VAX/VMS, DEC-10, TOPS 10,

tags | bbs
systems | vax
MD5 | 31158b573473039878fbc3439eee27e2
vaxdeco.zip
Posted Aug 26, 2002

A VAX decoy script to grab some accunts.

tags | bbs
systems | vax
MD5 | 0e9b48477a5ef9a5ac73fc3e20601e5a
vaxhack.zip
Posted Aug 26, 2002

How to hack VAX's.

tags | bbs
systems | vax
MD5 | e86524de1ff10dd3dd2a7c6b7de9fbf3
vmshack.zip
Posted Aug 26, 2002

VAX/VMS hacking FAQ

tags | bbs
systems | vax
MD5 | 26dabc9ffa59eb982e9680f9ae865517
COVERT-2000-07.listserv
Posted Jul 26, 2000
Authored by Covert Labs | Site nai.com

Network Associates COVERT Labs Security Advisory - The L-Soft LISTSERV web archive (wa,wa.exe) component contains an unchecked buffer allowing remote execution of arbitrary code with the privileges of the LISTSERV daemon. Vulnerable systems include L-Soft LISTSERV Web Archives 1.8d (confirmed) and 1.8c (inferred) for Windows 9x, Windows NT 3.5x, Windows NT 4.0, Windows 2000, UNIX (all vendors), and OpenVMS VAX.

tags | remote, web, arbitrary
systems | windows, 2k, 9x, unix, nt, vax
MD5 | 58af72d4575b8af155ed349ceb0f7589
systemx.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.

tags | remote, telephony
systems | vax
MD5 | 0f9e81592d3b2509db6673ddff785b37
S-93-07.asc
Posted Jan 10, 2000

Subject VAX/VMS failure to disable user accounts Date 13-Feb-93

systems | vax
MD5 | 4010fd66e26708916beb1dcc1140c9ef
NetBSD-SA1999-012.vax.ptrace
Posted Sep 23, 1999

NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here.

systems | netbsd, vax
MD5 | d202015e49826330e6cff56fe5dd9e41
VB-98.07.OpenVMS.LOGINOUT
Posted Sep 14, 1999

A potential vulnerability with LOGINOUT for OpenVMS (VAX & ALPHA) V7.1 software has been discovered.

systems | vax
MD5 | 78d220bad7256c6b4c2850a4f09bf587
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close