what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 74 RSS Feed

Files

inetserv.htm
Posted Jan 26, 2000
Site oliver.efri.hr

InetServ 3.0 (Windows NT) advisory and remote exploit.

tags | exploit, remote
systems | windows
SHA-256 | cc2c208ea5bc9b1947f2e030b63f6be5825fda3e7e55165f78c314720c1ebd67
krnl110.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Stream.c summary - DoS attack due to bug in many unix kernels, including Linux, Solaris, and all of the BSDs.

tags | exploit, kernel
systems | linux, unix, solaris
SHA-256 | 7cff59a33278aed639fdb203cfa2c7908bff64e6c40976ab8b6cbef24bc3e0b9
nortel.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Nortel's new Contivity seris extranet switches give administrators the ability to enable a small HTTP server and use Nortel's web based administration utility to handle configuration and maitenance. The server runs atop the VxWorks operating system and is located in the directory /system/manage. A CGI application, /system/manage/cgi/cgiproc that is used to display the administration html pages does not properly authenticate users prior to processing requests. An intruder can view any file on the switch without logging in.

tags | exploit, web, cgi
SHA-256 | e6470da7422c75f82642fd4a9d29e044d0ee71eaad5f6c6e169743abe355b388
rdisk.htm
Posted Jan 26, 2000
Site oliver.efri.hr

There exists a vulnerability in rdisk (Windows NT) which causes the contents of the registry hives to be exposed to Everyone during updating of the repair info.

tags | exploit, registry
systems | windows
SHA-256 | d9d891c8304ca57c3de11b9e0bbc9cea3224a33302ce1296a8a19047a3d8f5e0
rtf.htm
Posted Jan 26, 2000
Site oliver.efri.hr

RTF files consist of text and control information. The control information is specified via directives called control words. The default RTF reader that ships as part of many Windows platforms has an unchecked buffer in the portion of the reader that parses control words. If an RTF file contains a specially-malformed control word, it could cause the application to crash.

tags | exploit
systems | windows
SHA-256 | 27ba30c0f7c1e053fdc20342b41f7fbf0815631ae08c4738c0819002d49a196f
smtp2.htm
Posted Jan 26, 2000
Site oliver.efri.hr

USSR Labs found following. A memory leak exists in the Super Mail Transfer Package that may cause an NT host to stop functioning and/or need to be rebooted. The memory leak may occur when you connect to the SMTP port, all information you send to the system will be stored in memory, and SMTP support multiples HELO/ MAIL FROM/ RCPT TO / DATA in the same connection. If you did multiple HELO/ MAIL FROM/ RCPT TO / DATA in the same connection the memory may not be deallocated. This condition may cause the computer to stop functioning the moment memory runs out.

tags | exploit, memory leak
SHA-256 | 098828bc67aee64abdd87dabcd122bf51262d7df84bd843eef9f319e6f289b2b
tb2.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Timbuktu Pro 32 (TB2) from Netopia sends user IDs and passwords in clear text. When TB2 is used to remote control a machine that is not logged in or is locked, any user ID and password that is typed in is sent in clear text. A malicious user on the network can "sniff" the packets and gain the NT User IDs and passwords of any one using TB2 to remotely control a NT machine.

tags | exploit, remote
SHA-256 | 7409f6db13593aa2d56a2998e62d44ee0c31c668b0139f93213cebc734a8677c
website.htm
Posted Jan 26, 2000
Site oliver.efri.hr

WebSite Pro is also revealing the webdirectory of each Website by a simple command line. This bug is similar to the "IIS revealing webdirectories" bug reported. On WebSitePro the diference ist the way you retrieve the path.

tags | exploit
SHA-256 | 70b108388a2f189b10b9a7b6a8056ebcc7c966497f269b5fed0b43153d271e8d
yahoo2.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Jaynus Jaynus found following. He read over the ICQ overflow that had been found so he was curious if this existed in any other clients. Upon testing the below URL, yahoo pager/messenger crashed in the same was as ICQ.

tags | exploit, overflow
SHA-256 | afc1794d389c2f332846bb6da3abde5c120db7e53c76005bc13d3854a685e7bb
omnis.txt
Posted Jan 23, 2000
Authored by Eric Stevens

Vulnerabilities in OMNIS, affecting many applications. Omnis is a Rapid Application Development environment which is portable to Win, Mac, and Linux. One of the features that Omnis provides for attaching to the database is the ability to encrypt fields, and obscure them from prying eyes. In actuality, this encryption is extremely weak, and I accidentally discovered the encryption technique and post a detailed explanation of it here.

tags | exploit, vulnerability
systems | linux
SHA-256 | cce1376a97274da7aea1f4e10d420680a764f89a62c9ccbe2082d9a76171b73e
checkpoint-fw1.vuln.txt
Posted Jan 22, 2000

Outlines two basic vulnerabilities in Checkpoint's Firewall-1. The first is an authentication problem which allows easy brute force attacks; the second allows you to use the first to remotely administer someone else's firewall without their knowledge.

tags | exploit, vulnerability
SHA-256 | ab7c8cb66cb9a649b887f0163e7e820092e38e0740ba667e59b9a4fe71b8851a
uw-ppptalk.c
Posted Jan 22, 2000
Authored by Shane A. Macaulay

UnixWare 7 exploit for /usr/bin/ppptalk.

tags | exploit
systems | unixware
SHA-256 | 10de24aa93dd63689988d573d193dad1b34aff38e4811d4a1f12d1f1b2c411f6
vcasel.htm
Posted Jan 22, 2000
Site oliver.efri.hr

Vcasel (Visual Casel) is apparently intended as some sort of addon to Novell Netware 3.X and above. The program does succeed in limiting the names of the files executed, but there is no path verification.

tags | exploit
SHA-256 | 1afd8be0e8218ce48904ec923ced26cfb2a7d6b7676222d7ce79c396c4c63c18
vwall3.htm
Posted Jan 22, 2000
Site oliver.efri.hr

Sending an SMTP message with a malformed attachment, it is possible for malicious code to avoid detection by Trend Micro's InterScan SMTP scanner version 3.0.1 for Solaris. Other versions may be affected as well, but were not tested.

tags | exploit
systems | solaris
SHA-256 | 52dbfec4c390c07ad3b30020cf3ca2c0d7eced0ce691fdf7b2622e5b31dddd6b
bind15.htm
Posted Jan 21, 2000
Site oliver.efri.hr

If you're running BIND 8.2.2, and you have the victim.dom name servers in your cache, and victim.dom changes its server names, then any user who can make recursive queries through your cache can break your victim.dom lookups until the old records time out. The complete attack is one brief burst of legitimate packets. This is, of course, not as disastrous as BIND's next buffer overflow, but it's still an interesting example of how an attacker can use BIND's bogus "credibility" mechanism to exacerbate the effects of a seemingly minor bug.

tags | exploit, overflow
SHA-256 | c72ec0dd61841711d365e087961f01b3cc66fb2e349bb4274b3c897e6f364742
icq11.htm
Posted Jan 21, 2000
Site oliver.efri.hr

OS tested was Windows 2000 and ICQ v99b 1.1.1.1. ICQ is a very popular chat client that is affected by a exploitable buffer overflow when it parses an URL sent by another user. What this means is that arbitary assembly code can be run on the remote machine.

tags | exploit, remote, overflow
systems | windows
SHA-256 | c56d1f4e56219b6d49de977af302c96651bb3965e3248d8a7976706cedb0949c
update.htm
Posted Jan 21, 2000
Site oliver.efri.hr

orel Linux comes with a program called "Corel Update" to manage the ".deb" files. This X oriented program is setuid root. The program is "get_it" and it's located in the /usr/X11R6/bin directory. If you can run it, it's easy to get root privileges in your system.

tags | exploit, root
systems | linux
SHA-256 | 638e23401a5d45ff0435f80bdbe0006c13f71306efdb836fc11c7244771cbff7
bindview.nt-local.txt
Posted Jan 14, 2000
Site bindview.com

Due to a flaw in the NtImpersonateClientOfPort Windows NT 4 system call, any local user on a machine is able to impersonate any other user on the machine, including LocalSystem. We have written a demonstration exploit which allows any user to spawn a cmd.exe window as LocalSystem. All Windows NT 4.0 systems up to and including SP6a are vulnerable.

tags | exploit, local
systems | windows
SHA-256 | 1ff0cb5ad962f1a532acb051aa8b1243c8f84d3274a8fd975eedf2cc9d380959
mi009en.htm
Posted Jan 14, 2000
Authored by Flow | Site hispahack.ccc.de

RESTRICTING A RESTRICTED FTP - How to exploit common misconfigurations in wu-ftpd that allows usersi who may not have permission to login to execute arbitrary code on the FTP server.

tags | exploit, arbitrary
SHA-256 | 43bd58be0b34b0860a305a158d415d0aef434ee84693ddc0a6bfd1b1a8a0472a
mi019en.htm
Posted Jan 14, 2000
Authored by Jfs | Site hispahack.ccc.de

A practical vulnerability analysis (How The PcWeek crack was done).

tags | exploit
SHA-256 | 5b0caddba18fc1cf57f100b5941b4cf7285e86c8efa5b46556d32dbe02b0543a
midikeys.htm
Posted Jan 14, 2000
Site oliver.efri.hr

The IRIX setuid root binary midikeys can be used to read any file on the system using its gui interface. It can also be used to edit anyfile on the system.

tags | exploit, root
systems | irix
SHA-256 | 03bb247d0172ed1737bba3d4e4230b04f38a9de92fd5b0752da235aba0b587e5
recover.htm
Posted Jan 14, 2000
Site oliver.efri.hr

The 'recover' command in Solstice Backup (Sun's relabeled version of Legato Networker) on a Unix machine authorized to perform restore operations from the backup server can be used to by a normal user to restore any file accessible to the machine in a readable-to-them state (although it cannot be used to overwrite system files). This can be used to get your own copy of /etc/shadow for password cracking purposes.

tags | exploit
systems | unix
SHA-256 | 2e259a1a7a110ea91a7f43f1a77dca658c78b5957225555efa344780d52d02ba
vi.htm
Posted Jan 14, 2000
Site oliver.efri.hr

Vi uses /tmp insecurely on OpenBSD, FreeBSD and Debian. This has been fixed in FreeBSD 2.2-STABLE, 3.4-STABLE and 4.0-CURRENT (04.01.2000).

tags | exploit
systems | linux, freebsd, openbsd, debian
SHA-256 | 0a66d13e1b0672071fa86fd276e6f2033173b2a6646c37fc1fe6802cb098a9db
supermail.nt.txt
Posted Jan 13, 2000
Authored by Underground Security Systems Research

A memory leak exists in the Super Mail Transfer Package for Windows NT that may cause an NT host to stop functioning and/or need to be rebooted. DoS exploit description included.

tags | exploit, memory leak
systems | windows
SHA-256 | a01aab1ae7b5840b51fcf1072d89ef3b4fcf4c3f873d2009fc282fd6014ac277
qib.tgz
Posted Jan 12, 2000
Authored by Dildog

QIB - Remote access through Linux LPD. Binds a shell to port 26092.

tags | exploit, remote, shell
systems | linux
SHA-256 | 97afaabada366abf97982811fdd724de55e48453cce1302244854e8ba62fadfc
Page 2 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close