what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2003-07-18

IIS-DoS.c
Posted Jul 18, 2003
Authored by Rizzy

Remote IIS 5.0 denial of service exploit that makes use of the stack based overflow in nsiislog.dll.

tags | exploit, remote, denial of service, overflow
SHA-256 | 44d770ea27a8490f768df00ddd53357cee60223940c04a835e294debe42339e3
shagg-0.2.0.tar.gz
Posted Jul 18, 2003
Authored by thc | Site thc.org

THC-Shagg is an application to bruteforce check digit algorithms. It analyzes a given list of serial numbers and tries to find a matching algorithm and its setup. If such a setup is found, THC-Shagg is able to generate (extrapolate) new serial numbers, e.g. VISA and MasterCard credit card numbers, EAN numbers, IMEI, UPC or even EFT routing numbers.

SHA-256 | beaebc61b99d81db0fc58c65787d826e2032df6e00662b4ca2b8413ed3611e9d
ex_bru.c
Posted Jul 18, 2003
Authored by Dvdman

Local root exploit for bru, or Backup and Restore Utility for Unix, that makes use of a stack overflow. Includes both Linux and FreeBSD targets.

tags | exploit, overflow, local, root
systems | linux, unix, freebsd
SHA-256 | afa4cb86c25ccd524dc32cd373bbf79e895145dd4fd8d42831a2f91bc8fc0f25
CA-2003-17.ciscoexp.txt
Posted Jul 18, 2003
Site cert.org

CERT Advisory CA-2003-17 - CERT announces that an exploit has been circulating for the denial of service attack against Cisco routers and switches.

tags | advisory, denial of service
systems | cisco
SHA-256 | fa0af4778d17e41df7ea8f2bf792a21ec1560902617a294199be862d998c9393
shadowchode.tar.gz
Posted Jul 18, 2003
Authored by L0cK

Remote exploit that will cause a denial of service against Cisco routers and switches. Warning: Broken.

tags | exploit, remote, denial of service
systems | cisco
SHA-256 | b71891bc30993e6966706f90564e4f9b83853b36b2f7b37f73045a53631830d8
tcpdump-3.7.2.tar.gz
Posted Jul 18, 2003
Site tcpdump.org

Tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities. Requires Libpcap.

Changes: Various code fixes.
tags | tool, sniffer
SHA-256 | 57d65d13bc4302634c3ef691392ac36a6a8919bb4af7265e422ac3ab66718ebe
Nmap Scanning Utility 3.30
Posted Jul 18, 2003
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Roughly 300 fingerprints were added or modified. New classification system implemented for the fingerprints. Various other updates.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 071e544d27a7d17915f0f5b5cade353e16bfcd3f2c72d68a1126dc9b64ca7bc5
Netterm-NetFTPD4.2.2.txt
Posted Jul 18, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

NetTerm-NetFTPD 4.2.2 suffers from multiple buffer overflows that can cause a denial of service against the server and possibly execute arbitrary commands.

tags | advisory, denial of service, overflow, arbitrary
SHA-256 | 5a306efd007be6e93b46a57ca18e8723f5dbb426b9df29199030f5864f8bfe0d
CA-2003-16.msrpc.txt
Posted Jul 18, 2003
Site cert.org

CERT Advisory CA-2003-16 - A buffer overflow vulnerability exists in Microsoft's Remote Procedure Call implementation. A remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service.

tags | advisory, remote, denial of service, overflow, arbitrary
SHA-256 | b9bb753690553d6b31adc50199b09cdd488ccbf24144a64753c7c243ee7add0a
win-rpc.txt
Posted Jul 18, 2003
Authored by The Last Stage of Delirium | Site lsd-pl.net

A massive security vulnerability has been discovered in all recent versions of the Microsoft operating systems. There is a buffer overflow vulnerability that exists in an integral component of any Windows operating system, the RPC interface implementing Distributed Component Object Model services, or DCOM, that allows remote attackers to obtain unauthorized access to vulnerable systems.

tags | advisory, remote, overflow
systems | windows
SHA-256 | a2ab7e1ad93e552958685d18447336ec08b35a14099950c3e45ea405d5917eaf
CA-2003-15.cisco.txt
Posted Jul 18, 2003
Site cert.org

CERT Advisory CA-2003-15 - A vulnerability in many versions of Cisco IOS could allow an intruder to execute a denial-of-service attack against a vulnerable device.

tags | advisory
systems | cisco
SHA-256 | af2755db813b1d4f9af9eda1bf413ce515f313ada93635dacefd03868b8b3d34
com.txt
Posted Jul 18, 2003
Authored by nic | Site 0x333.org

Advisory that discusses exploitation of the University of Minnesota Gopherd version 3.0.5 and below that makes use of the do_command() buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 41cd532c2317311e30c49cbcf529fbe61127eae9f335f83232fabbf1837663ed
ciscoIPv4.txt
Posted Jul 18, 2003
Authored by Cisco Systems PSIRT | Site cisco.com

Cisco Security Advisory: Cisco routers and switches running the IOS software are vulnerable to a denial of service attack. A rare sequence of crafted IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the input queue is full.

tags | advisory, denial of service
systems | cisco
SHA-256 | ef0504594a7ab6822dce58c8ba0c82480259ebe0b5d86f0f970b4e558f0f7b36
omniHTTPD2.10xss.txt
Posted Jul 18, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

omniHTTPD 2.10 suffers from cross site scripting vulnerabilities that could lead to session hijacking.

tags | advisory, vulnerability, xss
SHA-256 | 52b5848c269b6da5f3724ecbe6e5ea940b8b8a3fbcfd5bff25bae930f4ebc792
HexView Security Advisory 2003-07-02.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030702-01-P - It has been reported that logging into an IRIX 6.5 machine while particular environment variables are set can lead to /usr/lib/iaf/scheme dumping core. Since scheme is suid root, this could potentially lead to a root compromise.

tags | advisory, root
systems | irix
SHA-256 | cf55ec3e1e580ca7b85e91d22604fd9c68c6799680b2b730027f68cf4fe308de
HexView Security Advisory 2003-07-01.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030701-01-P - Multiple vulnerabilities have been found in the Name Service Daemon, or nsd, on IRIX below version 6.5.21.

tags | advisory, vulnerability
systems | irix
advisories | CVE-2003-0176, CVE-2003-0177, CVE-2003-0572, CVE-2003-0573
SHA-256 | b6218821e51de97c515742f76bc0a7393297d398e8dfbefd71584ac16e407bec
ZH2003-11SA.txt
Posted Jul 18, 2003
Authored by Trash-80 | Site zone-h.org

Zone-H Security Advisory ZH2003-11SA - Elite News version 1.0.0.0-1.0.0.3 Beta allows direct access to various system files which enables an attacker to retrieve the administrator login name, then utilize that name on another page to set a cookie that will be referenced by yet another page that allows an attacker to post as the administrator.

tags | exploit
SHA-256 | 15b0010175329a204e9968c5e50f2759f6d246f310258aa395f5fc303d0bc6e8
thorISA.txt
Posted Jul 18, 2003
Authored by Thor Larholm

The Microsoft Internet Security and Acceleration, or ISA, server contains a default error page that can be used to conduct cross site scripting attacks against a legitimate user.

tags | advisory, xss
SHA-256 | 28d4e09c66a69895f688844fb1bccd3d2a1a91ee3d29b78564222eda4b3156f0
splatt.txt
Posted Jul 18, 2003
Authored by Black Angels, Nemesis

The Splatt Forum engine allows html code insertion for the post icon form input.

tags | exploit
SHA-256 | 6a997a7fd6c6056a6317e6c215a6608c822b8076ec2b127e14bf5b37bb4e7d46
diginews.txt
Posted Jul 18, 2003
Authored by Arnaud Jacques | Site securiteinfo.com

Digi-news and Digi-ads version 1.1 allow administrative access without a remote attacker having knowledge of the account password by keeping necessary credentials client-side in a cookie. Essentially, as long as an attacker has a valid administrative login name, they can use their own password to authenticate.

tags | exploit, remote
SHA-256 | ba080e1ee2b24295baccbce99c973d0e451004caf92506c8f54b87dc62b1a0d2
isaxss.txt
Posted Jul 18, 2003
Authored by Thor Larholm, Brett Moore SA | Site security-assessment.com

The Microsoft Internet Security and Acceleration, or ISA, server contains a default error page that can be used to conduct cross site scripting attacks against a legitimate user.

tags | advisory, xss
SHA-256 | 051076503bc72c2b87f59aeb4ad73074c982cd00eb77cfd9f35afb69941adc65
qSSHscan.tar.gz
Posted Jul 18, 2003
Authored by Joker | Site olives.ath.cx

A threaded ssh banner scanner written in Java that takes in a list of IPs or hostnames. Written and tested for Linux and Windows.

tags | tool, java, scanner
systems | linux, windows, unix
SHA-256 | 668d3d6e3f251c2cee5ad3e449105439defd5cde59ca1389636980dc5106c36f
0x333toper-local.c
Posted Jul 18, 2003
Authored by nic | Site 0x333.org

Local exploit that yields gid of games for /usr/bin/toppler. Tested against RedHat 8.0.

tags | exploit, local
systems | linux, redhat
SHA-256 | c92cab560b62bccb2088bbd7e1ee2b423795fe4783101d37181185d7c3dbad96
PUPET-simpnews.txt
Posted Jul 18, 2003
Authored by PUPET

Simpnews has an include file vulnerability that allows a remote attacker to load malicious PHP scripts.

tags | exploit, remote, php
SHA-256 | 3a1cb29b2d9407d519d17fe3a494ffe6d482069586256ca3aea9634a0659e949
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close