seeing is believing
Showing 1 - 25 of 121 RSS Feed

Files

Whitepaper - Using XFS To Create XSS From SQL Injection
Posted Aug 6, 2009
Authored by 599eme Man

This whitepaper focuses on discussing how to use the SQL XFS deviation to execute cross site scripting attacks.

tags | exploit, xss
MD5 | e5b3bd5a2dbf34c616ea715c9dea8cc0
fakepine.c
Posted Jul 20, 2003
Authored by r3b00t | Site r3b00t.tx.pl

Remote exploit for Sendmail versions below 8.9 that makes use of the buffer overflow in HELO to send completely spoofed emails.

tags | exploit, remote, overflow, spoof
MD5 | 42bd1b17150d2c64e0bedeeb617fb161
ConFusion.zip
Posted Aug 17, 1999
Authored by Xhostile, cyber-strike inc

Con Fusion is an extremely user-friendly Win32 program that exploits the security holes found in Cold Fusion web server software. [re:L0pht's Cold Fusion security advisory]

tags | exploit, web
systems | windows
MD5 | 90db1fd5a520c2eb221ba3c11e72b535
hp-ux.mpei-x.txt
Posted Aug 17, 1999

Security Vulnerability in MPEi/X debug for HP3000 systems allows any user to gain increased privileges. Vendor patches available.

tags | exploit
MD5 | 8d5409ee4e0af1e939dbbffce0b095e8
hp.sendmail.8.8.6.DoS.txt
Posted Aug 17, 1999

sendmail 8.8.6 for various HP platforms is vulnerable to simple Denial of Service attacks. Vendor solution/patch details included.

tags | exploit, denial of service
MD5 | a39da0f39b32f55da0da299196125a0a
icq.webserver.exploits.txt
Posted Aug 17, 1999

Security vulnerabilities in the ICQ99a ICQ-Webserver allows remote attacker to execute Denial of Service attacks, hijack ICQ accounts, and even download any files from Hard Drive, including Registry and password files. Detailed step-by-step descriptions of all exploits included.

tags | exploit, remote, denial of service, registry, vulnerability
MD5 | 07404023e8ec48cf50b51e22248a25dc
icq99.passwd.txt
Posted Aug 17, 1999

ICQ stores passwords in plain text? And now you know where too. Find one of the millions of people utilizing the ICQ-Webserver and you can Hacking ICQ-Webservers for Dummies file if you have problems.

tags | exploit
MD5 | e4a196e72493163561185f0b4fdf1957
icq99.web.server.txt
Posted Aug 17, 1999

Security vulnerability in ICQ99 WebServer allows anybody to access your entire hard drive, including password files and registry. Exploit described; no fix available. Mirabilis obviously does not consider security to be of any importance.

tags | exploit, registry
MD5 | d1e3561b7a4846a2abb684e783414cce
insmod.linux.txt
Posted Aug 17, 1999

Linux insmod security vulnerabilities allow local attacker to potentially gain root compromise. Detailed descriptions of the various vulnerabilities and basic exploit description included.

tags | exploit, local, root, vulnerability
systems | linux
MD5 | 68c50ede0ffe6206f2d958809d23f5b3
ipfilter.3.2.10.txt
Posted Aug 17, 1999

Security vulnerability in IPFilter v3.2.10 and earlier versions allows local user to gain increased privileges and/or destroy arbitrary system files, due to improper handling of lockfiles by the ipfilter program. Download the new beta version, or apply patch included in advisory.

tags | exploit, arbitrary, local
MD5 | 061545955e9bfee8fc8d7f3f0e918b0e
ipop3d.4.xx.bof.txt
Posted Aug 17, 1999

Buffer overflow in CAC.Washington.EDU ipop3d 4.xx can be used by malicious local user to gain superuser access.

tags | exploit, overflow, local
MD5 | 3eb5816a27bdbc66c1171e87bc46c8ba
ipop3d.4.xx.lockfile.DoS.txt
Posted Aug 17, 1999

Lockfile vulnerability in CAC.Washington.EDU ipop3d 4.xx can be used to launch local Denial of Service attacks. Exploit code and recommended fix included.

tags | exploit, denial of service, local
MD5 | e3d0eb51586a2a15a43fbb94fab43fed
irc.services.DoS.txt
Posted Aug 17, 1999

Bug in Services for IRC Networks 4.2.2 allows any IRC user to launch a simple Denial of Service attack. Exploit description and software upgrade information included.

tags | exploit, denial of service
MD5 | f7a3f179f2e8a76a7b86c50a2598c94c
java.jvm.byte.code.ver.txt
Posted Aug 17, 1999

Security Hole in Java 2 (and JDK 1.1.x) allows an attacker to create a booby-trapped Web page, so that when a victim views the page, the attacker seizes control of the victim's machine and can do whatever he wants, including reading and deleting files, and snooping on any data and activities on the victim's machine. No vendor patch available yet.

tags | exploit, java, web
MD5 | 821e47ce330d93d21b9c7044c98ec080
kki.inactive.connections.txt
Posted Aug 17, 1999

KKIS.28041999.002.b Security Advisory describes a common vulnerability with a wide variety of software applications that utilize tcp connections and do not properly close connections within a reasonable, secure time frame. Exploit code included to test for "inactive connection" vulnerabilities. KKI Security Team

tags | exploit, tcp, vulnerability
MD5 | 7d319afcaab55c8da83066a3d3c4b508
kki.rpc.libc.DoS.txt
Posted Aug 17, 1999

Security vulnerabilities in several RPC implementations allow remote attacker to execute Denial of Service attacks. Exploit code included.

tags | exploit, remote, denial of service, vulnerability
MD5 | ac8aa18b30b37aca46d65c227323713f
linux.2.x.ipc.DoS.txt
Posted Aug 17, 1999

Linux 2.x IPC vulnerability permits local users to exhaust memory, launching effective Denial of Service attack. Exploit code and recommended fix included.

tags | exploit, denial of service, local
systems | linux
MD5 | 969d6cac2f705e83aedae9157100cd05
linux.2.x.mmap.DoS.txt
Posted Aug 17, 1999

Linux 2.x mmap vulnerability permits local users to exhaust memory, launching effective Denial of Service attack. Exploit code and recommended fix included.

tags | exploit, denial of service, local
systems | linux
MD5 | fc2788d9269ee355a8a4ec4969567897
linux.tos.field.high.priority.patch
Posted Aug 17, 1999

This patch sets the tos field for IP headers to high priority and optimizes the IP connection for throughput, which has real effects on cisco routers.

tags | exploit
systems | cisco
MD5 | 251e541aa3744c41f8eb473fd2867285
lock-exploit.c
Posted Aug 17, 1999

Exploit code for Pine 4.xx and CAC.Washington.EDU ipop3d 4.xx lockfile vulnerabilities, allowing local Denial of Service execution by non-privileged users.

tags | exploit, denial of service, local, vulnerability
MD5 | 05daddd7a9e8f3c3f7e49fa0196a8c63
lotus.notes.time.txt
Posted Aug 17, 1999

Lotus Notes handles time zones and system time improperly, resulting in missed meetings, luser time-space confusion, black holes, mass hysteria, disorientation, and, in extreme cases, impotence and the contraction of obscure fungal infections. Patch included. The real solution is for everybody to switch to GMT/UTC though. :-)

tags | exploit
MD5 | 410b9ccd2eba5f08b4b20f0b7b95f372
mac.DoS.txt
Posted Aug 17, 1999
Authored by Epic

The popular Responder.cgi script for MacHTTP CGI Servers contains a buffer overflow that allows remote attacker to launch Denial of Service attack. Exploit description, program, source code included.

tags | exploit, remote, denial of service, overflow, cgi
MD5 | 699aff261395abccc069d14a552930d7
mc-kill.c
Posted Aug 17, 1999

Yet another bug in Midnight Commander 4.xx - this security hole allows local user to potentially gain root privileges due to improper handling of negative file sizes by MC and resulting core dumps.

tags | exploit, local, root
MD5 | 01cd086a2300c5ba3d074c8698cfbbc5
melissa.txt
Posted Aug 17, 1999

An excellent report analyzing the Melissa macro virus by melissavirus.com for more detailed information.

tags | exploit, virus
MD5 | 0892b78355084014ea7d95d6ac4a50b9
microsoft.virus.txt
Posted Aug 17, 1999

Microsoft releases virus infected MS Word documents on their own web site! If you have visited http://www.microsoft.com/uk/business_technology/dns/ecommerce/financial/case.htm recently to find out more about MS Exchange and E-commerce, then you should scan for the W97M/Marker.C virus on your network. This has happened numerous times!

tags | exploit, web, virus
MD5 | 2568cfb2105d39b878ec140ffa3e7cc0
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Phishers Getting Smarter By Making Use Of User Location
Posted Oct 20, 2017

tags | headline, malware, cybercrime, fraud, phish
OSX Malware Spread Via Compromised Software Downloads
Posted Oct 20, 2017

tags | headline, malware, apple
Canadian Spooks Release Their Own Malware Detection Tool
Posted Oct 20, 2017

tags | headline, government, malware, canada, spyware
Judge: MalwareTech Is No Longer Under Curfew, GPS Monitoring
Posted Oct 20, 2017

tags | headline, hacker, government, malware, usa, conference
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close