exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 330 RSS Feed

Files Date: 1999-11-01 to 1999-11-30

cabletron.ssr.dos.txt
Posted Nov 25, 1999
Site bindview.com

Bindview Security Advisory: Denial of Service Vulnerability in Cabletron's SmartSwitch Router (SSR). Remote users can flood the ARP table and stop the processing of packets.

tags | exploit, remote, denial of service
SHA-256 | 85b52a0144618cc558cd1f34d6755e7f885a84a66d835af7ef076846c52575a7
bisonware.ftp.3.5.txt
Posted Nov 25, 1999
Authored by Underground Security Systems Research

UssrLabs found a Local/Remote DoS Attack in BisonWare FTP Server V3.5. The buffer overflow is caused by a long user name, 2000 characters. Source / Binary for DoS attack here.

tags | exploit, remote, overflow, local
SHA-256 | b9bf2c6f03b60c09ff76b043f8b7a7aac25a8e062fe0a9217a774ed8d103ddcb
worldclient.2.0.0.0.dos.txt
Posted Nov 25, 1999
Authored by Underground Security Systems Research

UssrLabs found a buffer overflow in WorldClient Server v2.0.0.0 where they do not use proper bounds checking on WorldClient TCP Port 2000. Denial of service exploit available.

tags | exploit, denial of service, overflow, tcp
SHA-256 | 3b1c84dc9f0f7149f35a233e5703823a06da161632fee84d723e133ce1a996a5
ex_inc.c
Posted Nov 25, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

ex_inc.c exploits a bounds checking error in /usr/jp/bin/mh/inc which was distributed with the mh-6.8.3 package. Local root compromise.

tags | exploit, local, root
systems | unix
SHA-256 | 64f2aa455cd466403bc433552e384ce9c8e0ca9b98c3b17c61c9298a5606d3ea
ex_bbc.c
Posted Nov 25, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

ex_bbc.c exploits a bounds checking error in /usr/jp/bin/mh/bbc which was distributed with the mh-6.8.3 package. Local root compromise.

tags | exploit, local, root
systems | unix
SHA-256 | 473ed7b2b606ac73b513d39a31d17c1a0273bb06e15e9331e35c648649c833b8
ex_kcms_configure86.c
Posted Nov 25, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

kcms_configure has a overflow bug with "-P" option and it has been reported(107339-01). But this program has another hole. This hole has not been not reported, and the paches are not published at this time. kcms_configure overflows if long string is specified in NETPATH environment, and it is exploitable. I have included an exploit for Solaris7 intel edition to obtain root privilege.

tags | exploit, overflow, root
systems | unix
SHA-256 | ea0a516a062e19771e9d6d970e1a6bd9a1fc9ee7ecf921fcb1848a66309b1ef1
ex_kcms_configuresp.c
Posted Nov 25, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

The vulnerability in kcms_configure also exists in Solaris 2.6 and 2.7 sparc edition. Exploit included.

tags | exploit
systems | unix, solaris
SHA-256 | ddad8f87f48eb849bc4bf6f56910e4be16715ce9dec57022ab5c00f69f2c1712
ex_mailtool.c
Posted Nov 25, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

The mailer programs (mailtool and dtmail) and mail message print filter (dtmailpr) which are installed on Solaris7 have exploitable buffer overflow bugs. These programs are sgid (mail group) programs, local user can obtain mail group. The mail files are generated with 660 permission, so any user can read/write other user's mail files. I coded the exploits to get mail gid(egid=6). There are for Intel Solaris7. There are same kind of problems on Sparc Solaris7 and Solaris2.6 (Intel,Sparc).

tags | exploit, overflow, local
systems | unix
SHA-256 | e92d0a93449cedf9a5f2e97de3948d9c6e4f86ade92541e2bae6d0f02e99dcf4
nt.security.update.112499.txt
Posted Nov 25, 1999
Authored by winsd | Site ntsecurity.net

WINDOWS NT MAGAZINE SECURITY UPDATE for November 24, 1999. (formerly Windows Security Digest) Includes information on Internet Explorer 5.0 XML Redirects, Vermillion FTP Server Subject to Denial of Service, WordPad Subject to Crash, HP JetDirect Denial of Service, ZetaMail 2.1 Subject to Denial of Service, G6 FTP Server Subject to Denial of Service, Melissa Variant Prilissa on the Loose, The Philosophy of Security - UNIX vs. NT, and 3Com's New 3CR990 Encrypting NIC.

tags | denial of service, magazine
systems | windows, unix
SHA-256 | 22bdf51ea47ec62aff28e672e877f6d4e56e3031043dc45ebf64d380cc479a36
webboard-1199.html
Posted Nov 25, 1999
Authored by pho

O'Reilly's WebBoard software has some bugs with interesting possibilities. Vulnerabilities include unauthorized paging and arbitrary content insertion.

tags | exploit, arbitrary, vulnerability
SHA-256 | f599b47fd54cd9044b14d6b79b5aec270c167886138278d2b2fbba16cbe89790
NSS_252.tar.gz
Posted Nov 25, 1999
Authored by Narrow

Narrow Security Scanner is a perl script which checks for 177 remote vulnerabilities. Tested on Slackware 4.0, Red Hat (4.2, 5.0, 6.0), SuSE 6.1, FreeBSD 3.0 & OpenBSD 2.5.

Changes: Drasticly updated readme.
tags | tool, remote, scanner, perl, vulnerability
systems | linux, redhat, unix, freebsd, suse, slackware, openbsd
SHA-256 | bcfcef616792517641299fd43ca370f4f6f22a3aef22eb0162f42cd8c46751de
netpeek-0.0.3.tar.gz
Posted Nov 24, 1999
Authored by Rhys Weatherley | Site nyerk.com

NetPeek is a GUI-based network monitoring and diagnosis tool. It captures packets from the local network and displays them to the user in two forms: a short one-line description similar to that produced by tcpdump, and a long form that displays the contents of all fields within the packets in full.

tags | tool, local, sniffer
SHA-256 | 70e66dfcf03bde13746c8b97797fef7e77510861fe27c401ca185ae570f275b0
ethereal-0.7.8.tar.gz
Posted Nov 24, 1999
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: Many new protocol decoders were added in this version. They are: RPC, NFS, IGRP, EIGRP, IMAP, LAPD, Q.931, bootparams, ypserv, mount, stat, MAPI, NLM, SAP, ILMI, SSCOP, Q.2931, VRRP, HSRP, and Auto-RP. New features include: AIX and IBM C compiler fixes, "Print" button in TCP Follow window, "Find Frame" function, "Go to frame" function, "Match selected" produces display filters with field names, Display filter "Reset" button, More filterable fields, IPv4 address comparison and subnet testing in display filters, IPX packet summary resolves IPX network names and MAC addresses, SNA packets show hex dump with EBCDIC converted to ASCII, Support for newer libpcaps, and broken RH 6.1 libpcap, Wiretap support for Toshiba ISDN router traces, and Wiretap support for ATM iptrace files.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 517fe51fe7193b13ceca738c8c30ee0182aead4c4b9d2d14d09deac2ddde9565
oce9400.txt
Posted Nov 24, 1999
Authored by Larry W. Cashdollar

The Oce 9400 plotter can be used as a telnet proxy in its default configuration.

tags | exploit
SHA-256 | 7dc17fea3ce18547115679dce3605f71296d6cdbc78e338c5547cbcc1a17902e
mdpag.c
Posted Nov 24, 1999
Authored by Tim Lawless

Massively Distributed Penetration Attempt Generator. Wouldn't it be fun if your favorite lamer was trying to hack the Whitehouse, or even the Army? Now they can, or at least appear as though they are. This utility will generate a slew of fake scans on a target ip from a group of fake "scanning" ips. Inspired by nmap.

tags | tool, scanner
systems | unix
SHA-256 | 59dffcfa3e4bd730b2d6b0306c8b92ec6a282eb576ba51774bd05c20a3c30b47
mdaemon.2.8.5.0.txt
Posted Nov 24, 1999
Authored by Underground Security Systems Research

Multiple remote DoS vulnerabilities have been found in the MDaemon 2.8.5.0 server. Binary / Source for this MDaemon Server v2.8.5.0 Denial of Service here.

tags | exploit, remote, denial of service, vulnerability
SHA-256 | 3a0ceab38aea510cb377ea41e4fb2cf7d031201d581401ef812dbd81aa89f4ca
CS-99.04
Posted Nov 24, 1999

Each quarter, the CERT Coordination Center (CERT/CC) issues the CERT summary to draw attention to the types of attacks reported to our incident response team. This quarter, the most popular attacks are Distributed DoS tools, Distributed Sniffer for Linux, CDE Vulnerabilities, BIND Vulnerabilities, WU-FTPD Vulnerabilities, AMD Vulnerabilities, RPC Vulnerabilities, and virus / trojan activity.

tags | trojan, vulnerability, virus
systems | linux
SHA-256 | 4916697ede111fc56d0a555e05360d53fa9f7f98f5ba31cbadd4565952b50824
WebCrack40.zip
Posted Nov 24, 1999
Authored by Daniel Flam | Site webcracker.net

Webcracker is a security tool that allows you to attempt to brute force id and password combinations on your web site. If you're able to guess a user's password with this program, chances are some hacker will be able to also. Webcracker helps you find these vulnerablilities and fix them before they're exploited by some unknown attacker.

Changes: Multi-threaded for faster scanning, more flexible URL formats, and wordfile manipulation.
tags | web, cracker
SHA-256 | 21e2b52b2c9f4281ee6e758a5a64821ef62d1ccb9ffafa53d6fbf33b8d484fe6
netbeans.java.txt
Posted Nov 23, 1999
Authored by Halcyon Skinner

Sun Microsystems NetBeans (recently renamed to Forte') Java IDE includes an internal HTTP server to try Java code. When service is enabled for one machine, the HTTP server allows remote access to root and all subdirectories from any machine. Example included.

tags | exploit, java, remote, web, root
SHA-256 | 9e98d68bcd377235a72ff44e6d0f4d04526bb950706328566c2744fb4832566d
pine.420.txt
Posted Nov 23, 1999

Bug in pine 4.20 below allows pine to execute a command mailed to the user without the user seeing what it is by Jim Herbert. Includes commentary by Pavel Kankovsky on how it is still not fixed in 4.21.

tags | exploit
SHA-256 | 3666f88135de094542fb169ef70fc2338e61507c7e7fe1ec4be8e3b8ec7d257e
wordpad.txt
Posted Nov 23, 1999
Authored by Solar Eclipse

Riched20.dll, which Microsost wordpad uses, is vulnerable to a buffer overflow attack. This paper gives lots of detailed information on of exploiting this vulnerability.

tags | exploit, overflow
SHA-256 | 3f1b59360021dd122d37fd44d66487de0c4de9144e6bb58b16b27327eed42ef1
ie50.xml.txt
Posted Nov 23, 1999
Authored by Georgi Guninski | Site nat.bg

Internet Explorer 5.0 under Windows 95 and WinNT 4.0 (guess other versions are affected) has security problems with HTTP redirects in XML objects. This allows at least Reading any (local or nonlocal) XML file and any wellformed documents, Reading parts of documents, Checking for the existence of local files, and possibly reading arbitrary files. Exploit included.

tags | exploit, web, arbitrary, local
systems | windows
SHA-256 | 5b6c27497f657cb808f65f63aae3c8ef89936dfdab9b4da93b59f14c50255ef8
gfcc-0.7.3.tar.gz
Posted Nov 23, 1999
Authored by Koo Kyoseon | Site icarus.autostock.co.kr

gfcc (GTK+ Firewall Control Center) is a GTK+ application which can control Linux firewall policies and rules, based on ipchains package.

Changes: A fix for a serious bug when exporting firewall data.
systems | linux
SHA-256 | d1941883265ad61d8d95879d0a3bacff8ebe388e92802ca802be6034d57bc8e9
c_icq317.zip
Posted Nov 23, 1999
Authored by Hal of cia

Patch for ICQ 99b v3.17 bld 2565 which removes IP hiding, Removes the Owners Limit, and removes authorization request to add new users.

SHA-256 | 2e2d4b43c4ee1087a33fd31a910aa0efe627d0020df647388c8522287cd4484a
c_icq319.zip
Posted Nov 23, 1999
Authored by Hal of cia

Patch for ICQ 99b v3.19 which removes IP hiding, Removes the Owners Limit, and removes authorization request to add new users.

SHA-256 | 384d4c2977d5d27bd5d695e6880a7f4f684205bb83fce2955a29bd3f79f44e1d
Page 2 of 14
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close