Twenty Year Anniversary
Showing 1 - 25 of 59 RSS Feed

Files

0003-exploits.tgz
Posted May 19, 2000
Authored by Todd J.

Packet Storm new exploits for March, 2000.

tags | exploit
MD5 | 95701a59743701a83fb0299332670474
win98-bluescreen.txt
Posted Apr 20, 2000
Authored by RUBINHO

More ways to abuse c|/con/con - In mail with html tags, in normal html, serv-u ftp, and win registry.

tags | exploit, registry
MD5 | c0b4300165f98b796552d4d6959b3013
cgimail.txt
Posted Apr 20, 2000
Authored by Chopsui-cide

Anyone who can execute CGIMailer (anyone who can use the forms that use CGIMailer) can specify what configuration file to use and this can be any file on the system CGIMailer is running on. This allows for the existance of private files to be detected. There are more dangerous implications though: this vulnerability could possibly be exploited to obtain private files from the target system. If there is an FTP server running on the target system on which an attacker has upload priviledges, he/she could upload a malicious configuration file, and then run it using CGIMailer. Configuration files can be used to send files to the attacker via e-mail (among other things).

tags | exploit
MD5 | f7de5eda40daf04436bf842b5da50d4e
ircii_exploit.txt
Posted Apr 20, 2000
Authored by Bladi, Almudena

Two exploits are included in this. It is a dcc chat buffer overflow in seperate exploits for linux and mirc.

tags | exploit, overflow
systems | linux
MD5 | a5f3255a68ccceb208d72b8d2e5f1fbe
exp-wmcd.c
Posted Apr 19, 2000
Authored by Dethy

Local exploit for Linux Mandrake 7.0's wmcdplay 1.0 beta 1. Unlike the Teso exploit for wmcdplay, this code exploits the -position argument.

tags | exploit, local
systems | linux, mandrake
MD5 | 785feed4909216091acb3e38b39c0624
x11amp.txt
Posted Apr 19, 2000
Authored by Grampa Elite

Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.

tags | exploit
MD5 | 6a3502236ea9eb76b2781d450922a5bb
irix-objectserver.c
Posted Apr 4, 2000
Authored by Marcy

SGI IRIX objectserver remote exploit - Remotely adds account to the IRIX system. Patched February, 1998. Tested on IRIX 5.2, 5.3, 6.0.1, 6.1 and even 6.2.

tags | exploit, remote
systems | irix
MD5 | f8f3902c4810ad26e5c2a990e4c83666
rpc.AMD.FreeBSD3.2REL.tar.gz
Posted Apr 1, 2000
Authored by Anathema

FreeBSD 3.2-REL AMD remote root exploit.

tags | exploit, remote, root
systems | freebsd
MD5 | 351208884d8865d37e90e355a1e8be3e
icadecrypt.c.txt
Posted Apr 1, 2000
Authored by Dug Song | Site monkey.org

icadecrypt cracks the weak hash encryption on stored Citrix ICA passwords (in appsrv.ini).

tags | exploit
MD5 | de9aa7ad940c82d0edd4703d36cd2948
ass.pl
Posted Mar 31, 2000
Site cs.uni-potsdam.de

Atsacd local root exploit. Halloween linux, possibly others affected.

tags | exploit, local, root
systems | linux
MD5 | f83769b2ead1d2061f05cddbbc0c92b8
NXT-Howto.txt
Posted Mar 30, 2000
Authored by E-Mind | Site hack.co.za

BIND 8.2 - 8.2.2 remote root exploit how-to. Explains how to manipulate DNS records on a primary name server to exploit this vulnerability.

tags | exploit, remote, root
MD5 | 7d9cc546371b262932998b08e87fb80f
tpgnrock.c
Posted Mar 29, 2000
Authored by Presto

Crash Exploit for AnalogX SimpleServer v1.03

tags | exploit
MD5 | c2fde24f4e43c6cbf56263a39c56d0f7
winmail305.txt
Posted Mar 29, 2000
Authored by Frankie Zie

Winmail 3.05 for Windows NT allows any file on the system to be read. Exploit code included.

tags | exploit
systems | windows, nt
MD5 | a5d9914f57188dd6dd5ca0b928c4145c
kreatur.pl
Posted Mar 29, 2000
Site cs.uni-potsdam.de

kreatecd local root-exploit helper script - Halloween Linux 4.0 and SuSE 6.0 - 6.3.

tags | exploit, local, root
systems | linux, suse
MD5 | 29ce5fe6509e50d7519f3d4adf34192b
position.c
Posted Mar 29, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

Overflows the -position arg buffer in wmcdplay due to a bad sprintf call.

tags | exploit, overflow
MD5 | 39c483ebee434226c7d9214e09d580c9
domain-socket.c
Posted Mar 26, 2000
Site hack.co.za

Domain Socket Denial of Service Vulnerability affecting Linux kernel 2.3.99-pre2, Linux kernel 2.2.14, Linux kernel 2.2.12, RedHat Linux 6.2, RedHat Linux 6.1 sparc, RedHat Linux 6.1 i386, and RedHat Linux 6.1 alpha.

tags | exploit, denial of service, kernel
systems | linux, redhat
MD5 | d499f5779e57039381df358aabe37d48
browser-bug.txt
Posted Mar 26, 2000
Authored by SET-FW | Site set-ezine.org

Linux web browsers are affected by accessing devices, this bug may be considered similar to the \con\con bug except that the technological superiority of Linux will prevent a system crash.

tags | exploit, web
systems | linux
MD5 | 46f472e7290883f774edf84d22cad5e0
win98-con-lan.txt
Posted Mar 25, 2000
Authored by Toxic Waste

A windows 9x machine that shares any of its files, even read only, can be crashed remotely via the con/con issue.

tags | exploit
systems | windows, 9x
MD5 | 41a940671ba3803de8923b03b899962f
netscape-wp.dir-list
Posted Mar 24, 2000
Authored by Fobic | Site zsh.stupidphat.com

ZSH Advisory - Netscape WebPublisher Allows Directory Listing and Access. Netscape Webpublisher is an addon to Netscape's Enterprise webserver which allows remote file modifications, uploads and downloads. A third party user can access the WebPublisher via downloading a number of java applets and the webserver's directory structure without having a valid account on the system. Netscape v3.5.1 / 3.6 SP1-3 under solaris are vulnerable.

tags | exploit, java, remote
systems | solaris
MD5 | 5667dd97bbfa81899150d284dc189197
wmcdplay-exp.c
Posted Mar 24, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

5 exploits for wmcdplay (A cd player designed for WindowMaker - Release 1.0 Beta1) Tested on Mandrake 7.0.

tags | exploit
systems | linux, mandrake
MD5 | 3cf6ace990d3090acd8dd556a16b0284
pam-mdk.c
Posted Mar 21, 2000
Authored by Paulo Ribeiro

PAM/userhelper exploit - Ported to Mandrake 6.1. Also works on Red Hat 6.0 and 6.1, gives uid 0.

tags | exploit
systems | linux, redhat, mandrake
MD5 | 503fb14445e29d4a77c3a9234a5f26c8
spoon.c
Posted Mar 21, 2000
Authored by Obecian | Site celerity.bartoli.org

spoon.c - (ab)use dig.cgi to proxy DNS dig requests. Useful to request a zone transfer without revealing your IP.

tags | exploit, cgi
MD5 | babceccd9425d38d1d485e3dcb0404f7
gpm-root.sh
Posted Mar 20, 2000
Site hack.co.za

A vulnerability exists in the gpm-root program, part of the gpm package. A local console user can obtain root. Tested under RedHat Linux (6.2 / 6.1 / 6.0 / 6.0 / 5.2 / 5.1) and Debian Linux (2.2 / 2.1 / 2.0).

tags | exploit, local, root
systems | linux, redhat, debian
MD5 | 140d93251d1db3a2ddcaa1202e637d8b
imexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween 4 local root exploit for imwheel-solo. Other distros maybe affected as well.

tags | exploit, local, root
MD5 | c3666f47df53ac801b0213bec8395af0
led_color.c
Posted Mar 20, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

Overflows the -l arg buffer in wmcdplay due to a bad sprintf call. Tested on Mandrake.

tags | exploit, overflow
systems | linux, mandrake
MD5 | a2c8588ba1ab3eff35b1566532d99a8e
Page 1 of 3
Back123Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
The Unpatchable Exploit That Makes Every Current Nintendo Switch Hackable
Posted Apr 24, 2018

tags | headline, hacker, flaw, nintendo
Police Visit Funeral Home To Unlock Dead Man's Phone
Posted Apr 24, 2018

tags | headline, government, privacy, usa, phone
Satan Ransomware Adds EternalBlue Exploit
Posted Apr 24, 2018

tags | headline, malware, microsoft, flaw, zero day, nsa
WikiLeaks, Russia, Trump Jr. Named In New DNC Hacking Lawsuit
Posted Apr 23, 2018

tags | headline, government, usa, russia, data loss, fraud, cyberwar
Quihoo 360 Finds Windows Zero Day, Stays Schtum On Specifics
Posted Apr 23, 2018

tags | headline, microsoft, china, flaw
Gmail Spam Mystery: Why Have Secure Accounts Started Spamming Themselves?
Posted Apr 23, 2018

tags | headline, email, spam, google
Iran's Banks Banned From Dealing In Crypto Currencies
Posted Apr 23, 2018

tags | headline, government, bank, iran, cryptography
RSA Fails To Assess Vendor, Leaks Attendee Details
Posted Apr 21, 2018

tags | headline, privacy, phone, data loss, flaw, conference, rsa
Trustjacking Exploit Abuses iTunes Feature To Spy On iOS Devices
Posted Apr 21, 2018

tags | headline, flaw, apple, conference
Ex-Employee Sun Trust Helps Compromise 1.5 Million Bank Clients
Posted Apr 21, 2018

tags | headline, privacy, bank, cybercrime, data loss, fraud
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close