exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 184 RSS Feed

Files Date: 2002-10-01 to 2002-10-31

badblue.1.7.txt
Posted Oct 25, 2002
Authored by Tamer Sahin | Site securityoffice.net

The BadBlue web server v1.7 for Windows allows remote attackers to access files in password protected directories by sending a special web request. Tested on Windows 2000 Sp3 and 98SE.

tags | remote, web
systems | windows
SHA-256 | 99d05374da83f582e4c1a538df787b729ffaa4edb6e65cda12d5bea1cb47a8a5
liteserve.2.0.txt
Posted Oct 25, 2002
Authored by Tamer Sahin | Site securityoffice.net

The Liteserve Web Server v2.0 for Windows allows remote attackers to access files in password protected directories by sending a special web request. Tested on Windows 2000 Sp3 and 98SE.

tags | remote, web
systems | windows
SHA-256 | 1ad0b43d131843b5736e0561fcc1a675759e988ac4a519a13fc34d067e8ed50f
webweaver.1.01.txt
Posted Oct 25, 2002
Authored by Tamer Sahin | Site securityoffice.net

The BRS WebWeaver Web Server v1.01 for Windows allows remote attackers to access files in password protected directories by sending a special web request. Tested on Windows 2000 Sp3 and 98SE.

tags | remote, web
systems | windows
SHA-256 | 952d6a2e38bf73ed6659426d07625a19fe392c8b246d7ec67b52f1f0b7264132
TunnelFinder.zip
Posted Oct 25, 2002
Authored by OblivionBlack

Tunnel finder is a particular proxy checker that can display information from a list of proxies by searching for proxy servers that permit the CONNECT command allowing an end user to achieve a higher level of anonymity.

tags | web
SHA-256 | 04f9dee370118f4214730926d3a378e63fa4c58b145ca7bcb65f65b3693a1376
virgil.txt
Posted Oct 25, 2002
Authored by KALIF research group, Joschka Fischer

Virgil CGI Scanner by Mark Ruef has a vulnerability where user input is trusted without being sanitized and is actually populating bash variables which end up getting executed. Simple exploit examples are included.

tags | exploit, cgi, bash
SHA-256 | d904fe4eeff1617f799ad5d492b310acc2605145158faff2c8c8a7b7a546cdac
winrpcnuke.c
Posted Oct 25, 2002
Authored by Lion | Site cnhonker.com

Microsoft Windows RPC Denial of Service utility.

tags | denial of service
systems | windows
SHA-256 | 14210ab9185d541e6e0cd8c76e93e68f6cf19be6fc42f04ea56bb85b67e5e8ef
mig-logcleaner11.tar.gz
Posted Oct 25, 2002
Authored by no1 | Site greyhats.za.net

Log wiping utility used to sanitize logs from utmp, wtmp, utmpx, wtmpx, lastlog files. Capabilities also allow modification and addition of entries.

tags | tool, rootkit
systems | unix
SHA-256 | 7d68a83410f500bb5b1ecadd45370d96ed4e69ce4f1b607f6b1bc9a7ea7b61da
idefense.solarwinds.txt
Posted Oct 25, 2002
Authored by David Endler, Matthew Murphy | Site idefense.com

iDEFENSE Security Advisory 10.24.02 - The Solarwinds TFTP server v5.0.55 and below contains a directory traversal bug which allows remote users to download any file on the system.

tags | remote
SHA-256 | a7a4ff629f7e930a627e2df7c2e09b6d40a316d099e31b0a622bdad02850eb20
gm012-more-ie.txt
Posted Oct 25, 2002
Authored by GreyMagic Software | Site security.greymagic.com

Microsoft Internet Explorer versions 5.5 and 6.0 are susceptible to 9 attacks involving object caching. When communicating between windows, security checks ensure that both pages are in the same security zone and on the same domain. These crucial security checks wrongly assume that certain methods and objects are only going to be called through their respective window. This assumption enables some cached methods and objects to provide interoperability between otherwise separated documents.

tags | exploit
systems | windows
SHA-256 | 0d493f1ee4c0342068a311e12ade60a725672891b23957e14ce2b5cbe1e6e675
wc.tar.gz
Posted Oct 25, 2002
Authored by Aion

Two modified versions of the slapper worm exploit made more user-friendly with simple interaction to define what host and port will be hit with the exploit.

tags | exploit, worm
SHA-256 | 33f0ab9cc7a39a816dbc6dddc8b1952feeb6871f5ad68e60decab4626431eb7c
iptables.txt
Posted Oct 25, 2002
Authored by Fog

Iptables shell script. Some Brazilian comments.

tags | tool, shell, firewall
systems | linux
SHA-256 | 4a4d7de414db7c905e2217bf7d07d40927e0c013b2effde9a9f8880838c68278
l-zonealarm.c
Posted Oct 23, 2002
Authored by Lupsyn

Zone-Labs ZoneAlarm Pro 3.1.291 and 3.0 remote denial of service exploit which consumes all available CPU via synflooding. To fix, update to the newest zonealarm and run windows update.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 2329490bcac7c86570a101a2d3d6cdd834e3f075b8ff11c4b4122ece94d2393e
autopsy-1.62.tar.gz
Posted Oct 22, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

Changes: Bug fixes.
tags | tool, forensics
SHA-256 | cde4370054a7517eb875f440b96f74eecd787db70646c17b539c794decd11608
mssql-webtasks.txt
Posted Oct 22, 2002
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft SQL Server 2000 and 7 allow attackers to gain control of the database by elevating their privileges by using the xp_runwebtask stored procedure. Fix available here.

SHA-256 | 0993da5c8ab7c5ff24d06d11c71e7c6166e5eef4f669d081f8f47da07b21ae30
anhttpd141c_exploit.java
Posted Oct 22, 2002
Authored by Kanatoko | Site jumperz.net

AN HTTPD v1.30 to 1.41c remote heap overflow exploit written in java for Japanese Windows 2000 Pro (SP2).

tags | exploit, java, remote, overflow
systems | windows
SHA-256 | 167ce9e82779b5e084ff82fd83009543c8acb427e75433946e1e8bb76aabd037
nocc.xss.txt
Posted Oct 22, 2002
Authored by Ulf Harnhammar

Nocc v0.9.5 contains cross site scripting vulnerabilities which allow an attacker to take over a victim's e-mail account and/or perform actions against the victim's will, by simply sending a malicious e-mail message to the victim. Fix available at http://nocc.sourceforge.net.

tags | web, vulnerability, xss
SHA-256 | 9dc7f58e6a84de7afd3c2dc0c1c01e0a92637f30032701f1adde85a1090db208
pfdos.pl
Posted Oct 22, 2002
Authored by Securma Massine

PowerFTP v2.24 and below remote denial of service exploit in Perl.

tags | remote, denial of service, perl
SHA-256 | 6c35bcb40ba1d5bd9322642847860c17eb6c904541ae79689c51f4513a733837
sendmail-8-11-x.c
Posted Oct 22, 2002
Authored by sd@sf.cz

Sendmail 8.11.x linux/x86 local root exploit. Uses gdb to find offsets.

tags | exploit, x86, local, root
systems | linux
SHA-256 | 97fb231f9fda1d4ce349f63e8594a891166c284dcf5ab06cb3000406b26a36b9
unishell.pl
Posted Oct 22, 2002
Authored by Pakk

Unicode IIS exploit in perl. Tries 20 ways.

tags | exploit, perl
SHA-256 | 8662d0aab8bd41a11af165611d21686de5ca89f17b76ea0ca9ec002d6a6ccc07
r032b.zip
Posted Oct 22, 2002
Site home.zonnet.nl

Windows XP port scanner.

systems | windows
SHA-256 | 2765e98d0c660f9e26fe5790fef0fe45c40dc5cafb09fc4422ae1815a1232f59
web602dos.pl
Posted Oct 22, 2002
Authored by eip aka deadbeat aka AnGrY_SQl

Web602 webserver remote denial of service exploit which uses the com1 windows flaw.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | ab81b2d5aae5a6c0ecbe18c0c13997194365a98f277de5ce0d0fa049a1a34322
web602dir.pl
Posted Oct 22, 2002
Authored by eip aka deadbeat aka AnGrY_SQl

Web602 (Czech version) directory tree exploit.

tags | exploit
SHA-256 | 93003a050e2c15ef1e0f6c14a2e62b6ea615d4de687dec1239970cbb346096e7
HP-netris_DoS.c
Posted Oct 22, 2002
Authored by Artur Byszko

HP Netris v0.5 and below remote denial of service exploit.

tags | remote, denial of service
SHA-256 | 1511466d20ead8a76a69420ed7ccb8dcb916dcf1d94877d562d9820209800c33
crip.c
Posted Oct 22, 2002
Authored by PoWeR PoRK | Site netric.org

Crip.c is a utility for ripping out a c-declaration of binary data (like shellcode) and converting it to binary.

tags | shellcode
SHA-256 | a63c9f4d2960f672e07b9bbd29d3d87d4a43463fb6e89cd83c72d12adb1619b0
logwatch-4.1.tar.gz
Posted Oct 22, 2002
Site sourceforge.net

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: Fixed race conditions.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0fd643ed6ce80f231d2e8aeb0282685d95a821baacdd2963e6c251e0fbff879d
Page 2 of 8
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close