exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files Date: 1999-10-06

SCO_root_exploit.txt
Posted Oct 6, 1999

A vulnerability exists in the /usr/lib/merge/dos7utils program (suid root by default) which allows any user to execute any command as root. The dos7utils program gets its localeset.sh exec path from the environment variable STATICMERGE. When setting this to a directory writable by us and setting the -f switch, we can have dos7utils run anything we like.

tags | exploit, root
SHA-256 | 523e17bd4c242e330451f3ece72c0bf4c05ae388526ac066671686623e39f2d4
Omni-NFS_DoS.txt
Posted Oct 6, 1999

The nfs daemon (nfsd.exe) used by Omni-NFS/X will jump to 100% cpu usage if you scan it using nmap with ether the -O (OS detect ) or the -sS ( TCP SYN (half open)).

tags | exploit, denial of service, tcp
SHA-256 | f571fadeb86f687031222c0868e94f400ac5c983834a352a42a5f98a3f441bed
vetescan10-06-1999.tar.gz
Posted Oct 6, 1999
Authored by Vetesgirl

vetescan, a bulk vulnerability scanner. Includes, according to the documentation: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner), VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass (a b c scanner and getter), AMD (mass a b c scanner and getter), MOUNTD (mass a b c scanners/getter), many exploits, Fixes, and utils included. vscan.tcl wscan.tcl nmap.tcl. Changes in this version: Everything goes a lot faster and is more accurate, scans for rpmmail vuln, fixed the OS detection, removed nlockmgr scan as the exploit was a hoax, added vscan.tcl wscan.tcl and nmap.tcl (just pico nmap.tcl change the paths and load nmap.tcl in your egg.config).

tags | tool, remote, scanner, trojan
systems | unix
SHA-256 | 927a18ff5e44862790c3abc7db00d12c67ec273fa17eef2a8e0db009d6f1b34c
vetetcl.tar.gz
Posted Oct 6, 1999
Authored by Vetesgirl

vetetcl: TCL version of vetescan, for use with eggdrop.

tags | tool, scanner
systems | unix
SHA-256 | 7978e321996e5ad9137f11deb4fcc218f68ec5e26286ccd766b28c3a382a53c7
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close