what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-07-19

xscreensaver-3.25.tar.gz
Posted Jul 19, 2000
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Improvments to about a dozen modules, and a new module, nerverot.
tags | root
systems | unix
SHA-256 | 47693caee2ceae1d822ec08f5060574217f4d110c178ad2438892dcd950190c5
VIGILANTE-2000004.txt
Posted Jul 19, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #4 - HP Jetdirect FTP service has a remote denial of service vulnerability affecting versions 8.20 and below. A long quote command causes the printer to crash, requiring a power cycle.

tags | exploit, remote, denial of service
SHA-256 | 1760e48ed7729a901d201f966befad75e524963895c62e5c4145172f6c551d13
outlook.advisory.txt
Posted Jul 19, 2000
Authored by Aaron Drew

Microsoft Outlook Advisory and Remote Exploit - A bug in a shared component of Microsoft Outlook and Outlook Express mail clients can allow a remote user to write arbitrary data to the stack. This bug has been found to exist in all versions of MS Outlook and Outlook Express on both Windows 95/98 and Windows NT 4. Includes in depth discussion and proof-of-point exploit that, when placed in the header field of a message or MIME attached message, will download and execute an executable from the web.

tags | exploit, remote, web, arbitrary
systems | windows
SHA-256 | 924dc94a7e9e122649116ef845008adf1d26be73434d2b03a7a0aebee8190822
labs50.txt
Posted Jul 19, 2000
Site ussrback.com

Advisory #50 - An exploitable buffer overflow has been found in all versions of Microsoft Outlook. The vulnerability could enable a malicious sender of an e-mail message with a malformed header to cause and exploit a buffer overrun on a user's machine. The buffer overrun could crash Outlook Express, Outlook e-mail client, or cause arbitrary code to run on the user's machine. The danger in this vulnerability is that the buffer overrun would occur even if the user does not open or preview the e-mail message.

tags | overflow, arbitrary
SHA-256 | 3ac1c77969b0584ae303da959fdb8a320f93d58dd3415315da364ebff37b560f
outoutlook.zip
Posted Jul 19, 2000

Microsoft Outlook remote exploit - Tested on Outlook Express 5.0, Outlook 2000, Outlook 97.0, and Outlook 98. Includes Unix Perl version and windows source / binary. The included shellcode causes the victim computer to visit https://www.ussrback.com.

tags | remote, web, perl, shellcode
systems | windows, unix
SHA-256 | 085dddfa2bd4ab473d84d0b82e4c65819d4e26e0cd1c0a68942ef5f759e74c63
ip-fil3.4.7.tar.gz
Posted Jul 19, 2000
Authored by Darren Reed | Site coombs.anu.edu.au

IP Filter is a TCP/IP packet filter suitable for use in a firewall environment. To use, it can either be run as a loadable kernel module (recommended) or incorporated into your UNIX kernel. Scripts are provided to install and patch system files as required.

Changes: Bug fixes.
tags | tool, kernel, tcp, firewall
systems | unix
SHA-256 | 01365d6ccef85bdc33799b5b0784e8dfefcd84217b0ecc5ac0a1e23c7e491057
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close