what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files

defcom.netscape-enterprise.txt
Posted Feb 2, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-04 - The Netscape Enterprise Server 4.1, SP5 has a problem dealing with dotdot-URLs which allows remote users to crash the server.

tags | exploit, remote
SHA-256 | 768d61483abe30a51ab1cd66b87cfae17257c72ec3296e35a6747a6f502c5357
defcom.goodtech.ftp.txt
Posted Feb 2, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-03 - The GoodTech FTP server v3.0.1.2.1.0 does not properly free resources. This can result in the FTP server either crashing or displaying its banner and immediately disconnecting the user.

tags | exploit
SHA-256 | c21918a2c02a00334025bd3b621aa2fae135833c0f0c2652ea547b1c483be300
pkc004.txt
Posted Feb 2, 2001
Authored by Cyrax | Site pkcrew.org

PKC Security Advisory #4 - Icecast v1.3.8beta2 and prior contains remotely exploitable format string bugs which allow remote code execution with the UID/GID of the user running Icecast. Includes PKCicecast-ex.c, a remote proof of concept exploit tested against Icecast 1.3.7 on Slackware 7.0 and RedHat 7.0.

tags | exploit, remote, code execution, proof of concept
systems | linux, redhat, slackware
SHA-256 | e62ac68d8ec2c2f6b273d6ca02cdbad6ee67e699ea9de3f5912684ee7cded816
pkc003.txt
Posted Feb 2, 2001
Authored by The Recidjvo | Site pkcrew.org

PKC Security Advisory #3 - Micq-0.4.6 contains remotely exploitable buffer overflows which allow running arbitrary code with the UID/GID of the user running micq. Includes micRAq.c, linux/x86 proof of concept exploit.

tags | exploit, overflow, arbitrary, x86, proof of concept
systems | linux
SHA-256 | bdeafc53f03fcf3d7fe4fc162d02cad42920f5cca6a62418729e5e987cf1fc0b
pkc002.txt
Posted Feb 2, 2001
Authored by Cyrax | Site pkcrew.org

PKC Security Advisory #2 - Tinyproxy version 1.3.2 and 1.3.3 has a remotely exploitable heap overflow. Includes PKCtiny-ex.c proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 9b8487ab46c56a3677f0fd0b25a30f2774de4f0c100682bc5073cbf203ced5eb
pkc001.txt
Posted Feb 2, 2001
Authored by Cyrax | Site pkcrew.org

PKC Security Advisory #1 - The Oops proxy server 1.4.22, 1.4.6, and prior contain a remotely exploitable heap overflow. Includes PKCoops-ex.c, a proof of concept exploit tested on Slackware 7.0.

tags | exploit, overflow, proof of concept
systems | linux, slackware
SHA-256 | ae3fafa2ad77d388455f7d4a62b70e29166ee80961292f51d7b357fd31195cf2
prodbx.c
Posted Feb 2, 2001
Authored by The Itch | Site bse.die.ms

Progress Database Server v8.3b local root exploit - Tested on Sco Unix and Linux.

tags | exploit, local, root
systems | linux, unix
SHA-256 | 100a970028aac2a1194ba986a81b6e2e4aec519e82a37df1992d7a51e4ecc4c0
seyon-exploit.pl
Posted Feb 2, 2001
Authored by Telehor | Site teleh0r.cjb.net

Seyon v2.1rev4b local exploit - Requires a valid display variable.

tags | exploit, local
SHA-256 | 05f961ae5eea578579a5554674f759ec21d2787c231c85db34475e46faa747ec
jazip-exploit.pl
Posted Feb 2, 2001
Authored by Telehor | Site teleh0r.cjb.net

Jazip v0.32-2 local root exploit - Takes advantage of a buffer overflow in the Xforms library.

tags | exploit, overflow, local, root
SHA-256 | 0bb3081442c2c8049ba97fcecf4791726f57f01f26e8e42e9099a1a2abaf460a
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Malware Operators Use Copyright Infringement To Lure In Businesses
Posted Nov 1, 2024

tags | headline, malware, cybercrime, fraud
FakeCall Malware Menaces Android Devices
Posted Oct 31, 2024

tags | headline, malware, phone, google
Chinese Attackers Accessed Canadian Government Networks For Five Years
Posted Oct 31, 2024

tags | headline, hacker, government, canada, china, cyberwar, spyware
Windows Themes 0-Day Bug Exposes Users To NTLM Credential Theft
Posted Oct 31, 2024

tags | headline, hacker, microsoft, data loss, flaw, password, zero day
Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution
Posted Oct 31, 2024

tags | headline, flaw, yahoo
North Korean Nation State Threat Actor Using Play Ransomware
Posted Oct 31, 2024

tags | headline, government, malware, cybercrime, cyberwar, cryptography, north korea
Prosecutors Seek A 17-Year Prison Term For Pentagon Secrets Leaker Jack Teixeira
Posted Oct 31, 2024

tags | headline, government, usa, data loss, cyberwar, military
LottieFiles Supply Chain Attack Exposes Users To Wallet Drainer
Posted Oct 31, 2024

tags | headline, hacker, privacy, malware, data loss, cryptography
Intel And AMD Chips Still Vulnerable To Spectre Flaw
Posted Oct 30, 2024

tags | headline, flaw, intel
AI Bug Bounty Program Yields 34 Flaws In Open Source Tools
Posted Oct 30, 2024

tags | headline, botnet, flaw
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close