exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 59 of 59 RSS Feed

Files

ie5-chm.txt
Posted Mar 2, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #8 - There is a vulnerability in IE 5.x for Win95/WinNT (probably others) which allows executing arbitrary programs using .chm files. Microsoft Networking must be installed. Demonstration which starts wordpad here.

tags | exploit, arbitrary
systems | windows
SHA-256 | 36cf5adf9fed04673b3b5f1b78c820e4d91c6d87aaadd7695c5310bb6022635e
bsd-sm884.c
Posted Mar 2, 2000
Site hack.co.za

FreeBSD Sendmail 8.8.4 mime 7to8 remote exploit.

tags | exploit, remote
systems | freebsd
SHA-256 | 3026d76cd6cb15ace5c52d53c41a42d7e7c68d1c3c01f24851a28d0322a18da5
mailer.c
Posted Mar 2, 2000
Authored by Cybz | Site hack.co.za

Remote exploit for Mailer 4.3 - Win 9x/NT.

tags | exploit, remote
SHA-256 | 8489a9fa3a8de6bd2c521aaa002ea3a9880cd2f51635511e93ad7c1dc7c75f96
getpop3.txt
Posted Mar 2, 2000
Authored by r3p3nt | Site dhc1.cjb.net

Getpop3 POP client for linux local root exploit - make any local file world writable.

tags | exploit, local, root
systems | linux
SHA-256 | 7719521455848e7d654262495d9a48609860cc59ad1edd33a49d56c3bb2d61d2
dosemu.sh
Posted Mar 1, 2000
Authored by Suid

Corel Linux dosemu config error. Local root compromise.

tags | exploit, local, root
systems | linux
SHA-256 | 81ad1e0d833b1891556039a50544c4df1f8a580b3985a0e111e72d5f334fb2f2
setxconf.sh
Posted Mar 1, 2000
Authored by Suid

Corel xconf utils local root (among others) vulnerability.

tags | exploit, local, root
SHA-256 | f6cddf04b692fdedb8346c87a2db5002b0d59c1869dffcfc1a4715f491adcfcf
Infosec.20000229.axisstorpointcd
Posted Mar 1, 2000
Authored by Ian Vitek

Infosec Security Vulnerability Report - Bypassing authentication on Axis StorPoint CD. By modifying an URL, outsiders can access administrator URLs without entering username and password, allowing unauthorized access.

tags | exploit
SHA-256 | a9d7c189d04d0c389c6bcf2a550c2260c1361e22b171c946fe4e997ba0df1b8a
htdig.txt
Posted Mar 1, 2000
Authored by Geoff Hutchison

Htdig 3.1.4 search engine allows any file on the system to be read via CGI binary htsearch. Exploit information included.

tags | exploit, cgi
SHA-256 | 1eecacdd74cf1f2d6d72a6122781d4380abec3bf059830728e3f5f5d2e059c08
manxpl.c
Posted Mar 1, 2000
Authored by Anathema

Linux x86 man exploit - exploits the stack overflow in man (PAGER env var) yielding egid man. Tested on Redhat 6.2.

tags | exploit, overflow, x86
systems | linux, redhat
SHA-256 | dad3bcbb22280ca155e875ba6739d1374edf3d73ce8562e9098dc336d6d26704
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close