exploit the possibilities
Showing 1 - 25 of 161 RSS Feed

Files Date: 2002-05-01 to 2002-05-31

Posted May 30, 2002
Authored by AD Marshall

Yahoo! Instant Messenger (YIM) vulnerabilities. Affects Yahoo! Messenger v(5, 0, 0, 1061) for all Windows versions. Includes buffer overflow information and how to hijack another IM client.

tags | overflow, vulnerability
systems | windows
MD5 | 9bf072ddbc75053a21840a050f715a8d
Posted May 30, 2002
Authored by Martin J. Muench | Site codito.de

Small ICMP backdoor which works under BSD, Linux, and Solaris. Because you can define the icmp_code to use it is able simulate an echo_request <-> echo_reply conversation so it looks like a normal ping with bigger packets. It also includes a session_id to detect the right packets (which is also done by certain icmp_id's).

tags | tool, rootkit
systems | linux, unix, solaris, bsd
MD5 | d77f547863617b69e6206eb72c90fce2
Posted May 30, 2002

Microsoft Security Advisory MS02-025 - A malformed mail can cause Exchange 2000 to eat up all CPU resources. Microsoft patch available here.

MD5 | 00a5429e6ad8ab5254d1677cb39f4e60
Posted May 30, 2002
Authored by David Litchfield | Site ngssoftware.com

Macromedia JRun v3.1 for IIS 4/5 on WinNT 4/Win2K contains buffer overflow which allows remote code execution as the local system account.

tags | remote, overflow, local, code execution
systems | windows, nt
MD5 | daee1fa63c2a3e8339c48182cf86a8b8
FreeBSD Security Advisory 2002.27
Posted May 30, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:27 - The FreeBSD rc scripts allow users may remove the contents of arbitrary directories if the /tmp/.X11-unix directory does not already exist and the system can be enticed to reboot.

tags | arbitrary
systems | unix, freebsd
MD5 | 2ea504c46f51e35cc51cbbbcfa9e745b
FreeBSD Security Advisory 2002.26
Posted May 30, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:26 - FreeBSD kernels compiled with accept() filters are vulnerable to a denial of service condition.

tags | denial of service, kernel
systems | freebsd
MD5 | 10d481747322bc519f14546021875827
Posted May 29, 2002
Site www-eleves.iie.cnam.fr

Ivon is an encrypted shellcode generator. It uses 32bits key to perform a XOR. Polymorphic shellcode are very easy to create. They are very useful to pass through IDS for remote exploits. There is only 26 constant bytes in the encrypted shellcode.

tags | remote, shellcode
MD5 | 7f1e077852c76b1d50396fc93f7e8521
Posted May 29, 2002
Authored by M. Meadele | Site wpoison.sourceforge.net

Wpoison (May 28 snapshot) is a tool which attempts to find any SQL-injection vulnerabilities on a remote web document, finding bugs in dynamic content such as php and asp. Readme available here.

tags | remote, web, php, vulnerability, asp
MD5 | a3f98ae45b8cfdcd96d13c73b76bc2ad
Posted May 29, 2002
Site cert.org

CERT Quarterly Summary CS-2002-02 - Recent attack trends include exploitation of vulnerabilities in Microsoft SQL Server, Buffer Overflow in Microsoft's MSN Chat ActiveX Control, Heap Overflow in Cachefs Daemon (cachefsd), IIS, Oracle, and more.

tags | overflow, vulnerability, activex
MD5 | a4128a42b18994cc6abd8c451be8bde4
Posted May 29, 2002
Authored by Luigi Grandini, Skyrim

3CDaemon FTP Server v2.0 buffer overflow dos exploit.

tags | exploit, overflow
MD5 | e65fd71eb92068a7397b56ae8855aa34
Posted May 29, 2002
Authored by Luigi Grandini, Hsj

IIS 5.0 .asp buffer overrun remote exploit which runs cmd.exe. The .asp overflow is documented in ms02-018.

tags | exploit, remote, overflow, asp
MD5 | 39f8b5fbccb0aa6f4d417bbb98827c9f
Posted May 29, 2002
Authored by Christophe "korty" Bailleux, Kostya Kortchinsky

Imap4 prior to v2001a remote exploit for Linux. Requires user account, includes offsets for Slackware 7.1 and Redhat 7.2.

tags | exploit, remote
systems | linux, redhat, slackware
MD5 | 9e109c1318dce5900a74e98a0079f70a
Posted May 29, 2002
Authored by Devilnet

Trojodaemon is a simple tool which allows you to start a process at boot.

tags | tool, rootkit
systems | unix
MD5 | 4ee3bb29be054cab63922eb934cfec60
Posted May 29, 2002
Authored by Kago

WarFTPd v1.65 for Win2k remote buffer overflow exploit in win32 perl. Included shellcode pops up a message box.

tags | exploit, remote, overflow, perl, shellcode
systems | windows, 32
MD5 | 2f1e9c047c0f8fbc01c0fa7aaf0705c7
Posted May 27, 2002
Authored by Goldie, checksum | Site checksum.org

Secura is an open source cross platform java crypto package. Jar available here.

tags | java, crypto
MD5 | 50b3b3c45e546049362a105b3ca9b63c
Posted May 27, 2002
Authored by Tamer Sahin | Site securityoffice.net

The Falcon Web Server v2.0 for Windows 2000 allows remote users to gain read access of known password protected files residing on a Falcon Web Server.

tags | remote, web
systems | windows, 2k
MD5 | 39fbbdf3c448da5cf80f9935c4500b12
Posted May 27, 2002
Authored by George Dissios, Ioannis Houklis | Site frapes.org

Frapes is a Windows backdoor with many features, including the ability to edit the registry. Includes source for a unix client. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, registry
systems | windows, unix
MD5 | 4d7cb644cfd92f280dbe45b596b92f76
Posted May 27, 2002
Authored by Gael Roualland, Jean-Marc Saffroy | Site ippersonality.sourceforge.net

The IP Personality project is a patch to Linux 2.4 kernels that adds netfilter features: it enables the emulation of other OSes at network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting. The characteristics that can be changed are TCP Initial Sequence Number (ISN), TCP initial window size, TCP options (their types, values and order in the packet), IP ID numbers, answers to some pathological TCP packets, and answers to some UDP packets.

Changes: Ported to Linux 2.4.18 / iptables 1.2.2.
tags | remote, kernel, udp, tcp
systems | linux
MD5 | 881fec3573f5810dc722bb1fd96fc970
Posted May 25, 2002
Authored by Michal Zalewski | Site razor.bindview.com

Fenris is a multipurpose tracer, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics by providing a structural program trace, general information about internal constructions, execution path, memory operations, I/O, conditional expression info, and much more. A small demonstration how this tool works can be found here.

Changes: Interactive debugging capabilities introduced and added burneye tracing.
tags | protocol
MD5 | 0b76e98eddacbfae87f9c708e87671a2
Posted May 25, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:092-11 - A buffer overflow vulnerability has been found in the WU-IMAP daemon prior to v2001a which can be used to remotely execute code via malformed requests if the attacker has a valid IMAP account. This affects Red Hat 6.2, 7.0, 7.1 and 7.2.

tags | overflow, imap
systems | linux, redhat
MD5 | 559e3ab1cdba14bba00635fd2c897253
Posted May 25, 2002
Site distro.conectiva.com.br

Conectiva Security Advisory CLA-2002:489 - A cross-site scripting vulnerability found in Mailman v2.0.11 affects Conectiva Linux versions 6.0, 7.0 and 8.

tags | xss
systems | linux
MD5 | d32efbbca8e3f7ed0e555c3ef162804e
Posted May 25, 2002
Authored by Zillion | Site safemode.org

Local exploit for the Sendmail 8.12.3 and below flock denial of service vulnerability.

tags | exploit, denial of service, local
MD5 | 7cee23161ef73a980d225d0f55c73258
Posted May 25, 2002
Authored by lumpy, Gregory Neil Shapiro | Site sendmail.org

Sendmail v8.12.3 and below contains a local denial of service vulnerability in the file locking functions. Corrected in sendmail v8.12.4.

tags | denial of service, local
MD5 | c6de887b95c557939fa3c1c9394836f4
Posted May 25, 2002
Site cisco.com

Cisco Security Advisory - A vulnerability found in the web interface that comes with the Cisco ATA 186 Analog Telephone Adaptor be used to remotely disclose passwords by retrieving the router config via a specially crafted POST request.

tags | web, telephony
systems | cisco
MD5 | 75fbb19b5f876c5bdbac50ebafe9176e
Posted May 25, 2002
Site cisco.com

Cisco Security Advisory - Three new denial of service vulnerabilities involving large packets have been found in Cisco routers that are running the CBOS software. This affects the following Cisco devices: 605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678.

tags | denial of service, vulnerability
systems | cisco
MD5 | e15833ccbf8a5ab9f5a58121cdd65b31
Page 1 of 7

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By