exploit the possibilities
Showing 1 - 25 of 42 RSS Feed

Files Date: 2000-05-17

netopia.advisory.r9100
Posted May 17, 2000
Authored by Steve Friedl

The Netopia R9100 permits a user not authorized with a special security password to neverthless modify the SNMP community strings, including enabling SNMP access that should be disabled.

tags | exploit
MD5 | bfc4f59f410bc5cd989c93e746833946
lids-0.9.4-2.2.15.tar.gz
Posted May 17, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Additional checking is done when adding acls, fixes when the kernel is reading lids.conf, fixes for inherit and no_inherit flags, and fixes for lidsadm.
tags | kernel, root
systems | linux
MD5 | 7abb011e2788c0c7e242f97d7038198a
preventing.worms
Posted May 17, 2000
Authored by Woody Thrower, Stan Burnett, Gary Wahlquist | Site www2.axent.com

Prevent Current and Future E-Mail Worms.

tags | worm
MD5 | ccb29df3cab7315b7bbe73ebc5426747
Emurl2.0.windows
Posted May 17, 2000

Users can access the mailbox's content of anybody on the system. They can also steal their POP passwords since Emurl allows you to fetch your POP email from more than one source.

tags | exploit
MD5 | c854c11701ebd63ca453e8f85947aff4
tcpstat-1.2.tar.gz
Posted May 17, 2000
Authored by Paul Herman | Site frenchfries.net

tcpstat reports certain network interface statistics much like vmstat does for system statistics. It gets its information by either monitoring a specific interface, or by reading previously-saved tcpdump data from a file.

Changes: Solaris support, a couple new features and bug fixes.
tags | tool
systems | unix
MD5 | adb9a513e7393ef77b1dc22208a59bc0
Banner.rotating
Posted May 17, 2000
Authored by Zillion | Site safemode.org

A file called adpassword.txt is world readable as it is assigned the wrong permissions. This will allow a malicious attacker to read the contents of the file, to crack the DES encrypted password it contains (using a common-or-garden password cracker), and to edit banner entries,to add or to remove banners.

tags | exploit
MD5 | f14c2253d94b28844892aa0865a6d3c1
DoS-CProxyv3.3
Posted May 17, 2000
Authored by TDP

Remote Denial of Service for CProxy v3.3 - Service Pack 2. This program xploits an overflow vulnerability in CProxy 3.3 SP2 HTTP Service (8080), causing server shutdown.

tags | exploit, remote, web, denial of service, overflow
MD5 | f49a2c47ec6a0437c9ee7590a95682b9
cisco760.c
Posted May 17, 2000
Authored by Tiz.Telesup

Cisco 760 Series Connection Overflow. Affected Systems: Routers Cisco 760 Series. Others not tested.

tags | exploit, overflow
systems | cisco
MD5 | a4074a92cb0b32eac9e0680403c56ee5
calendar.pl.vuln
Posted May 17, 2000
Authored by Suid | Site suid.kg

Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | exploit, remote, web, arbitrary
MD5 | a5c2a8bd20fdd39774c7f5e722ef9054
cisco.00-05-14.http
Posted May 17, 2000
Site cisco.com

A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled and browsing to "http://<router-ip>/%%" is attempted. This defect can be exploited to produce a denial of service (DoS) attack. This defect has been discussed on public mailing lists and should be considered public information.

tags | exploit, web, denial of service
systems | cisco
MD5 | 177d2675ccf94d2117289316882510d8
sses-sshauth.txt
Posted May 17, 2000
Site sses.net

A vulnerable secure shell distribution is available from the popular Zedz Consultants FTP site (formally known as replay.com). The RedHat Linux RPM ssh-1.2.27-8i.src.rpm contains a PAM patch which contains faulty logic allowing users to essentially pass through the username/password authentication step and gain shell access.

tags | exploit, shell
systems | linux, redhat
MD5 | 95b80c63f273743306ae2cf0b0b7b355
ACROS-2000-04-06-1-PUB
Posted May 17, 2000
Site acros.si

Bypassing Warnings For Invalid SSL Certificates In Netscape Navigator.

tags | exploit
MD5 | 1f30c5620c1a04acf9b16c06972bc5d0
nolove.mz
Posted May 17, 2000
Authored by Michal Zalewski

"I don't think I really love you" or writing internet worms for fun and profit.

tags | worm
MD5 | a1bf3c9a055dd560d416ffd234081b6d
lpset.overflow
Posted May 17, 2000
Authored by Tim Newsham

Here's an overflow exploit that works on a non-exec stack on x86 boxes. It demonstrates how it is possible to thread together several libc calls.

tags | exploit, overflow, x86
MD5 | b5495c00069db7ae509aaabe0a85a00f
nhc.20000504a.0
Posted May 17, 2000

New Hack City Advisory 20000504a.0 - It is possible to cause a kernel panic on systems running NetBSD by sending a packet remotely with an unaligned IP Timestamp option.

tags | kernel
systems | netbsd
MD5 | 28d0acc8603e94700026a54b309aebe1
netbsd.2000-002.dos
Posted May 17, 2000

Receipt of IP packets with certain sequences of malformed IP options can cause an unaligned access in kernel mode (on many architectures), or data corruption, resulting in a panic or other problems.

tags | denial of service, kernel
systems | netbsd
MD5 | 4adc8d2c9c8b146cd95d4d82ee193741
windows2k.iss
Posted May 17, 2000
Authored by Frankie Zie

There is a security problem with shtml.exe that allows anyone to explore the local path of IIS web server.

tags | exploit, web, local
MD5 | 2bfb2f40d7fa6bb529cc10be19c8cc68
DoS.cayman
Posted May 17, 2000
Authored by Cassius

Simple DOS attack against Cayman 3220-H DSL Router. Large username or password strings sent to the Cayman HTTP admin interface restart the router. Router log will show "restart not in response to admin command".

tags | exploit, web
MD5 | 194c4a27201837171c673ec3a3e699f0
CISADV000505.txt
Posted May 17, 2000
Authored by Mark Litchfield | Site cerberus-infosec.co.uk

Cerberus Information Security Advisory (CISADV000505) - The Cerberus Security Team has found a remotely exploitable buffer overrun in Netwin's (http://netwinsite.com) DNewsWeb (dnewsweb/dnewsweb.exe v5.3e1), CGI program designed to give access to NNTP services over the world wide web. By supplying a specially formed QUERY_STRING to the program a buffer is overflowed allowing execution of arbitrary code compromising the web server.

tags | exploit, web, overflow, arbitrary, cgi
MD5 | 500263d39a9084e9ed662daab5b46a97
nai.00-05-04.trendmicro
Posted May 17, 2000
Site nai.com

Network Associates, Inc. COVERT Labs Security Advisory - An implementation flaw in the InterScan VirusWall SMTP gateway allows a remote attacker to execute code with the privileges of the daemon.

tags | exploit, remote
MD5 | 67a4233dea0d01b39c8e425743cc1d4b
CISADV000504.txt
Posted May 17, 2000
Authored by David Litchfield | Site cerberus-infosec.co.uk

Cerberus Information Security Advisory (CISADV000504) - The Cerberus Security Team has found a remotely exploitable buffer overrun in Netwin's (http://netwinsite.com) DMailWeb (dmailweb/dmailweb.exe v2.5d), CGI program designed to give access to a user's SMTP and POP3 server over the world wide web. By supplying a specially formed QUERY_STRING to the program a buffer is overflowed allowing execution of arbitrary code compromising the web server.

tags | exploit, web, overflow, arbitrary, cgi
MD5 | a3de0113aa1439d17bbd1598d25db6c0
pdscanner-0.99.0.tar.gz
Posted May 17, 2000
Authored by Scott G | Site maul.viptx.net

PDscanner is a UNIX based graphical port scanner which uses GNOME. Screen shot available here.

tags | tool, scanner
systems | unix
MD5 | 266149597881168dcb6fef3e61cf92f3
CISADV000503.txt
Posted May 17, 2000
Authored by David Litchfield | Site cerberus-infosec.co.uk

Cerberus Information Security Advisory (CISADV000503) - The Cerberus Security Team has found a remotely exploitable buffer overrun in Lsoft's (www.lsoft.com) Listserv Web Archive component (wa/wa.exe v1.8d - this is the most recent version.

tags | exploit, web, overflow
MD5 | 8f73c44aa47ea7ae3b706aa5ec72a63f
vtun-2.2.tar.gz
Posted May 17, 2000
Authored by Maxim Krasnyansky | Site vtun.sourceforge.net

VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It is a user space implementation and doesn't need modification of any kernel parts. VTun supports IP, PPP, SLIP, Ethernet, and other tunnel types. VTun is easily and highly configurable; it can be used for various network tasks like VPN, Mobil IP, Shaped Internet access, Ethernet tunnel, IP address saving, etc.

Changes: Support for the new OpenBSD tun driver, improved generic tun driver support, documentation updates and bug fixes.
tags | tool, kernel, tcp, firewall
systems | unix
MD5 | 652697a422dd33c27dc161e23c958978
arping-0.2.tar.bz2
Posted May 17, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

tags | tool
systems | unix
MD5 | cf47b3d5a46ecc5ae1e15ccbc3a364a2
Page 1 of 2
Back12Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    9 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close