exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 111 RSS Feed

Files

process.table.attacks.txt
Posted Aug 17, 1999
Authored by Simson L. Garfinkel

An excellent analysis of Process Table Denial of Service attacks that can be waged against numerous network services on a variety of different UNIX systems. This is not "new" news but the problems still exist and are being widely exploited, so it's time for an updated repost.

tags | exploit, denial of service
systems | unix
SHA-256 | 0df06b4b618c78a583077f375dfb2a76d748e73cc5da4e0e361c43d571934b1f
qwcrash.pl
Posted Aug 17, 1999
Authored by infected@cia.at

Denial of Service attack, coded in perl, against quakeworld servers running under win32.

tags | exploit, denial of service, perl
systems | windows
SHA-256 | aadfd797bb901f3a9443379fda2b6a598c54913b1708b11366add1bd281a0c8f
rainbow.six.bof.txt
Posted Aug 17, 1999

Rainbow Six Multiplayer network game server can be crashed with a buffer overflow in the "Nick" field.

tags | exploit, overflow
SHA-256 | 4eda921ccfdbf81012ec06728fd1709f9670bb265a69c4f9a461484249f58890
realg2freebsd.txt
Posted Aug 17, 1999

Memory leak in RealServer G2 causes FreeBSD 3.0-stable to crash/reboot randomly.

tags | exploit, memory leak
systems | freebsd
SHA-256 | dba82a4e6a7cdc15df7c6037baef30d316d91f8018563936ecda50d65880fe58
reboot.ini-passwds.txt
Posted Aug 17, 1999

REBOOT.INI file created by Microsoft BackOffice 4.0 Setup utility exposes passwords in plaintext.

tags | exploit
SHA-256 | 1c8b835323c8900395185b8f9942c3c596a32a7fa2cd445035edf235a4b0bb1a
router-tcpaccess-DoS.txt
Posted Aug 17, 1999
Authored by H D Moore

Potential Denial of Service attack against wide variety of routers. Preliminary alert, exploit code included, Cisco and other vendors are investigating.

tags | exploit, denial of service
systems | cisco
SHA-256 | 616ce10bedf84b312c9a001898b5694c41a6a1e36351030248a169de04bdaabf
seagate.backup.exec.vb.txt
Posted Aug 17, 1999

Seagate Backup Exec virus scanning software (McAfee) "accidentally" deletes "non-infected" Visual Basic class files, due to bad signature file from Network Associates.

tags | exploit, virus
SHA-256 | b3f4c2e025264f3c2c7fa2e056533748d00406f9b55b16d980afbe678300f436
serve-U.DoS.txt
Posted Aug 17, 1999

Buffer overflow in Serve-U FTP software can result in simple Denial of Service attack. Exploit example included.

tags | exploit, denial of service, overflow
SHA-256 | 7736fe5d78820b7c1ed1f53a2e99f51d2d82720244b4b8c960719c4bac1f3895
sl0scan.pl
Posted Aug 17, 1999
Authored by miff

sl0scan v0.1 is a spoofer/scanner coded in perl that allows you to portscan remote hosts, hiding the true source of the scans by mixing in decoys (fake hosts). [ED NOTE: Yeah, I know we posted this on the site over a month ago, but miff just posted it to BugTraq, so we are posting it again, with miff's additional comments included]

tags | exploit, remote, perl
SHA-256 | e6c40e1f9dc5212c3e550a067aa807a8d61c7cb6353f4f9c2bb120a8fe1b9c42
slmail.ntfs.txt
Posted Aug 17, 1999
Authored by David Litchfield

Security hole in SLMail v3.2 or v3.1 with the Remote Administration Service enabled allows anyone to remotely bypass NTFS file system permissions and read any file on the system that hasn't already been locked by another process.

tags | exploit, remote
SHA-256 | 32bf9c64f951f2805b9c64f8e2830479c3a66c813e6426597c6330a22ffd65b9
slmail3.1.txt
Posted Aug 17, 1999
Authored by eEye Digital Security

Several Denial of Service attacks exist in SLMail 3.1 due to buffer overflows. Exploit description included; no fix from vendor yet.

tags | exploit, denial of service, overflow
SHA-256 | 3cf92391815a10ddc7152fe4e034692853521fcd3eb56b7c3509084370ee348e
smashdu.c
Posted Aug 17, 1999

Digital Unix Buffer Overflow Exploits - Digital Unix 4.0x with the new executable bits on the stack and heap contains numerous remote and local buffer overflows, resulting in remote and local root compromises.

tags | exploit, remote, overflow, local, root
systems | unix
SHA-256 | f6c4d7c6af40560f45140b5c4865f1c84819ab34214b0b1605fc52c195f60a13
sniffitover.c
Posted Aug 17, 1999

Sniffit buffer overflow in all versions results in simple remote Denial of Service attack. Exploit code included.

tags | exploit, remote, denial of service, overflow
SHA-256 | d03d5c9fb1eff0d9afe8f2ac0a1f18ba390bbf384ff50153075d5f20441230df
snplog.bof.txt
Posted Aug 17, 1999

Buffer overflow in snplog.

tags | exploit, overflow
SHA-256 | 832272bc823e44add906dcf4f3dcde71c230f9c63d99b54d2b9a4b0744612c73
super.bof.txt
Posted Aug 17, 1999
Authored by X-Force

Buffer Overflow in "Super" package in Debian Linux may allow local attackers to compromise root access.

tags | exploit, overflow, local, root
systems | linux, debian
SHA-256 | 8e428ab582247ed732d5e87fc09f82026ea3cabc526ca223e17cf475694cd905
sysklogd.bof.txt
Posted Aug 17, 1999

RedHat sysklogd buffer overflow still exists in any Linux distribution running an old sysklogd package, namely all RedHat versions.

tags | exploit, overflow
systems | linux, redhat
SHA-256 | 381e3e92dc41e0910e18d85a8345e46d868a6d9811994845eebdb1c683073b37
tcp_chorusing.html
Posted Aug 17, 1999
Authored by Dan Kaminsky

TCP Chorusing in the Windows 9x TCP/IP Stack - Flaws in the Windows 9x TCP/IP Stack can lead to Denial of Service attacks - this issue is not new, but the problems described by Dan Kaminsky in this article are.

tags | exploit, denial of service, tcp
systems | windows
SHA-256 | 86110a839ed3b556156227bd89e253bc4841d4f1fa9afec14790bc6261ee825f
tetrix.1.13.16.bof.txt
Posted Aug 17, 1999

Easily exploitable buffer overflow exists in Tetrix 1.13.16.

tags | exploit, overflow
SHA-256 | b8105c1dd312a16f7decc59fa217a7fdae5cb2c54c37b7a5d552edf35b9c7e21
topdesk.passwd.txt
Posted Aug 17, 1999

Weak password encryption in TOPdesk, simple decryption method described.

tags | exploit
SHA-256 | f4b9bf0006c6fca2403791d7ccd429e2b99619ee2fe71243e62a3fe61bdfd81f
tracerouteflood.c
Posted Aug 17, 1999
Authored by (fhex) Alfonso De Gregorio

Flaws in traceroute allow any user (since it's often suided) to use traceroute as a udp, or (only for versions from 1.4) also icmp flooder. Detailed descriptions of problems and exploit code included.

tags | exploit, udp
SHA-256 | c79ca4055420afba94c5ac3b2e2ffe655c49fd3922fa50d2b348afb3a5a8104e
triactive.passwd.txt
Posted Aug 17, 1999

Triactive's Remote Management Software uses poor authentication methods and stores passwords in plaintext.

tags | exploit, remote
SHA-256 | 5af809518a0f9e048cc3272e44fafc0c76b1fddc1606d624ea5c8bd5df816ae9
activeX.file.system.object.txt
Posted Aug 17, 1999

FileSystemObject can be used to view or alter any files on an ASP (Active Server Page) web server. Exploit code example included.

tags | exploit, web, asp
SHA-256 | ff62cb692d4e99e9995a506a6f5201270924de12d34800fe1db62bf2345a31c8
all-access.c
Posted Aug 17, 1999
Authored by Nate Lawson

Retrieve and "decrypt" MS Access 97 Passwords from Access 97 database (*.mdb). UNIX source code.

tags | exploit
systems | unix
SHA-256 | ff118bb56ed342ebdae0cd90dedea754e11b3406161a36dfd40286d5cd9725fd
all-access.exe
Posted Aug 17, 1999
Authored by Nate Lawson

Retrieve and "decrypt" MS Access 97 Passwords from Access 97 database (*.mdb). Win32 executable.

tags | exploit
systems | windows
SHA-256 | ccf9ce4908f355b398e9be1c401fdef98858173329d8de2fff292b97e6ee4ae8
allaire.getfile.cfm.txt
Posted Aug 17, 1999

Allaire Forums GetFile.cfm bug allows anyone to access any file on servers running Allaire Forums software.

tags | exploit
SHA-256 | 6811ef7bfca7cd872c8789ab6ffab236d278ef42896acc3d92b53cc8741f94af
Page 3 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close