exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 1999-11-03

squid.exploit.txt
Posted Nov 3, 1999
Authored by Oezguer Kesim

Remote exploit for squid-2.2-STABLE5 or below.

tags | exploit, remote
SHA-256 | 812fce62394bc0e251588aa9af7d50731d9621e19a0263b63dceba4d3492ccb0
debian.lpr-old.txt
Posted Nov 3, 1999

The version of lpr that was distributed with Debian GNU/Linux 2.1 suffers from a couple of problems. There was a race in lpr that could be exploited by users to print files they can not normally read, and lpd did not check permissions of queue-files. As a result by using the -s flag it could be tricked into printing files a user can otherwise not read. This has been fixed in version 0.46-1-0slink1. We recommend you upgrade your lpr package immediately. Debian security homepage here.

systems | linux, debian
SHA-256 | 0e87d8210d38143d57f0251abf1b80fc8c61dfcb5ca60645c696d90c09041c9c
masquerading.html.txt
Posted Nov 3, 1999
Authored by Gomorrah | Site blacksun.box.sk

A simple guide on what IP masquerading is, what is it good for, how to work with it etc for newbies in that subject.

tags | paper, protocol
SHA-256 | a8374609c77bf091c7d1940e63b17d077f5d6d8d672ca0960035a504a19f7620
RFP9907.txt
Posted Nov 3, 1999
Authored by rain forest puppy | Site wiretrip.net

Advisory RFP9907 - You, your servers, RDS, and thousands of script kiddies. .gov, .mil, and even microsoft.com haven fallen lately to the hands of website defacers. Turns out, it's all been because of RDS. This paper is the straight story on fixing the RDS hole.

tags | paper
SHA-256 | a1562ec8e6c3de504d8609d33290529e67aa77bd45c35abf8a3f834df5775bd8
sendmail.8.9.x.txt
Posted Nov 3, 1999
Authored by Michal Zalewski

Sendmail 8.x.x - any user may rebuild aliases database causing local denial of service.

tags | denial of service, local
SHA-256 | ee87fe08a43899cadbac39a3e8a3cf5421bda9c8ff62986e65f41d6271f83a96
winsd.110299.txt
Posted Nov 3, 1999
Authored by winsd

[ Windows Security Digest ] 1999 - November 2. Contains analysis of 8 windows vulnerabilities that have come out in the past 2 weeks, plus Ongoing MDAC Attacks Against IIS, IIS 5.0's New Security Features, Tools of the Trade, Top 10 Cracks of All Time, and Internet Scanner vs CyberCop. www.ntsecurity.net

tags | vulnerability, magazine
systems | windows
SHA-256 | a5b0722634118b6f7925bcfc66f9a6e384388015d987e474d69a1d92fb1bb48a
boping.zip
Posted Nov 3, 1999
Site members.home.com

A scanner for the infamous Back Orifice program. This is many times faster than the ping sweeper built in to the original client program. I have included the ability to notify detected victims by sending them a BO messagebox message directly from within the program. This is intended as a vigilante tool to notify victims who unknowingly have the trojan on their system. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | ab621f8f8467be5903834ceaf7b26b57f370f5ad827e9d952a9d5e14d7997907
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close