exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files Date: 2000-09-28

netscape.overflow.txt
Posted Sep 28, 2000
Authored by Michal Zalewski

Netscape Navigator is vulnerable to trivial, remote buffer overflow attack when viewing prepared html.

tags | exploit, remote, overflow
SHA-256 | 5e00530a07bbcee85e83bc7a5a9c024d8a58a576c2617200505e8c4098a74b86
siemens.ipphone.txt
Posted Sep 28, 2000
Authored by Michal Zalewski

The Siemens HiNet LP 5100 IP-phone is vulnerable to a buffer overflow when the GET request method is used with a large request size. Vulnerability can lead to a partial or complete crash of phone services.

tags | exploit, overflow
SHA-256 | c2c3fa55e9b3b0ea73526601681a57f6551de6e2ac82d72450d780945bdf8d14
DST2K0042.txt
Posted Sep 28, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0042 - The following vulnerability in Web+ Application Server under Linux has been discovered. Severity: High. If the default example scripts are installed it is possible to execute/read any file which Web+ user (default is 'nobody') has access to using the Web+Ping example.

tags | exploit, web
systems | linux
SHA-256 | 10156497169d749f0c7bbb71908785ef25e60f8c034c4b9d631b5d3ebeb6ffdd
DST2K0037.txt
Posted Sep 28, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0037 - It is possible to bypass the quotas imposed by QuotaAdvisor by utilizing data streams alternative to the default.

tags | exploit
SHA-256 | 1ed58d9fff73920bf7e048bdf48b1e78c46ea96d5ee17b5f33fc69a1e9e5dde5
DST2K0032.txt
Posted Sep 28, 2000
Authored by Delphis Security Team | Site delphisplc.com

DST2K0032: Multiple Issues with Talentsoft WebPlus Application Server. Delphis Consulting Internet Security Team (DCIST) discovered low to medium severity vulnerabilities in Webplus under Windows NT.

tags | exploit, vulnerability
systems | windows
SHA-256 | ffc1c16883ca0443a77b4ee6a8af25d3b21541d176140bab9d1b83fa8a7d5a3b
innd.c
Posted Sep 28, 2000

INND/NNRP remote root overflow. Overflow occurs in the From: field. Affects INND/NNRP versions prior to 1.6.X. Author Unknown.

tags | exploit, remote, overflow, root
SHA-256 | f582b0dbe582c4971e25beb245771601cc1da7879d6ed9a6db889e574050df2a
linstatex.c
Posted Sep 28, 2000

Remote root overflow for linux rpc.statd SM_UNMON_ALL vulnerability. Author Unknown.

tags | exploit, remote, overflow, root
systems | linux
SHA-256 | 0fa89b935371a6e8bab5da0f4bbeb45ce6c63d141c65937a71cff963492e018c
rudp.c
Posted Sep 28, 2000
Authored by Crashkiller

GDM Remote Exploit based on the original bug found by Chris Evans. Vulnerable version : gdm-2.0beta2-23 ( gnome and single version ). Not Vulnerable : 1.0.0.35. Vulnerable Platforms : RedHat 6.0-6.2.

tags | exploit, remote
systems | linux, redhat
SHA-256 | 364b987dc6db265a353592620b92a038c7f3f9dac015ffe2adf1d4b0ff39fb4d
fi.sh
Posted Sep 28, 2000
Authored by Narrow

FlagShip (from Red Hat Application CD) is a Database Development System for xBase based applications on nearly all Unix brands. Problem: /usr/bin/FSserial is world-writeable! We can replace it with an trojan and trick root to execute it. OS affected: Red Hat 6.0.

tags | exploit, root, trojan
systems | linux, redhat, unix
SHA-256 | 19ec639c4df2decbde6f63cfae923d411bbd61a95d9c9e35e587b731bab241fe
axur.c
Posted Sep 28, 2000
Authored by Gustavo Scotti

Q-POP 2.53 Remote Overflow.

tags | exploit, remote, overflow
SHA-256 | 14f6333c3c41bb98f3702483bc222cd3f6e4d37561678fe062e9b9603a08b0c4
xloadx.c
Posted Sep 28, 2000
Authored by Doable | Site members.tripod.com

Sco 5.0.4 local overflow using xload.

tags | exploit, overflow, local
SHA-256 | 26c0673ca3e5ed50a659abc51601d26e465b764f32a72fccf73af3db0b9d4c2d
wu30.c
Posted Sep 28, 2000
Authored by Doable

Remote root exploit for wu-ftpd on SCO unix. Based on: ADMwuftpd.c from duke.

tags | exploit, remote, root
systems | unix
SHA-256 | 3add4443742c9fcacd8dc6325d153bd5568353359be857dbe2a37fc3e90a1fc0
wu-lnx.c
Posted Sep 28, 2000
Authored by vsz_

Linux wu-ftpd - 2.6.0(1) (tested on RH6.2 wu from rpm).

tags | exploit
systems | linux
SHA-256 | 14dff92e74767741dadcd3056c2c5592a7e7d2e104e9a68e56325ed023e7afbe
tsql.c
Posted Sep 28, 2000

Msql local overflow. Author Unknown.

tags | exploit, overflow, local
SHA-256 | 81796ff3a161a4cde169f1cb7ef819ce2c73aa637619778652826eaeb3db1e5d
xsunsploit.c
Posted Sep 28, 2000
Authored by DiGiT

Solaris 7 Xsun(suid) local overflow - Solaris 2.7/(2.6?) x86 sploit no sparc code.

tags | exploit, overflow, x86, local
systems | solaris
SHA-256 | e14c2c1b5cb8a44823088162f42622b3a6b9199ed68b1d7dde4508dc148dcd0d
sco-httpx.c
Posted Sep 28, 2000

Scounix httpd Remote Exploit.

tags | exploit, remote
SHA-256 | 2c39cd377679ecd20589d8a506037fa51a0ab54473f32e86a9cb4167b478f1b9
qpop3b.c
Posted Sep 28, 2000

QPOP 3.0beta AUTH remote root stack overflow (linux x86 version)

tags | exploit, remote, overflow, x86, root
systems | linux
SHA-256 | 905a3984c06a90ecd9866f95685473b2f7637effc7d820cf853eac4b8f2ce274
cxterm.c
Posted Sep 28, 2000

Local exploit for cxterm 5.1-p1. Tested on: RedHat 5.2/6.0, Slackware 3.6.

tags | exploit, local
systems | linux, redhat, slackware
SHA-256 | e93169ce12af85a371410989f4a2cd00e8d61b6dd974524f5580d3fb1f40e964
12250.c
Posted Sep 28, 2000
Authored by Delorean

IMAPrev1 12.2xx exploit (lsub bug). Slackware 4.0 remote overflow.

tags | exploit, remote, overflow
systems | linux, slackware
SHA-256 | a840f6b4a1f6f8925d0503bb5b5f670d7c5af5465aa574892d4e1771507ffe24
winshellcode.h
Posted Sep 28, 2000
Authored by sunx | Site cnns.net

WinShellCode. win32 portbinding shellcode.

tags | exploit, shellcode
systems | windows
SHA-256 | 4359c1d127a45198387c46cccc11eb6234af6fa024f2e4666bbbb918a9669a75
A092600-1
Posted Sep 28, 2000
Authored by Kingpin | Site atstake.com

Atstake Security Advisory - PalmOS Password Retrieval and Decoding. Severity: Moderate. PalmOS offers a built-in Security application which is used for the legitimate user to protect and hide records from unauthorized users by means of a password. Passwords can easily be obtained and decoded allowing an attacker to access all private records on a Palm device.

systems | palmos
SHA-256 | 605b134f485bfa1453bdfd428bc29ebf0cd76aa76b8b91cd4a84f25e95ed0c2d
unixware.scohelp.txt
Posted Sep 28, 2000
Authored by Ivan Arce | Site core-sdi.com

CORE SDI Security Advisory - SCO Unixware 7 default installation includes scohelp, an http server that listens on port 457/tcp and allows access to manual pages and other documentation files. The search CGI script provided for that purpose has a vulnerability that could allow any remote attacker to execute arbitrary code on the vulnerable machine with privileges of user "nobody".

tags | remote, web, arbitrary, cgi, tcp
systems | unixware
SHA-256 | f680f55bfc32747ee179bacde9f8d0a084560d975d1acee0c089638742207f41
ipgen.tgz
Posted Sep 28, 2000
Authored by BigHawk

IP-Generator is a program that can be used for the creation of long ip lists that are necessary for various utilities which require said listings.

tags | tool
systems | unix
SHA-256 | 54cabd7bfec1bbeb8519e72bf2ff1bae9bbad62a28443fa345ea7df358a26959
FreeBSD Security Advisory 2000.53
Posted Sep 28, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory - catopen() may pose security risk for third party code. The catopen() function did not correctly bounds-check an internal buffer which could be indirectly overflowed by the setting of an environment variable. A privileged application which uses catopen() could be made to execute arbitrary code by an unprivileged local user. The catopen() and setlocale() functions could be made to use an arbitrary file as the source for localized data and message catalogs, instead of one of the system files. An attacker could create a file which is a valid locale file or message catalog but which contains special formatting characters which may allow certain badly written privileged applications to be exploited and execute arbitrary code as the privileged user. Patches are available.

tags | overflow, arbitrary, local
systems | freebsd
SHA-256 | 7cb98675a822bc8edd2fd3f6bd3b7b4a6cf3569063738705e6b569c0c74c79bf
NDiff-0.03.tar.gz
Posted Sep 28, 2000
Authored by James Levine | Site vinecorp.com

NDiff compares two nmap scans and outputs the differences. It allows monitoring of your network(s) for interesting changes in port states and visible hosts. NDiff should be useful to network administrators, security analysts, and other interested parties who need to monitor large networks in an organized fashion.

Changes: Performance improvements to the ndiff program. Tweaks/workarounds to silence pod2man complaints when installing. These changes have not been heavily tested. You are hereby warned.
tags | tool, nmap
systems | unix
SHA-256 | 9972d8b39599589019567236844c30ea8201f40105147f24b065d8b0658dd263
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close