exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 62 of 62 RSS Feed

Files

bitchx.dos.txt
Posted Jul 8, 2000
Authored by Colten Edwards

A denial of service bug was discovered in BitchX - a nasty user can invite you to a channel with a %s in it, causing the client to coredump. This is a classic case of printf(variable) where variable contains formatting chars. Patch available here.

tags | exploit, denial of service
SHA-256 | d314b02f3283b0b921e3c16a0e5bd4fc35f5d697e913f7b6012543988df5805c
SX-20000620-3
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-3] - Partial Denial of Service in Check Point Firewall-1 on Windows NT. The SMTP Security Server component of Check Point Firewall-1 4.0 and 4.1 is vulnerable to a simple network-based attack which raises the firewall load to 100%.

tags | exploit, denial of service
systems | windows
SHA-256 | 61c0ad7d028e554c35d5167f8ebd20c832a6adbd1bb7c02554be5c77505b3562
SX-20000620-2
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-2] - Multiple services on Windows 2000 Server are vulnerable to a simple attack which allows remote network users to drive the CPU utilization to 100% in an extremely short period of time, at little cost to the attacker's machine.

tags | exploit, remote
systems | windows
SHA-256 | 191c6adfd847ea402235201869f564559ee66cfe136a02c7e35f348121711f8d
SX-20000620-1
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-1] - Denial of Service vulnerability in Microsoft Windows 2000 Telnet Server. A remote user can cause the telnet server to stop responding to requests by sending a stream of binary zeros to the telnet server. This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 23 < /dev/zero".

tags | exploit, remote, denial of service
systems | linux, windows
SHA-256 | 75c77bf0657fae44cbe5c5587fc4118b7d0679ae59041f32fa493cfc21d0f95d
DST2K0019.txt
Posted Jul 5, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0019 - WebBBS v1.17 for Windows NT contains multiple buffer overflows, some of which allow remote code execution.

tags | exploit, remote, overflow, code execution
systems | windows
SHA-256 | d82eeef70f6585ce7e748912ca67a16cd5fdbba6951e5096053b19902d66b3ad
razor.password.txt
Posted Jul 5, 2000
Authored by Shawn Clifford

Razor is a configuration management tool which has a serious flaw with the Razor password file, rz_passwd. It can be decrypted with dumprazorpasswd.c or passwd_rz.pl which are included.

tags | exploit
SHA-256 | 82300ec15648f4a16224b4ad863d3c7cccc62a8d21ec4dfc1f9afc652a204554
imeshexp.zip
Posted Jul 4, 2000
Authored by Hitek | Site mxeleet.org

iMesh V1.02 Beta build 117 remote exploit for Windows 98. Exploits a buffer overflow to download a file from a given URL and execute it on the remote host. Includes windows binary and C source.

tags | exploit, remote, overflow
systems | windows
SHA-256 | fdac6101b44177dac984a8a1c7f42db4cc6a06d01a432a007d4b060595a4cc66
cpd.c
Posted Jul 1, 2000
Authored by Antipent

CheckPoint IP firewall crashes when it detects packets coming from a different MAC with the same IP address as itself. We simply send a few spoofed UDP packets to it.

tags | exploit, udp, spoof
SHA-256 | ad01316cc5a45abb3776b8ade259c2dc2b3b162171ce1778e569bed038e2056d
SuSeLocaltmpXploit.c
Posted Jul 1, 2000
Authored by WC

SuSe 6.1 through 6.4 local exploit - when root switches users, /tmp/ will be the $HOME. This exploit will create a suid (user) shell when root su's to a user account.

tags | exploit, shell, local, root
systems | linux, suse
SHA-256 | 0c640e5bd6cad6ab1a9f902ec11367abac1597d2768eedf475e4293e23c3c435
Xnapster.c
Posted Jul 1, 2000
Authored by WC

Gnapster 1.3.8 and Knapster 0.9 remote view file exploit.

tags | exploit, remote
SHA-256 | 53c82a8e2d27ddb652a607c8842ffdc06767db6dc99711ae7c83b0e6575c08d9
proftpX.c
Posted Jul 1, 2000
Authored by WC

ProFTPD 1.2pre4 remote buffer overflow exploit. Requires a writable directory.

tags | exploit, remote, overflow
SHA-256 | ddaa523bce8660f1ea7139487103115776722b6432a3e876c8f85d29b5c96cc5
JRUNremoteXploit.tgz
Posted Jul 1, 2000
Authored by WC

JRun 2.3 remote buffer overflow exploit. Runs a shell on the port where the JRun webserver daemon is running.

tags | exploit, remote, overflow, shell
SHA-256 | 0009f8a8198fbfbcd6431fe2f632926a00f52ef872ba53530e82d7fec95be05d
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close