what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 115 RSS Feed

Files

vqserver.dos.txt
Posted Aug 29, 2000
Authored by nemesystm | Site dhcorp.cjb.net

vqServer version 1.4.49 is vulnerable to a denial of service attack by sending a malformed URL request. Tested on Windows version. The latest edition of vqServer (1.9.47) is unaffected.

tags | exploit, denial of service
systems | windows
SHA-256 | 50488cee02fca807a8ce6e2060e9884bc802b907abd649fbdd372b9c7f8b7fae
VIGILANTE-2000007
Posted Aug 28, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #7 - A malicious user can crash an Intel Express 550F or a host behind it by sending a packet with a malformed header. To restart the box you need remove it from it's power source as the reset button loses functionality as well. Affected systems: Intel Express Switch 550F - Firmware version 2.63 - Firmware version 2.64.

tags | exploit
SHA-256 | e5543dcadd99ee203a752f663a687366bd68f30736388f7036df6793e11c9e4c
bubonic.c
Posted Aug 28, 2000
Authored by Sil | Site antioffline.com

Bubonic.c is a denial of service tool that sends random TCP packets with random settings. Tested against Windows 2000 and RedHat Zoot.

tags | exploit, denial of service, tcp
systems | linux, redhat, windows
SHA-256 | 2013c97c64a142d7b60cf7fb0c87cfb2051a655e1a6bbacda27c715de28a58c4
daemonic.c
Posted Aug 28, 2000
Authored by Sil | Site antioffline.com

Dameonic.c is a theoretical router based denial of service attack that exploits a weakness within the Border Gateway Protocol (BGP). If a malicious user sends spoofed malformed packets to a neighboring router, the peer will ignore it and possibly kill the session entirely. Written on a Ultra 5 running Linux Zoot, this has been compiled on Linux, OpenBSD, Solaris without problems.

tags | exploit, denial of service, spoof, protocol
systems | linux, solaris, openbsd
SHA-256 | 087027be1ed28b34dfed0504b156c7b5365220433158b9462f5e771cc9c446cd
php-nuke.txt
Posted Aug 24, 2000
Authored by Starman_Jones

A short advisory on how to manipulate a bug in the PHP-nuke Web Portal System to allow you to gain administrative access.

tags | exploit, web, php
SHA-256 | cf5caaf8ca30d68549e8b03b403d8357b9091908f9a1f4a699adfa6d79dd6c90
labs51.txt
Posted Aug 24, 2000
Site ussrback.com

USSR Labs Advisory #51 - There is a remote denial of service caused by a buffer overflow memory problem in the rpc module of the Pragma TelnetServer 2000 for Windows NT/2000. The included shell code causes the system to crash.

tags | exploit, remote, denial of service, overflow, shell
systems | windows
SHA-256 | 80aaff8dc2722ce8975dbf99700af93496577d3c0b91d5b96d636774b89c15f0
darxite.tar.gz
Posted Aug 23, 2000
Authored by Dethy | Site synnergy.net

Darxite, a daemon that retrieves files via FTP or HTTP, has several vulnerabilities throughout the code that allow a local/remote user to crash the servers, as well as a passwd authentication remote overflow, allowing remote shell access as the uid of the darxite daemon. Exploit and advisory included. Tested against Linux x86 systems.

tags | exploit, remote, web, overflow, shell, x86, local, vulnerability
systems | linux
SHA-256 | 2c5a17a7af5e62b8c35d708754842d9f6d13efbcd99d19896e60c3d9ca6f3760
xslrnpull.c
Posted Aug 22, 2000
Authored by vade79, realhalo | Site realhalo.org

Slrnpull.c exploits a local buffer overflow vulnerability in slrnpull version 0.9.6.2, which is setgid news. Tested against RedHat 6.2.

tags | exploit, overflow, local
systems | linux, redhat
SHA-256 | 416129da6ec1a149669dbfa4d033e8be06cf479f020fc5eefda50e6ade9d3fc9
PHP-Nuke.c
Posted Aug 21, 2000
Authored by Fabian Clone

A vulnerability in the way PHP-Nuke, a news site administrative tool, authenticates administrative accounts, allows a remote attacker to gain administrative access to the application. Attacker could edit users, articles, topics, banners, assign authors, etc

tags | exploit, remote, php
SHA-256 | eca37faae9a6a2eeba44799294fae819f847c9d8cb2db5b49509a50b9b29c9ac
htgrep.c
Posted Aug 21, 2000
Authored by n30

Htgrep has a vulnerability which allows a remote user to read arbitrary files on the system with the priviledge of the user running the program.

tags | exploit, remote, arbitrary
SHA-256 | c01230dec2a91deb2f424d3380ac2843757db64552164f3d93bd6365f519b20b
srcgrab.pl.txt
Posted Aug 17, 2000
Authored by Smiler

Srcgrab.pl exploits the Translate:f bug as described in ms00-058. The vulnerability, present in IIS 4.0 and Windows 2000 Frontpage server extensions, allows a remote user to retrieve the source of .asa and .asp pages.

tags | exploit, remote, asp
systems | windows
SHA-256 | 33424ecc3ff3c935dcbae09202091459045e94a6f7ba54fa540a7133c419705e
crackncftp.c
Posted Aug 17, 2000
Authored by Zorgon | Site zorgon.freeshell.org

The ncftp client uses an easily decrypted scheme to save passwords to remote FTP sites in a bookmark file. Crackncftp.c provides the plaintext when from the encrypted string.

tags | exploit, remote
SHA-256 | 4ed56e4e5d88cc9b9c62d4ce74ab7b94bc9d98b285cadb58d0da304ceca15a9b
ie5-msn.exec.txt
Posted Aug 16, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #18 - Two serious vulnerabilities have been found Microsoft products - Internet Explorer 5.5/5.x may execute arbitrary programs when visiting a web page, reading HTML based mail with Outlook, or simply browsing folders as web pages. In addition, the default installation of Windows 2000 allows Local Administrator compromise via opening local folders as web pages. In both cases a malicous person may take full control over user's computer / server. Includes proof of concept HTML code. Demonstration available here.

tags | exploit, web, arbitrary, local, vulnerability, proof of concept
systems | windows
SHA-256 | 49fd86e3c8396e11f2d62291b0e07c00a9c7b972856156f9dac92627faf60f3b
rapidstream.vpn.txt
Posted Aug 15, 2000
Authored by Loki

RapidStream VPN nodes has hard-coded the 'rsadmin' account into the sshd binary in the appliance OS. The account has been given a 'null' password in which password assignment and authentication was expected to be handled by the RapidStream software itself. The vendor failed to realize that arbitrary commands could be appended to the ssh string when connecting to the SSH server on the remote vpn. This in effect could lead to many things, including the ability to spawn a remote root shell on the vpn.

tags | exploit, remote, arbitrary, shell, root
SHA-256 | 1fd2ed25e75ae6103e367de4a012acaddbd2dec2b82709822d1d1f127d8cc413
linsql.c
Posted Aug 15, 2000
Authored by Herbless

Linsql is a simple command-line client for MS SQL server which can execute arbitrary SQL queries and OS commands on an MS-SQL hosts that uses a blank 'sa' password, a common default configuration.

tags | exploit, arbitrary
SHA-256 | 8c9396b46daebd7ef569ec0f947a5ed309df55823876b48edcb9daffb8a5e521
VIGILANTE-2000006.txt
Posted Aug 15, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Security Advisory - The OS/2 Warp 4.5 FTP Server contains denial of service vulnerabilities which allow anyone who can connect to port 21 to crash the service. Fix available here.

tags | exploit, denial of service, vulnerability
SHA-256 | dcb764dd372fa94bea264f25decd609cbc3da5a3d482b1c028224a0dfc38159b
VIGILANTE-2000005.txt
Posted Aug 15, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Security Advisory - Watchguard Firebox Authentication dos vulnerability. Sending a malformed URL to tcp port 4100 causes Watchguard to shut down and require a reboot to restart. Fix available here.

tags | exploit, denial of service, tcp
SHA-256 | 14919ca4948fe3696698e353b783188ead84c819a08b964e581bbb6c4dfa3cc0
lyris.3-4.txt
Posted Aug 15, 2000
Authored by Adam Hupp

Versions 3 and 4 of the Lyris List Manager allow any mailing list subscriber to gain access to the administrative interface of that list by changing a form before submitting it. Fix available here.

tags | exploit
SHA-256 | 2f0b0f3203076a0c3be1376c0bf6a444c51fef60e897a936f0aedc04872cfb91
form-totaller.txt
Posted Aug 14, 2000
Authored by Signal 9

Form-Totaller version 1.0 (form-totaller.cgi) trusts user input for filenames, allowing a remote user to read any file on the webserver.

tags | exploit, remote, cgi
SHA-256 | e3d777d52f8cfacde87ec258a2d6cfa48ba8b637c56c21835cdf716ee4620394
everythingform.txt
Posted Aug 14, 2000
Authored by Signal 9

The Everything Form (everythingform.cgi) contains remote vulnerabilities which allow any file on the sytem to be read.

tags | exploit, remote, cgi, vulnerability
SHA-256 | 1b339106ce174c1887c0dbb63dc46ef3e2273e5d5d44fae56593ea21e2c22e12
wais.pl.advisory.txt
Posted Aug 14, 2000
Authored by synnergy, Scrippie | Site synnergy.net

The wais.pl CGI written by Tony Sanders provides means to access the waisq WAIS client via the webserver. Waisq contains buffer overflows allowing remote code execution which can be exploited via wais.pl. In addition, files owned by nobody on the webserver can be overwritten with arbitrary content. Includes exploit for Linux/x86.

tags | exploit, remote, overflow, arbitrary, x86, cgi, code execution
systems | linux
SHA-256 | 0a1486af2061c3b2f7952eb470c47fcbf6d3d36571a036f046ae5709356c58d1
wcGoph.c
Posted Aug 14, 2000
Authored by WC

Gopher+ v2.3.1p0 remote exploit - Spawns a remote shell on tcp port 36864 under the UID that the gopher+ daemon runs as. Tested against Linux Slackware 3.6 / 7.0.

tags | exploit, remote, shell, tcp
systems | linux, slackware
SHA-256 | 71aa58978ab9c730cefaa09803a9c98febeb91b69d9d601ac9a232b790ac1e41
ssexploit502x.pl
Posted Aug 13, 2000
Authored by nemo | Site deepzone.org

Statistics Server 5.02x for Windows contains a buffer overflow caused by a long GET request. Includes perl exploit which spawns a winshell with system privileges on port 8008 on Statistics Server 5.02x/Win2k.

tags | exploit, overflow, perl
systems | windows
SHA-256 | 4d5eb9ffd94b406e9662e8575bcca3692763124371afe9b77e28d789f947712f
statdx.c
Posted Aug 12, 2000
Authored by Ron1n

Redhat Linux rpc.statd remote buffer overflow exploit. Tested against Redhat 6.0, 6.1, and 6.2.

tags | exploit, remote, overflow
systems | linux, redhat
SHA-256 | c1de1ba5c571d6f403a8f820e615faa4e5df066142935928a9f9d39804e2b53f
xgopher.c
Posted Aug 12, 2000
Authored by vade79, realhalo | Site realhalo.org

Gopher+ daemon v2.3 remote root buffer overflow exploit - Tested against Slackware Linux 3.6 and 7.0. Adds a line to /etc/passwd.

tags | exploit, remote, overflow, root
systems | linux, slackware
SHA-256 | 9c2f2d4a91a62e040ddd61ebd3561c42d0097168294f3951f1f9d91c91fab2e1
Page 4 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close