exploit the possibilities
Showing 1 - 25 of 166 RSS Feed

Worm Files

Worm.Win32.Delf.hu Insecure Permissions
Posted Apr 30, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Delf.hu malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 4de532f07b14fcfbf215acdf872f2351
Worm.Win32.Busan.k Insecure Transit
Posted Apr 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Busan.k malware suffers from an insecure transit vulnerability.

tags | exploit, worm
systems | windows
MD5 | 754b5fcaa70daf8bda8786f1be2b3068
IM-Worm.Win32.Bropia.aa Insecure Permissions
Posted Apr 22, 2021
Authored by malvuln | Site malvuln.com

IM-Worm.Win32.Bropia.aa malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 695f9acb229dede25734a9ad77cdd57b
IRC-Worm.Win32.Silentium.a Insecure Permissions
Posted Mar 31, 2021
Authored by malvuln | Site malvuln.com

IRC-Worm.Win32.Silentium.a malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | ea86c34c522a2e91ed94255670b2b1a8
IRC-Worm.Win32.Jane.a Authentication Bypass / Man-In-The-Middle
Posted Mar 30, 2021
Authored by malvuln | Site malvuln.com

IRC-Worm.Win32.Jane.a malware suffers from bypass and man-in-the-middle vulnerabilities.

tags | exploit, worm, vulnerability
systems | windows
MD5 | 90701fec5ba325d00d5cda1bc06ea330
IRC-Worm.Win32.Jane.a Authentication Bypass / Code Execution
Posted Mar 30, 2021
Authored by malvuln | Site malvuln.com

IRC-Worm.Win32.Jane.a malware suffers from bypass and code execution vulnerabilities.

tags | exploit, worm, vulnerability, code execution
systems | windows
MD5 | bc5fafa0d28f3f6af4f4c0b4f3234792
Worm.Win32.Ngrbot.acno Insecure Permissions
Posted Mar 25, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Ngrbot.acno malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | b1fa08112e7ed4c8429cd2487b58add7
Worm.Win32.Recyl.dp Insecure Permissions
Posted Mar 25, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Recyl.dp malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 2f1b36b68f5c41439b070966e75854b6
Worm.Win32.Ngrbot.abpr Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Ngrbot.abpr malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 659134a5a1759b9458935738d7e5ca0e
Worm.Win32.Detnat.c Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Detnat.c malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 1cdc3c79c3abffd54884f2e0b259214a
Email-Worm.Win32.Sircam.eb Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Sircam.eb malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 549ef90768d393736c83930a680b5f5b
Email-Worm.Win32.Agent.gi Remote Stack Buffer Overflow
Posted Jan 19, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Agent.gi malware suffers from a remote stack buffer overflow vulnerability.

tags | exploit, worm, remote, overflow
systems | windows
MD5 | 4cd0dcc841eb9464b95eea555c050501
Email-Worm.Win32.Zhelatin.ago Remote Stack Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Zhelatin.ago malware suffers from a remote stack buffer overflow vulnerability.

tags | exploit, worm, remote, overflow
systems | windows
MD5 | 8bd0a581f8bc5944d334d3e2733b636f
Morris Worm sendmail Debug Mode Shell Escape
Posted Nov 5, 2018
Authored by wvu, Robert Tappan Morris, Cliff Stoll | Site metasploit.com

This Metasploit module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Currently only cmd/unix/reverse and cmd/unix/generic are supported.

tags | exploit, worm, shell
systems | unix
MD5 | 916044331d126eab8e387612884dc927
Morris Worm fingerd Stack Buffer Overflow
Posted Nov 5, 2018
Authored by wvu, Robert Tappan Morris, Cliff Stoll | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg.

tags | exploit, worm, overflow
MD5 | ed1eb77912bc6cc0c8fcd9813c7bc2b6
Hak5 WiFi Pineapple Preconfiguration Command Injection 2
Posted Oct 19, 2016
Authored by catatonicprime | Site metasploit.com

This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm.

tags | exploit, worm
advisories | CVE-2015-4624
MD5 | 6decdeddc87bc1b4e2eab5e2ce78b412
Metamorphic Worms: Can They Remain Hidden?
Posted Feb 2, 2015
Authored by Reethi Kotti

Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest.

tags | paper, worm
MD5 | 4ae6e561c0c9dbfec13ce2965d4d8a49
Linksys E-Series TheMoon Remote Command Injection
Posted Apr 5, 2014
Authored by Michael Messner, Rew, juan vazquez, infodox, Johannes Ullrich | Site metasploit.com

Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5.

tags | exploit, worm
MD5 | efd9a1fb2aa6013c587f6a0d62ca6b44
Linksys Worm Remote Root
Posted Feb 17, 2014
Authored by infodox

Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi.

tags | exploit, worm, cgi, proof of concept
MD5 | 98029f878e6fe6748f2a3f31170306c5
Linksys E-Series Remote Code Execution
Posted Feb 17, 2014
Authored by Rew

Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm.

tags | exploit, worm, remote
MD5 | e5e8a82bab2ad32c6f6fbad03561fa32
To Kill A Centrifuge
Posted Nov 21, 2013
Authored by Ralph Langner | Site langner.com

Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve.

tags | paper, worm
MD5 | 378b0d6b52e08452f849a30292b24bad
Wormtrack Network IDS 0.1
Posted Nov 10, 2011
Authored by Aleksandr Brodskiy | Site code.google.com

Wormtrack is a network IDS that helps detect scanning worms on a local area network by monitoring anomalous ARP traffic. This allows detection of scanning threats on the network, without having privileged access on a switch to set up a dedicated monitor port, nor does it require a constant updating of the rules engine to address new threats.

tags | tool, worm, local, intrusion detection
systems | unix
MD5 | 82df762231b40c0bacfb4861cb2b105c
PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution
Posted May 5, 2010
Authored by Michael Brooks

PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit.

tags | exploit, worm, remote, php, code execution
MD5 | eb272c6ff1c00e0c3cdc8c49150c4be4
LPRng use_syslog Remote Format String Vulnerability
Posted Feb 17, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin".

tags | exploit, worm
systems | linux, redhat
advisories | CVE-2000-0917
MD5 | 6d35b4aae06d6486bf87ed8f10cfbfb4
Sasser Worm avserve FTP PORT Buffer Overflow
Posted Nov 26, 2009
Authored by patrick, Val Smith, chamuco | Site metasploit.com

This Metasploit module exploits the FTP server component of the Sasser worm. By sending an overly long PORT command the stack can be overwritten.

tags | exploit, worm
MD5 | d43c04ad521b75f49917fecff05e6333
Page 1 of 7
Back12345Next

File Archive:

May 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    1 Files
  • 2
    May 2nd
    4 Files
  • 3
    May 3rd
    26 Files
  • 4
    May 4th
    17 Files
  • 5
    May 5th
    3 Files
  • 6
    May 6th
    32 Files
  • 7
    May 7th
    11 Files
  • 8
    May 8th
    2 Files
  • 9
    May 9th
    2 Files
  • 10
    May 10th
    13 Files
  • 11
    May 11th
    17 Files
  • 12
    May 12th
    22 Files
  • 13
    May 13th
    11 Files
  • 14
    May 14th
    9 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close