exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 95 RSS Feed

Files

sun.useradd.expir.date.txt
Posted Aug 17, 1999

Sun Solaris 7 Useradd program contains a y2k bug in the '-e' expiration date parameter. Vendor fix included.

tags | exploit
systems | solaris
SHA-256 | 163924f7d262fbb98b12317a4658018f6d1da242226b7eaed1cfe8d04d869eb9
suse.6.1.tmp.symlinks.txt
Posted Aug 17, 1999

/tmp directory symlink vulnerabilities in SuSE Linux 6.1 allow malicious users to create/overwrite arbitrary files. Numerous security implications.

tags | exploit, arbitrary, vulnerability
systems | linux, suse
SHA-256 | 308310efde8705a944870a702341bb4dd8c36288d75cec6064c0ce67a90c2919
tcp.md5.router.dos.txt
Posted Aug 17, 1999

Core router TCP MD5 option leaves several router operating systems open to 'TCP connection choke' denial of service attacks.

tags | exploit, denial of service, tcp
SHA-256 | cbe76d3e04caee5a104c39b8454a8c0f2646d67166dc9fdb403a893aa6d55891
tcpdump.3.4.dos.txt
Posted Aug 17, 1999

tcpdump v3.4 is vulnerable to a remote denial of service attack when hit with IP packets with Protocol-4 and ihl=0. Exploit description and patch included.

tags | exploit, remote, denial of service, protocol
SHA-256 | 3b38d80728fc2856ef661f6e547907ba65719b6ba7b6b840549d99cae8682134
tesoiis.c
Posted Aug 17, 1999
Authored by scut

UNIX port of the eEye NT4+IIS4 URL buffer overflow remote exploit, coded in C.

tags | exploit, remote, overflow
systems | unix
SHA-256 | 3397266642014e8f2162eab579ab1c4eee1e65882fd0712630dfc4d3223a8eb3
trend.micro.interscan.ftp.proxy.txt
Posted Aug 17, 1999

Security hole in Trend Micro's InterScan 3.0 FTP Proxy allows anybody to log in to the FTP proxy, and does not allow connection filtering. Disabling the FTP Proxy Server cripples the software. No vendor response.

tags | exploit
SHA-256 | ab97d13c6b792b80981b64ad7c2964771459ee515cb688cb03a05a8cef1da3e5
vmware.bof.txt
Posted Aug 17, 1999
Authored by Asylum Security

VMware for Linux v1.0.1 and earlier contains a security hole that allows malicious users to gain root access through an exploitable buffer overrun attack.

tags | exploit, overflow, root
systems | linux
SHA-256 | bd954c5e3a9cdfde443d0997fdbd3d7f5441c9be493905ada15daf700182dfe9
whois_rawcgi.txt
Posted Aug 17, 1999
Authored by Antirez

The whois_raw.cgi perl script included in all freeware versions of the cdomain package allows remote attacker to view/retrieve any system files, such as /etc/passwd, and to execute commands. Exploit descriptions included. No fix available (unless you buy the latest commercial version).

tags | exploit, remote, cgi, perl
SHA-256 | 6ed1a793045dc56df4418e0b293b2b3111c85a8ee6014137ee015cf366dd5294
windows.prn.flaw.txt
Posted Aug 17, 1999

Windows (networked) PRN flaw allows any user to create files and directories that cannot be deleted. Recommended fix and KB article info included.

tags | exploit
systems | windows
SHA-256 | d45204e478dbab4609928cd1bb6eebdb60d4ce7c3a4c57c5df4cec0f20b85fa8
worm.explore.zip.analysis.txt
Posted Aug 17, 1999
Authored by Simple Nomad

Excellent and detailed analysis of the 'Worm.ExploreZip' trojan/worm that is wreaking havoc all over the world at an alarming rate.

tags | exploit, worm, trojan
SHA-256 | 48153de3b1b61f9b37e261a3ec2cabc5593b85b2aa89c9b07e92d902ed94e340
ex_sdtcm_convert86.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Intel (x86) version of the Solaris sdtcm_convert buffer overflow exploit that leads to root compromise. Vendor patch available.

tags | exploit, overflow, x86, root
systems | solaris
SHA-256 | 3e7269f5c0d92230ce57b19725d9fd4b4d59d52962726ff328feed787e5b6f9e
fbo.c
Posted Aug 17, 1999
Authored by Bong

Back Orifice server and fake server UDP packet flooder, with random source functionality, that quickly crashes BO servers, NoBo, FakeBo and possibly other BO-related programs. 4k.

tags | exploit, udp
SHA-256 | 104776eefe0ede05e0ccb7e8623568a9b640ce757f3b6c936c7af8816f3d65b6
frootcake.c
Posted Aug 17, 1999
Authored by kiva

Windows NT 'neverending quantum' bug allows any local user to take advantage of Microsoft's multi-thread code design to bring NT machines to a quick halt. All versions of NT affected. No vendor fix. Exploit code included.

tags | exploit, local
systems | windows
SHA-256 | b8ef621e83c64fb23c232e29a04ccc2d1b61f1c2b392fe0cca4fad58216a0244
fuck-fingerd.gz
Posted Aug 17, 1999
Authored by dr_fdisk^

fingerd denial of service exploit code. Linux binary (i.e. execute at your own risk).

tags | exploit, denial of service
systems | linux
SHA-256 | b60fdf11aef66f2d86a47aeb9709ad31d7e13911ec206a521470d74cf21657bd
gin.c
Posted Aug 17, 1999
Authored by amputee

Spoofs ICMP packets containing +++ATH0 which will cause some modems to disconnect.

tags | exploit, spoof
SHA-256 | f15e06ea3d66d30a4a8a5a638f80b1caa86ea8c99ec064e1fa77b49c783438cb
gscan.c
Posted Aug 17, 1999
Authored by marv alpert

A generic banner scanner that can be modified to scan remote systems for banners of any vulnerable software programs desired.

tags | exploit, remote
SHA-256 | b8f3ec36c74322cbb8e0747941d7ee364b71e7ad9d8eb8b37d28b52e78b12310
gscan.zip
Posted Aug 17, 1999
Authored by bzero

gscan is a generic banner scanner for windows, class A greps for any banner on any port. For Windows.

tags | exploit
systems | windows
SHA-256 | c3f1222f8132172fb9cef0ff3a47ee941d0d8c1b0a19cd5c66dcdbb5d6d32a72
hv-cf.pl
Posted Aug 17, 1999
Authored by d0ct0r_x

Perl script that scans a given list of hosts for Cold Fusion security vulnerabilities.

tags | exploit, perl, vulnerability
SHA-256 | 5f21a5f8109fdb84ad646ea46be3e56e77fbc14b708cd86f85e69a52bac4c914
iis.injector.c
Posted Aug 17, 1999
Authored by Greg Hoglund

IIS Injector for NT is a custom C port (for Windows NT) of the eEye NT4+IIS4 URL buffer overflow remote exploit that allows the attacker to select any desired "payload file" for targets.

tags | exploit, remote, overflow
systems | windows
SHA-256 | cf07c27e07c4631471fc40c39ed847d5e17110a03f3f8f3716659e58cb1a7386
iis4.htr-2.pl
Posted Aug 17, 1999
Authored by Randal Schwartz

Perl exploit code port of the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow, perl
SHA-256 | f419657a242d3e5d91e6007bb9d04c2045f4df844e3d09e70230dffda4f888ad
iis4.htr.pl
Posted Aug 17, 1999
Authored by Ryan R Permeh

Perl exploit code port of the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow, perl
SHA-256 | 451a7cea47a609441f25a7c9436144c327157cbda93b944daf70e75fd5fba0b8
iishack.asm
Posted Aug 17, 1999
Authored by eEye Digital Security

asm source code for the eEye NT4+IIS4 URL buffer overflow remote exploit. Use with one of the ncx* files.

tags | exploit, remote, overflow
SHA-256 | 11759f245563a0a577e93805db9657a7e367501a6b60fb28aa65fcb2ed054e04
iishack.exe
Posted Aug 17, 1999
Authored by eEye Digital Security

Executable eEye NT4+IIS4 URL buffer overflow remote exploit program. Use with one of the ncx* files.

tags | exploit, remote, overflow
SHA-256 | d285726fc63c31e1e2f636ea8777450b6d158051c05201b7d4200dc46f474b37
iusr_bug.txt
Posted Aug 17, 1999

Security hole in Windows NT 4 Server and Microsoft IIS allows any Internet user (IUSR_COMPUTER) to change any users password, including the administrator password. Root compromise. No fix yet.

tags | exploit, root
systems | windows
SHA-256 | b9bc1d482dfd500af3712ba8c0d5b923354b7d8747117294b47200c8a254dee8
kde.kmail.tmp.dir.txt
Posted Aug 17, 1999

KDE K-Mail mail user agent software creates insecure temporary directories that allow local attackers to use symlink-based exploits to gain privileged, potentially root, access. KDE patch available.

tags | exploit, local, root
SHA-256 | 5af14f4df9c73108034bed388958c19388356f5d032b97bee6e6843715cf8e0a
Page 2 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close