exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-03-09

ms00-014
Posted Mar 9, 2000

Microsoft Security Bulletin (MS00-014) - Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0. The vulnerability allows the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database or on the underlying system that was hosting the SQL Server or MSDE database. Microsoft FAQ on this issue available here.

tags | remote
SHA-256 | 8d650d7fe06feed9d6f924164a526de1a196bb37989f31654e55b160cb9fc6d2
etherape-0.2.4.tar.gz
Posted Mar 9, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: Removal of non-blocking reverse lookups, a major bug fix with fill_names, cleanup.
tags | tool, sniffer
SHA-256 | af5a3f6322396ee300dffa541d0902f8100c6b57793c100f90495e87d0310a52
etherape-0.2.6.tar.gz
Posted Mar 9, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: Links not in use slowly fade out, and ethernet protocols are presented in different colors.
tags | tool, sniffer
SHA-256 | 632f77c87e73173885b742cad8f0bb57fd19a7848c771aa8f034e2fae4aa6813
redhat-printtool.txt
Posted Mar 9, 2000
Authored by Cho Kyong-won

By default, printtool leaves world readable printer passwords on Redhat 6.1 and 6.2B.

tags | exploit
systems | linux, redhat
SHA-256 | 83f0b23844e3d51becdd970b58879110654e3fa689b5b2e538daa609a6c683df
TFN2k_Analysis-1.3.txt
Posted Mar 9, 2000
Authored by Jason Barlow | Site www2.axent.com

This document is a technical analysis of the Tribe Flood Network 2000 (TFN2K) distributed denial-of-service (DDoS) attack tool, the successor to the original TFN Trojan by Mixter. Additionally, countermeasures for this attack are also covered.

Changes: This revision includes several new discoveries, corrections, and clarifications. Many thanks to those who responded with feedback and comments to the original posting of this paper.
tags | denial of service, trojan
SHA-256 | 52ca3aa11a97181fd8f458991f35f7642c2e78842154cb4db563dd4b37504103
ConConFix2.zip
Posted Mar 9, 2000
Authored by Arisme

Unofficial fix for the /con/con vulnerability. Win 95/98/se server operators may want to give it a try.

Changes: Fixes all devices, not just con/con.
SHA-256 | a635bc88b5678393faa4c2557a2cbd5c81f473f66f7c9eae1ec7f9cbef6f267d
debian.mtr.txt
Posted Mar 9, 2000

Debian Security Advisory - The version of mtr as distributed in Debian GNU/Linux 2l1 did not drop root privileges correctly. While there are no known exploits it is conceivable that a weakness in gtk or ncurses could be used to exploit this. Debian security homepage here.

tags | root
systems | linux, debian
SHA-256 | 700b8cd7130f87834567c495ee277853ced57c9ca1b4d0cf4ca2798f7791f817
ms-clipart.txt
Posted Mar 9, 2000
Authored by Dildog | Site L0pht.com

L0pht Research Labs Advisory - Microsoft ClipArt Gallery Overflow. An attacker can seize control of a Windows 95, 98, NT, or 2000 machine via any HTML source, including Microsoft Outlook e-mail. Proof of conccept exploit included.

tags | exploit, overflow
systems | windows
SHA-256 | 2ec7de2c3c3d0f143a2c07d960d34afb1a67c52f1b03a5b7f8a09bed7e065237
iis-enumerate.txt
Posted Mar 9, 2000
Authored by Jason Lutz

Another new way to find the web root directory of an IIS 4.0 webserver, if it is run on a share, by requesting a .idq file.

tags | exploit, web, root
SHA-256 | 6d259cef445a382e76d7f2c57cdb31eb4e7c9398b37fca02edd6435795568276
pocsag.txt
Posted Mar 9, 2000
Authored by Kuji

Pocsag v2.05, a popular pager decoding software by default accepts connections on port 8000 with a default password, even remote access is not enabled, allowing anyone to view the decoded data.

tags | exploit, remote
SHA-256 | 03c142a6dd83e470a50a1c6cce1fe8e287e9b2fe23130ae7f6ad2b167c84d37b
rhsa.2000-006-01.nmh
Posted Mar 9, 2000
Authored by creating specially formed MIME headers, it was possible to have nmh's 'mhshow' utility execute arbitrary shell code

Red Hat Security Advisory - New nmh packages are available to fix a remote vulnerability in nmh.

tags | remote
systems | linux, redhat
SHA-256 | 180cf743dd3838fcaeafbfb168f90185b0525bc0ba12b216f4aee5952a760ac7
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close