exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 74 RSS Feed

Files

pm-exploit.c
Posted Jul 28, 2000
Authored by Headflux | Site synnergy.net

Plusmail remote exploit - plusmail fails to check authenticity before creating new accounts.

tags | exploit, remote
SHA-256 | d135ccf5f8a6a9533ff037f70b405c3d3242fbe73307d53c2851b300624a774d
0001-exploits.tgz
Posted Feb 1, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for January, 2000.

tags | exploit
SHA-256 | cf20a80116f44e359c36f1310d2c241720193d078bd1fd5fe61f8611ffb51f6e
rightfax.txt
Posted Feb 1, 2000
Authored by Efrain Torres, lownoise

RightFax Web Client v5.2 allows anyone to hijack user's faxes.

tags | exploit, web
SHA-256 | b1cf8e924a8955fbca00ac2f800a2f581144ff0653bec1c93bfc51551e925f07
fw1_script.tags.txt
Posted Feb 1, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

The "Strip Script Tags" feature in Firewall-1 can be circumvented by adding an extra less than sign before the SCRIPT tag. The code will still execute in both Navigator and Explorer.

tags | exploit
SHA-256 | 63dba9e4776e49be0b9d685899d424e7c95359cd0499b13e8116377966747f78
bruterh.sh
Posted Feb 1, 2000
Authored by Michal Zalewski

Recent PAM implementations allow you to use su to rapidly crack accounts without being logged. Tested on RH 6.1.

tags | exploit
SHA-256 | 4e4445f9726601745b246b699479483fc7dc3fcd4f33a94228ee97377938b11a
autobuse-angel.txt
Posted Feb 1, 2000
Authored by John Daniele

Autobuse.pl and angel.pl both use /tmp insecurely.

tags | exploit
SHA-256 | e96bc5a5d6a58a6d99fdf4f2b48f5919198db48c8383ae0c341ec5531f114acc
bypass.viruscheck.txt
Posted Feb 1, 2000
Authored by Neil Bortnak | Site bortnak.com

Many virus checking software skips directories entitled \\recycled or similar. This allows viruses and trojans a safe haven on many Windows 95, 98, and NT systems. Exploit code included.

tags | exploit, trojan, virus
systems | windows
SHA-256 | 9af5bd16d81c2440188d7267390a604c3a9aeef78af9be14823271983235e84e
pmtu.htm
Posted Feb 1, 2000
Site oliver.efri.hr

An HP-UX 10.30/11.00 system can be used as an IP traffic amplifier. Small amounts of inbound traffic can result in larger amounts of outbound traffic, using ICMP MTU discovery packets.

tags | exploit
systems | hpux
SHA-256 | b3dffec06406efee5100394c7eea5048622424f48ab11e19e3b911f471aaa935
procfs4.htm
Posted Feb 1, 2000
Site oliver.efri.hr

All flavors of BSD have local root procfs holes. Exploit included.

tags | exploit, local, root
systems | bsd
SHA-256 | e80e268b12d42082937d820c1735685b1ec66dfb9078018b2f08715860ebe7c5
subseven.htm
Posted Feb 1, 2000
Site oliver.efri.hr

There is a buffer overflow in Subseven 2.1a causing it to quit quietly, crash, or overwrite variables.

tags | exploit, overflow
SHA-256 | 2f07ff322bd1707e1b2be738ea6088e6ee158ab41f6b739e2469343c59791e72
sms.htm
Posted Feb 1, 2000
Site oliver.efri.hr

SMS 2.0 Remote Control (for Windows NT) introduces a security risk that will allow the attacker to run programs in system context, due to the fact that the executable used for the remote control service is copied to the workstation without any special permission settings to prevent a user from replacing the executable.

tags | exploit, remote
systems | windows
SHA-256 | ecf9194e228fffca1536075875597aa164caa88678a47c7b00c8b7811224195d
mix.htm
Posted Feb 1, 2000
Site oliver.efri.hr

Microimages X server for Windows allows anyone to kill your session and start an xterm on your machine if they know you are using the software.

tags | exploit
systems | windows
SHA-256 | 10a6a6ff142ffc7403a9e257d610ba412944eefa8619914e8a9757e90c52692a
asp8.htm
Posted Feb 1, 2000
Site oliver.efri.hr

Windows NT webservers using ASP can under some circumstances reveal the path of the server. A variable holds information about the internal structure of the website.

tags | exploit, asp
systems | windows
SHA-256 | aba865749f3c5363d49501aae179dd49f09d90b3beee7aa18d9c77e0e0529287
iiscat.c
Posted Feb 1, 2000
Authored by Fredrik Widlund

IIScat exploits the recent Microsoft Index Server vulnerability to read any file on the server.

tags | exploit
SHA-256 | b7c4b6e010dfdef10ec42ca86fdf3e1f5edf403060a1d669be6df35af0740e79
raq2.admin.exploit.txt
Posted Jan 31, 2000
Authored by Skirkham

Exploit for Cobalt Raq2 Server. Requires Site Administrator access to one of the accounts on the server.

tags | exploit
SHA-256 | e125d4926d4f95927681ebfd618602f7d7ff8df1317317b37a9790482e85b21c
qpop-exploit-net.c
Posted Jan 28, 2000
Authored by Missinglnk | Site tribune.intranova.net

A modified version of the original qpopper 3.0beta29 exploit by Zhodiac, added network support (no need for netcat) and allowed the user to specify which command to execute.

tags | exploit
SHA-256 | bcdd1859b2a33b6f0bdced21cd68b20e314cb4ff2fe1dafccab9dfb8f9a3be82
iis4.webhits.txt
Posted Jan 28, 2000
Authored by David Litchfield | Site cerberus-infosec.co.uk

Cerberus Information Security Advisory (CISADV000126) - Internet Information Server 4.0 ships with an ISAPI application webhits.dll that provides hit-highlighting functionality for Index Server. A vulnerability exists in webhits that allows an attacker to break out of the web virtual root file system and gain unathorized access to other files on the same logical disk drive. This vulnerability can also be used to obtain the source of Active Server Pages or any other server side script file which often contain UserIDs and passwords as well as other sensitive information. Vulnerable systems include Microsoft Windows NT 4 running Internet Information Server 4, all service packs. Microsoft FAQ on this issue is here.

tags | exploit, web, root
systems | windows
SHA-256 | 49cac6cfcd5dbdffc3c21f57d7db9112fa25f16289c0f6dd92362fc2b81eef32
spank.txt
Posted Jan 27, 2000
Authored by Tim Yardley

Explanation of the 'spank' attack - a new breed stream/raped. Stream/Raped mearly flooded the host with ack's (or no flags) and came from random ips with random sequence numbers and/or ack numbers. The difference now is that this not only does the previous stuff, but also directly attacks from and to multicast addresses as well.

tags | exploit
SHA-256 | 25a37bfece0acbe778ee130601ca1fda0d9188d98eebaee75e1352130f531bbb
ADMsximap.c
Posted Jan 27, 2000
Authored by ADM, Shane A. Macaulay

Solaris Solstice Internet Mail IMAP4 Server x86 exploit.

tags | exploit, x86
systems | solaris
SHA-256 | adcc570a64ad515dee55499942b44fc76607894ebc9c473d4d7a8654c863de59
qpop-xploit.c
Posted Jan 27, 2000
Authored by Zhodiac | Site hispahack.ccc.de

Remote linux x86 exploit for Qpopper 3.0beta29 and below. (not 2.5.3) Overflows the LIST command and spawns a shell with the UID of the user who logged in (requires valid account), and GID mail.

tags | exploit, remote, overflow, shell, x86
systems | linux
SHA-256 | 6e03060d06070addc039c651e773cc7edd7dfdbf64902dcb1d4ab4b12b4e97df
vpopmail.txt
Posted Jan 27, 2000
Authored by Shane A. Macaulay | Site w00w00.org

w00w00 Security Advisory - qmail-pop3d may pass an overly long command argument to it's password authentication service. When vpopmail is used to authenticate user information a remote attacker may compromise the privilege level that vpopmail is running, naturally root.

tags | exploit, remote, root
SHA-256 | 3bd0074f38eb47b414a84c38444aed7fa25ca801a4f14f89d10b39ad7380dd2d
vmware.htm
Posted Jan 27, 2000
Authored by Harikiri | Site w00w00.org

w00w00 Security Advisory - Linux VMware 1.1.2 Symlink Vulnerability. VMware stores temporary log files within the /tmp directory. It does not check whether all of these files exist prior to creation, resulting in the potential for a symlink attack.

tags | exploit
systems | linux
SHA-256 | da520fa5a7804353f424ed408de54dc3b46708d2f49b82447d0645507cc3049e
skey.htm
Posted Jan 27, 2000
Authored by Harikiri | Site w00w00.org

w00w00 Security Advisory - S/Key & OPIE Database Vulnerability affecting most Unixes (not NetBSD) running skey-2.2. (possibly earlier versions too) allowing offline password cracking.

tags | exploit
systems | netbsd
SHA-256 | 3ae33764fe45486317d0735a5c5fbdb38edd2d5553c4c986a29216ee7e9b8124
qmail-pop3d-vchkpw.c
Posted Jan 27, 2000
Authored by Shane A. Macaulay | Site ktwo.ca

Remote exploit for the inter7 supported vchkpw/vpopmail package for (replacement for chkeckpasswd). Tested on Sol/x86,linux/x86,Fbsd/x86 against linux-2.2.1 and FreeBSD 3.[34]-RELEASE, running vpopmail-3.4.10a/vpopmail-3.4.11[b-e]. Unofficial patch here.

tags | exploit, remote, x86
systems | linux, freebsd
SHA-256 | 96783f06acb089b526184c758e946ec901db1b61ec472cbee7dc24a2094b6765
iis53.htm
Posted Jan 26, 2000
Site oliver.efri.hr

MS IIS 5.0 has problems handling a specific form of URL ending with "ida". The extension ida has been taken from the Bugtraq posting "IIS revealing webdirectories" The problem causes 2 kind of results. The one result is that the server responds with a message like "URL String too long"; "Cannot find the specified path" The other error causes the server to terminate with an Access Violation. When the server "Access violates" it displays as last message.

tags | exploit
SHA-256 | c6301bd7666cad9967d8dafc5ad77f1302a8469ac918b24e757bf1d26a8ed0d1
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close