exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files

ODBC_vuln.txt
Posted Oct 12, 1999

A patch to fix a number of ODBC vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 55e4dbb55835d40f100bd9112d62f2e2efeacc68d10d449ffd098ceda133aa4e
showfile.c
Posted Oct 12, 1999
Authored by Obocaman / OiOiO's Band, 1999

This program will read any file from any NT Server, if the SHOWCODE.ASP script is present. Compile -DSPANISH for the spanish version!!

tags | exploit, asp
SHA-256 | 77d01f32c9be3d63742efac89cd45d47b428c7fb24e8525285ef0acaa786f929
Hybrid_network_cable_modems.txt
Posted Oct 7, 1999

Remote attackers can anonymously reconfigure any Hybrid Network's cable modem running HSMP.

tags | exploit, remote
SHA-256 | fba4ceed238aa38474d25bcca294b76bebb7bd9fcfa00c44645e0dc301832253
inews.c
Posted Oct 7, 1999
Authored by bawd

Buffer overflow in inews gives egid inews.

tags | exploit, overflow
SHA-256 | 8bb19288490f427718791b2b774d580f8803ac2c4b7666e7abecaba1956b4039
ex_canuum.c
Posted Oct 7, 1999
Authored by Unyun | Site shadowpenguin.backsection.net

I found the security vulnerability in canumm Japanese Kana-Kanji FEP. This program is installed on Turbolinux series with default. /usr/jp/canna/bin/canuum is a suid program. It overflows if the long argment is specified with many kind of options such as -k, -c, -n. I coded an exploit for the Linux, the local user can obtain a root privilege.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | 541df7e6ab602ad5a839835c476c08199b3ad305b9c2ab1b0611a680b6196c18
SCO_root_exploit.txt
Posted Oct 6, 1999

A vulnerability exists in the /usr/lib/merge/dos7utils program (suid root by default) which allows any user to execute any command as root. The dos7utils program gets its localeset.sh exec path from the environment variable STATICMERGE. When setting this to a directory writable by us and setting the -f switch, we can have dos7utils run anything we like.

tags | exploit, root
SHA-256 | 523e17bd4c242e330451f3ece72c0bf4c05ae388526ac066671686623e39f2d4
Omni-NFS_DoS.txt
Posted Oct 6, 1999

The nfs daemon (nfsd.exe) used by Omni-NFS/X will jump to 100% cpu usage if you scan it using nmap with ether the -O (OS detect ) or the -sS ( TCP SYN (half open)).

tags | exploit, denial of service, tcp
SHA-256 | f571fadeb86f687031222c0868e94f400ac5c983834a352a42a5f98a3f441bed
RH6_rpmmail_exploit.txt
Posted Oct 5, 1999

Root exploit for the rpmmail vulnerability in Red Hat 6.0. A vulnerability exists in the rpmmail package distributed on the Red Hat 6.0 Extra Applications CD. The potential compromise for this bug could be remote or local root or simply remote command execution as "nobody" or similar, depending on your system configuration.

tags | exploit, remote, local, root
systems | linux, redhat
SHA-256 | 2cdcf4abe1c6a4a8a7e75b47b916948aa173b33e93083ee15cadd95a85556788
Sambar_DoS.txt
Posted Oct 5, 1999

Sample denial of service attack against the Sambar HTTP-Server 4.2.1 running on Windows95

tags | exploit, web, denial of service
SHA-256 | 525b31fe0c35c900a3355b9822171065bf4356f4d474e7f5c7beb021df4ae167
cdda2cdr_bof.txt
Posted Oct 5, 1999

A root compromise is possible using a buffer overflow in the cdda2cdr package cdwtools-0.93.78

tags | exploit, overflow, root
SHA-256 | 32b79c5ea9a8b96c79c9a0fe7f9925deece4eff4936063bb2e95cb25d98fa8b8
singhack.exe
Posted Oct 4, 1999
Authored by CKS

This win95/98 program allows you, if you know the username of your target at Singapores biggest provider, Singnet. It will pull their monthly statistics which include, the phone number he called from, all his logins & logouts etc. Singhack exploits a bug which is in one of Singnets perl script which they havent fix it yet.

tags | exploit, perl
systems | windows
SHA-256 | ca431c0652a0d4e039e81b7003358a59b4f62df4401c33dce60acc512daacf2d
09-16-99-ihtml.txt
Posted Oct 2, 1999
Authored by David Meehan | Site team-asylum.com

iHTML Merchant is an e-commerce solution written in iHTML. A vulnerability in the processing of the feedback form allows remote users to delete files, upload files, and execute files. A vulnerability in iHTML Merchant allows remote user to execute arbitrary code on the iHTML Merchant system. Patch included.

tags | exploit, remote, arbitrary
SHA-256 | 69e60931d42d4e87a4ce6938e424163d5fea473534460576789b9aadae5ab685
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close