exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Prizm

First Active2000-04-10
Last Active2000-07-18
alibaba.txt
Posted Jul 18, 2000
Authored by Prizm

Alibaba is a http server for Windows 95/98/NT which contains buffer overflows and allow remote users to execute commands remotely.

tags | exploit, remote, web, overflow
systems | windows
SHA-256 | b99bb1a99ff7c7b7a142a18a90997c406e9cfb78dc1e3847ae576d5ecfc3d442
telsrv.txt
Posted Jul 17, 2000
Authored by Prizm

GAMSoft's TelSrv 1.4/1.5 contains a remote denial of service vulnerability. If supplied with a very large login name, the service will crash.

tags | exploit, remote, denial of service
SHA-256 | d31d36019b70a0193ce995c7d0dfaa0d973ba38791905be7948fcc5321627aab
webactive.txt
Posted Jul 13, 2000
Authored by Prizm

WEBactive HTTP Server 1.00 contains a remote denial of service vulnerability.

tags | exploit, remote, web, denial of service
SHA-256 | ca5a37e29e841a8b18f78b3913ad716c1f7d2dbc7b9f677c7884e51fc83856d8
smallhttp.py
Posted Jun 30, 2000
Authored by Prizm

Small HTTP Server v. 1.212 remote dos attack written in python. See USSR Advisory #47

tags | exploit, remote, web, python
SHA-256 | 11c239d025641221ada67a8d32f1ccac084f73043f688e12cde0d50bb4474059
dragonftp.py
Posted Jun 30, 2000
Authored by Prizm

Dragon Server(ftp) v1.00 and 2.00 remote dos exploit written in python.

tags | exploit, remote, python
SHA-256 | 161f1c0a962d27fd9ff4d56e9ddfef936d703b88db55129895e32136299af0d8
wingate.py
Posted Jun 29, 2000
Authored by Prizm

Wingate.py is a dos exploit for Qbik wingate 3.0. Connects to tcp port 2080 and sends 2000 characters, causing all wingate services to crash. Origional bug found by eEye.

tags | exploit, tcp
SHA-256 | afd3c1b45990cec90d6d28919ea835f444a7fef236f733a9dc69806fde9832f3
b0f5-Qpopper.txt
Posted May 24, 2000
Authored by Prizm | Site b0f.freebsd.lublin.pl

BufferOverflow Security Advisory #5 - Remote shell via Qpopper2.53. qpop_euidl.c exploit included. Requires a qpop account and gives UID mail.

tags | exploit, remote, overflow, shell
SHA-256 | 3b9258be6be245c764411f6a0fb9887e6d3353efa7d0f966e6a4b94561a41ad0
IRIX.Login.Security.txt
Posted Apr 10, 2000
Authored by Prizm

IRIX Login Security - In this paper you will learn a bit about logins, and the seriousness of what could happen if you don't take certain precautions. You will have found out some options you can take with your logins, certain restrictions, and a lot more.

tags | paper
systems | unix, irix
SHA-256 | 35daa4e31eadc2e9835852cb680f16c18c3d63d83c32a3c93afa078dcdfd4718
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close