exploit the possibilities
Showing 1 - 25 of 168 RSS Feed

Worm Files

Email-Worm.Win32.Trance.a Insecure Permissions
Posted Jun 28, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Trance.a malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | fb45ce08d60cf295aac4ffd68c5e2a8b
Email-Worm.Win32.Kipis.a Code Execution
Posted Jun 17, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Kipis.a malware suffers from a code execution vulnerability.

tags | exploit, worm, code execution
systems | windows
MD5 | 5f9909702c2a22a76b31c1b64ddf1721
Worm.Win32.Delf.hu Insecure Permissions
Posted Apr 30, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Delf.hu malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 4de532f07b14fcfbf215acdf872f2351
Worm.Win32.Busan.k Insecure Transit
Posted Apr 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Busan.k malware suffers from an insecure transit vulnerability.

tags | exploit, worm
systems | windows
MD5 | 754b5fcaa70daf8bda8786f1be2b3068
IM-Worm.Win32.Bropia.aa Insecure Permissions
Posted Apr 22, 2021
Authored by malvuln | Site malvuln.com

IM-Worm.Win32.Bropia.aa malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 695f9acb229dede25734a9ad77cdd57b
IRC-Worm.Win32.Silentium.a Insecure Permissions
Posted Mar 31, 2021
Authored by malvuln | Site malvuln.com

IRC-Worm.Win32.Silentium.a malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | ea86c34c522a2e91ed94255670b2b1a8
IRC-Worm.Win32.Jane.a Authentication Bypass / Man-In-The-Middle
Posted Mar 30, 2021
Authored by malvuln | Site malvuln.com

IRC-Worm.Win32.Jane.a malware suffers from bypass and man-in-the-middle vulnerabilities.

tags | exploit, worm, vulnerability
systems | windows
MD5 | 90701fec5ba325d00d5cda1bc06ea330
IRC-Worm.Win32.Jane.a Authentication Bypass / Code Execution
Posted Mar 30, 2021
Authored by malvuln | Site malvuln.com

IRC-Worm.Win32.Jane.a malware suffers from bypass and code execution vulnerabilities.

tags | exploit, worm, vulnerability, code execution
systems | windows
MD5 | bc5fafa0d28f3f6af4f4c0b4f3234792
Worm.Win32.Ngrbot.acno Insecure Permissions
Posted Mar 25, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Ngrbot.acno malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | b1fa08112e7ed4c8429cd2487b58add7
Worm.Win32.Recyl.dp Insecure Permissions
Posted Mar 25, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Recyl.dp malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 2f1b36b68f5c41439b070966e75854b6
Worm.Win32.Ngrbot.abpr Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Ngrbot.abpr malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 659134a5a1759b9458935738d7e5ca0e
Worm.Win32.Detnat.c Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Detnat.c malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 1cdc3c79c3abffd54884f2e0b259214a
Email-Worm.Win32.Sircam.eb Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Sircam.eb malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 549ef90768d393736c83930a680b5f5b
Email-Worm.Win32.Agent.gi Remote Stack Buffer Overflow
Posted Jan 19, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Agent.gi malware suffers from a remote stack buffer overflow vulnerability.

tags | exploit, worm, remote, overflow
systems | windows
MD5 | 4cd0dcc841eb9464b95eea555c050501
Email-Worm.Win32.Zhelatin.ago Remote Stack Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Zhelatin.ago malware suffers from a remote stack buffer overflow vulnerability.

tags | exploit, worm, remote, overflow
systems | windows
MD5 | 8bd0a581f8bc5944d334d3e2733b636f
Morris Worm sendmail Debug Mode Shell Escape
Posted Nov 5, 2018
Authored by wvu, Robert Tappan Morris, Cliff Stoll | Site metasploit.com

This Metasploit module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Currently only cmd/unix/reverse and cmd/unix/generic are supported.

tags | exploit, worm, shell
systems | unix
MD5 | 916044331d126eab8e387612884dc927
Morris Worm fingerd Stack Buffer Overflow
Posted Nov 5, 2018
Authored by wvu, Robert Tappan Morris, Cliff Stoll | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg.

tags | exploit, worm, overflow
MD5 | ed1eb77912bc6cc0c8fcd9813c7bc2b6
Hak5 WiFi Pineapple Preconfiguration Command Injection 2
Posted Oct 19, 2016
Authored by catatonicprime | Site metasploit.com

This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm.

tags | exploit, worm
advisories | CVE-2015-4624
MD5 | 6decdeddc87bc1b4e2eab5e2ce78b412
Metamorphic Worms: Can They Remain Hidden?
Posted Feb 2, 2015
Authored by Reethi Kotti

Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest.

tags | paper, worm
MD5 | 4ae6e561c0c9dbfec13ce2965d4d8a49
Linksys E-Series TheMoon Remote Command Injection
Posted Apr 5, 2014
Authored by Michael Messner, Rew, juan vazquez, infodox, Johannes Ullrich | Site metasploit.com

Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5.

tags | exploit, worm
MD5 | efd9a1fb2aa6013c587f6a0d62ca6b44
Linksys Worm Remote Root
Posted Feb 17, 2014
Authored by infodox

Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi.

tags | exploit, worm, cgi, proof of concept
MD5 | 98029f878e6fe6748f2a3f31170306c5
Linksys E-Series Remote Code Execution
Posted Feb 17, 2014
Authored by Rew

Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm.

tags | exploit, worm, remote
MD5 | e5e8a82bab2ad32c6f6fbad03561fa32
To Kill A Centrifuge
Posted Nov 21, 2013
Authored by Ralph Langner | Site langner.com

Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve.

tags | paper, worm
MD5 | 378b0d6b52e08452f849a30292b24bad
Wormtrack Network IDS 0.1
Posted Nov 10, 2011
Authored by Aleksandr Brodskiy | Site code.google.com

Wormtrack is a network IDS that helps detect scanning worms on a local area network by monitoring anomalous ARP traffic. This allows detection of scanning threats on the network, without having privileged access on a switch to set up a dedicated monitor port, nor does it require a constant updating of the rules engine to address new threats.

tags | tool, worm, local, intrusion detection
systems | unix
MD5 | 82df762231b40c0bacfb4861cb2b105c
PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution
Posted May 5, 2010
Authored by Michael Brooks

PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit.

tags | exploit, worm, remote, php, code execution
MD5 | eb272c6ff1c00e0c3cdc8c49150c4be4
Page 1 of 7
Back12345Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close