the original cloud security
Showing 1 - 25 of 100 RSS Feed

Files

60cycleCMS Cross Site Scripting
Posted Mar 10, 2010
Authored by Pratul Agrawal

60cycleCMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 47b9959eebc266e101924d1fd6e37482

Related Files

w00os.tgz
Posted Jan 3, 2008
Authored by w00w00

w00w00's operating system. Yes, a joke.

MD5 | 7b03569337d70874d4142ceeb10bdadd
octopus.c
Posted Aug 26, 2002
Authored by Maniac

This little program opens as many sockets with a remote host as can be supported by both. It catches ^C and kill commands to shut down cleanly by closing all open connections before exiting. Often, a remote workstation can be brought to its knees by saturating its process table via multiple invocations of sendmail. That's why port 25 (the sendmail port) is the default. If the target's process table (set when the target kernel was created) is filled, users will be unable to execute any shell commands. Many MUDs also crash when the number of sockets they have open exceeds a certain number. This program will put stress on MUDs by testing their limits. If a limit is reached, the MUD will either crash or will refuse to let new users log in. * The program is incomplete, in that it doesn't check for socket timeouts and subsequently reuse timed out sockets. That means the program can only keep a remote host / mud locked up until it exhausts its own available new sockets, or until it has reached MAX_DESCRIPTORS remote connections as set by the #define statement. * If the local machine starts issuing error messages, then the program has failed to saturate the remote host and has instead reached the limits of the local machine. Use ^C or the kill command to terminate it. If you are knowledgable about rebuilding kernels and have access to the root account, you can build a special kernel that will allow you to reach a much larger number of open sockets.

tags | remote, denial of service, shell, kernel, local, root
MD5 | 57f5e537c9adc5964995189dee2618d0
twlc.gif
Posted Jan 2, 2002
Authored by twlc

twlc logo

MD5 | 829f9581dc84503bb015f3a8fddd927e
PR09.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR09.txt.zip

tags | magazine
MD5 | f3dd4498769b1da00333963bb2471dbd
PR08.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR08.txt.zip

tags | magazine
MD5 | 0ce948f8c912117fd90a619e2d8b6dab
PR07.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR07.txt.zip

tags | magazine
MD5 | 77da16cec8c37cbd135647ccbad4be31
PR06.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR06.txt.zip

tags | magazine
MD5 | 2db8e860aa1f0ba496f1ec03c073c0a4
PR05.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR05.txt.zip

tags | magazine
MD5 | 05b7e226d46066bc5f37024dae75786c
PR04.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR04.txt.zip

tags | magazine
MD5 | 7712468359ed26815e08d05c7f875ecd
PR03.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR03.txt.zip

tags | magazine
MD5 | 6d82b7bd94d290ba2c0b53f45c570a3d
PR02.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR02.txt.zip

tags | magazine
MD5 | daaf75e00dd724d144c32e77cd807e04
PR01.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR01.txt.zip

tags | magazine
MD5 | 9670c08238864cf706da09c36b0118cb
netopia.advisory.r9100
Posted May 17, 2000
Authored by Steve Friedl

The Netopia R9100 permits a user not authorized with a special security password to neverthless modify the SNMP community strings, including enabling SNMP access that should be disabled.

tags | exploit
MD5 | bfc4f59f410bc5cd989c93e746833946
preventing.worms
Posted May 17, 2000
Authored by Woody Thrower, Stan Burnett, Gary Wahlquist | Site www2.axent.com

Prevent Current and Future E-Mail Worms.

tags | worm
MD5 | ccb29df3cab7315b7bbe73ebc5426747
Emurl2.0.windows
Posted May 17, 2000

Users can access the mailbox's content of anybody on the system. They can also steal their POP passwords since Emurl allows you to fetch your POP email from more than one source.

tags | exploit
MD5 | c854c11701ebd63ca453e8f85947aff4
Banner.rotating
Posted May 17, 2000
Authored by Zillion | Site safemode.org

A file called adpassword.txt is world readable as it is assigned the wrong permissions. This will allow a malicious attacker to read the contents of the file, to crack the DES encrypted password it contains (using a common-or-garden password cracker), and to edit banner entries,to add or to remove banners.

tags | exploit
MD5 | f14c2253d94b28844892aa0865a6d3c1
DoS-CProxyv3.3
Posted May 17, 2000
Authored by TDP

Remote Denial of Service for CProxy v3.3 - Service Pack 2. This program xploits an overflow vulnerability in CProxy 3.3 SP2 HTTP Service (8080), causing server shutdown.

tags | exploit, remote, web, denial of service, overflow
MD5 | f49a2c47ec6a0437c9ee7590a95682b9
cisco760.c
Posted May 17, 2000
Authored by Tiz.Telesup

Cisco 760 Series Connection Overflow. Affected Systems: Routers Cisco 760 Series. Others not tested.

tags | exploit, overflow
systems | cisco
MD5 | a4074a92cb0b32eac9e0680403c56ee5
calendar.pl.vuln
Posted May 17, 2000
Authored by Suid | Site suid.kg

Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | exploit, remote, web, arbitrary
MD5 | a5c2a8bd20fdd39774c7f5e722ef9054
cisco.00-05-14.http
Posted May 17, 2000
Site cisco.com

A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled and browsing to "http://<router-ip>/%%" is attempted. This defect can be exploited to produce a denial of service (DoS) attack. This defect has been discussed on public mailing lists and should be considered public information.

tags | exploit, web, denial of service
systems | cisco
MD5 | 177d2675ccf94d2117289316882510d8
sses-sshauth.txt
Posted May 17, 2000
Site sses.net

A vulnerable secure shell distribution is available from the popular Zedz Consultants FTP site (formally known as replay.com). The RedHat Linux RPM ssh-1.2.27-8i.src.rpm contains a PAM patch which contains faulty logic allowing users to essentially pass through the username/password authentication step and gain shell access.

tags | exploit, shell
systems | linux, redhat
MD5 | 95b80c63f273743306ae2cf0b0b7b355
ACROS-2000-04-06-1-PUB
Posted May 17, 2000
Site acros.si

Bypassing Warnings For Invalid SSL Certificates In Netscape Navigator.

tags | exploit
MD5 | 1f30c5620c1a04acf9b16c06972bc5d0
nolove.mz
Posted May 17, 2000
Authored by Michal Zalewski

"I don't think I really love you" or writing internet worms for fun and profit.

tags | worm
MD5 | a1bf3c9a055dd560d416ffd234081b6d
lpset.overflow
Posted May 17, 2000
Authored by Tim Newsham

Here's an overflow exploit that works on a non-exec stack on x86 boxes. It demonstrates how it is possible to thread together several libc calls.

tags | exploit, overflow, x86
MD5 | b5495c00069db7ae509aaabe0a85a00f
nhc.20000504a.0
Posted May 17, 2000

New Hack City Advisory 20000504a.0 - It is possible to cause a kernel panic on systems running NetBSD by sending a packet remotely with an unaligned IP Timestamp option.

tags | kernel
systems | netbsd
MD5 | 28d0acc8603e94700026a54b309aebe1
Page 1 of 4
Back1234Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close