what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 63 of 63 RSS Feed

Files

ypk.tar.gz
Posted Apr 7, 2000
Site hack.co.za

ypk.tar.gz exploits the remote root sunos 4.1.3 ypupdated / keyserv vulnerability.

tags | exploit, remote, root
systems | solaris
SHA-256 | 4c7783ed2a86bc488df0ca142c05ef885da86df6abf7835bf1fb963477f4a288
ms00-019.info.txt
Posted Apr 7, 2000
Authored by rain forest puppy

Exploit information for the "Virtualized UNC Share" problem talked about in MS00-019 which yeilds the source of .asp's.

tags | exploit, asp
SHA-256 | 95fa2946c47ff7913a1492a8b887bb7d64476444f8a22f608baa88cefaf77142
mailform.txt
Posted Apr 7, 2000
Authored by Chopsui-cide | Site midgets.box.sk

MailForm v1.91 for Windows 95 and NT 4.0 allows potentially dangerous parameters to be specified by anyone who can execute it. The web interface allows remote users to execute arbitrary commands. Exploit code included.

tags | exploit, remote, web, arbitrary
systems | windows
SHA-256 | ec1657d7a461dfc355e9839059244543b53c114292ec4f73a2596f3a0c87c20c
rmp_query.c
Posted Apr 7, 2000
Authored by Alhambra | Site hack.co.za

This script exploits a vulnerability in the default installation of Caldera OpenLinux 2.3 which allows an attacker to obtain a listing of the packages, and versions of packages installed on this system, allowing an attacker to remotely determine vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 3c7ca0ba908d5de2a6e1fd15fcf8f251ada7f3de55a0e5b71efffc12ecf0816b
ircii-4.4.c
Posted Apr 7, 2000
Authored by Bladi | Site hack.co.za

ircii-4.4 exploit - buffer overflow in ircii dcc chat's allows arbitrary code execution. Tested against SuSE 6.x and Redhat.

tags | exploit, overflow, arbitrary, code execution
systems | linux, redhat, suse
SHA-256 | 88d61d34ecad6ea393743dc89f4c5fee39942c513f990ff68ebb277181f1930b
fcheck.txt
Posted Apr 7, 2000
Authored by Matt Carothers

Fcheck, a file integrity checker written in perl, can be subverted by a malicious user to execute arbitrary commands as root by creating files with shell metacharacters in their names. Version v.2.7.45 and below is vulnerable.

tags | exploit, arbitrary, shell, root, perl
SHA-256 | 83567f032de695bd283111b491dcedee8d4e9a0f04b62c7ab4cd89cd545afe9d
winreal.6-7.txt
Posted Apr 6, 2000
Authored by Adam Muntner

There is a buffer overflow in the Win32 RealPlayer Basic client versions 6 and 7 which occurs when a long location to play string is entered. Using the HTML "EMBED" tag to embed RealPlayer in a webpage and setting the "AUTOSTART=true" flag, you can force RealPlayer to start automatically, triggering the overflow condition. It appears that arbitrary code could be exploited simply by *VISITING* a webpage with the malicious embedded RealPlayer tags. MacOS and linux versions appear not to be vulnerable.

tags | exploit, overflow, arbitrary
systems | linux, windows
SHA-256 | 37419905d1e37c015f0676d7c50395144408e6d018c7cd4c3400a0871bbd49fd
linux-masq-udp.txt
Posted Apr 4, 2000
Authored by H D Moore

Linux 2.2.x IP Masquerading allows UDP packets in from the outside until the firewall times out. Under certain rare conditions, a UDP based service could be exploited from the outside.

tags | exploit, udp
systems | linux
SHA-256 | 19b4d2af4973b99c732c740c021e43f8fd08b524f19e5360b962ea66bf11b0b1
cache-control.txt
Posted Apr 4, 2000
Authored by Martin Pool

HTTP cache-control headers such as If-Modified-Since allow servers to track individual users in a manner similar to cookies, but with less constraints. This is a problem for user privacy against which browsers currently provide little protection.

tags | exploit, web
SHA-256 | 6c0889a369f0094da2a486100eb292664da60e19b64393c51e565ab036c0676d
str-msgchk.c
Posted Apr 3, 2000
Authored by Stran9er | Site hack.co.za

mh/msgchk and mh/inc demonstration local exploit for FreeBSD / BSDI.

tags | exploit, local
systems | freebsd
SHA-256 | 2bfbb7210f09b6f9327cad291bd8de8bb5765b54244ea6522c9bdd9383c87417
fdmnt-smash.c
Posted Apr 3, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

fdmount local root exploit - tested on Slackware 4.0. Must be in the floppy group.

tags | exploit, local, root
systems | linux, slackware
SHA-256 | b9f489398fdfb811cf1ded7dfb08ba23ec8fc414c75571885b29f63112e1ef19
snmpx.sh
Posted Apr 3, 2000
Authored by Acz | Site hack.co.za

Solaris 2.6 snmpdx remote exploit.

tags | exploit, remote
systems | solaris
SHA-256 | 967a377fe009f6615ffa341d4dbaf5c712e7560d3def5f4364a9fc0b4facb601
oracle.sh
Posted Apr 3, 2000
Site hack.co.za

Oracle 8.1.5i install exploit - If Oracle is installed after this script has ran, roots .rhosts can be overwritten.

tags | exploit, root
SHA-256 | 12cc6d91fae21a0a3c7016cddc4e580d317826d6ef6903c3b4a83a8ec7b3316a
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
14 Dead As Hezbollah Walkie Talkies Explode In Second, Deadlier Attack
Posted Sep 19, 2024

tags | headline, cyberwar, israel, terror, backdoor
UK Activists Targeted With Pegasus Spyware Ask Police To Charge NSO Group
Posted Sep 19, 2024

tags | headline, government, privacy, britain, israel, spyware
Pip Dreams And Security Schemes: Chaos In Your Configuration Files
Posted Sep 18, 2024

tags | headline, backdoor
Apple Suddenly Drops NSO Group Spyware Lawsuit
Posted Sep 18, 2024

tags | headline, privacy, phone, flaw, israel, spyware, apple
11 Dead, Thousands Injured In Explosive Supply Chain Attack On Hezbollah Pagers
Posted Sep 18, 2024

tags | headline, wireless, cyberwar, israel, terror, backdoor
CloudImposer Attack Targets Google Cloud Services
Posted Sep 18, 2024

tags | headline, hacker, google
AT&T Fined $13 Million For Data Breach
Posted Sep 18, 2024

tags | headline, privacy, phone, data loss
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close