exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 62 of 62 RSS Feed

Files Date: 2000-09-07 to 2000-09-08

ufs-restore.c
Posted Sep 7, 2000
Site lsd-pl.net

/usr/lib/fs/ufs/ufsrestore local root exploit for solaris 2.5 2.5.1 2.6 sparc.

tags | exploit, local, root
systems | solaris
SHA-256 | 80467df9fca55b2f287adf6301e0f2398b11ef06b61616b6dc7f7caa4a2c78f0
xsun.c
Posted Sep 7, 2000
Site lsd-pl.net

/usr/openwin/bin/xsun local root exploit for solaris 2.6 2.7 sparc.

tags | exploit, local, root
systems | solaris
SHA-256 | 88c632fa3e55f9fc3d54eaae97573694c5c6322ebe5ccbab3ff94cc1b40fe54f
libc.c
Posted Sep 7, 2000
Site lsd-pl.net

libc.so getopt() local root exploit for Solaris 2.4 2.5 2.5.1 sparc.

tags | exploit, local, root
systems | solaris
SHA-256 | 3dd191705466a68f47701499f678fba580ad6bcfe6753bfebbc3b90a8bc511ea
libxt.c
Posted Sep 7, 2000
Site lsd-pl.net

libxt.so local root exploit for Solaris 2.4 2.5 2.5.1 sparc.

tags | exploit, local, root
systems | solaris
SHA-256 | 55abfd1c75e24c49bf488d00d73ad585ab162c84d3da7591e2d4a5b2c2c89645
passwd.c
Posted Sep 7, 2000
Site lsd-pl.net

/bin/passwd local root exploit for Solaris 2.5 / 2.5.1.

tags | exploit, local, root
systems | solaris
SHA-256 | b12610ad2a8bcaab4c18eb86db41a0a628cf2cedbb337b7175c1aa6cd35d96de
dtprint-info.c
Posted Sep 7, 2000
Site lsd-pl.net

/usr/dt/bin/dtprintinfo local root exploit for Solaris 2.6 / 2.7.

tags | exploit, local, root
systems | solaris
SHA-256 | 12fdb49dd2478724c987e7bdd270169964f613321f4174e0f2c6c4ebf2fbe8f4
msw2ktelnetdos.sh
Posted Sep 7, 2000
Authored by WC

Windows 2000 telnet server denial of service exploit.

tags | exploit, denial of service
systems | windows
SHA-256 | 4b4ac82588b827afa52230a5621bf5b7eff2d4b62e97dd799a095d1aa6e8cf1f
awcrash.c
Posted Sep 7, 2000
Authored by WC

awcrash.c exploits a buffer overflow vulnerability in Windows 95 and 98 which will result in a crash if a filename with an extension longer that 232 characters is accessed. Although arbitrary code could be executed via this manner, it would have to be composed of valid filename character values only.

tags | exploit, overflow, arbitrary
systems | windows
SHA-256 | 7ad7a060484ff8053e615253a0723a73a32a083f94fe5194af600dcb8126a5e4
adv_telnet1.txt
Posted Sep 7, 2000
Authored by Meliksah Ozoral | Site meliksah.net

Hyperterminal, the default telnet program on Windows 98, contains a buffer overflow vulnerability. It is possible to exploit via IE using a long telnet: URL.

tags | exploit, overflow
systems | windows
SHA-256 | 8b90845eac862f8b4a616ef0ba0cd3928cdcaecbb16e67ea6204413e73f639bd
ms00-064
Posted Sep 7, 2000

Microsoft Security Bulletin (MS00-064) - Microsoft has released a patch for the "Unicast Service Race Condition" vulnerability in Microsoft Windows Media Services. The vulnerability allows a malicious user to prevent an affected Windows Media Server from providing service. Microsoft FAQ on this issue available here.

systems | windows
SHA-256 | 8d93b0c83caa16650f21c3772df0da7bcba6fde74d8115ee1df6e698a75d3c93
ms00-065
Posted Sep 7, 2000

Microsoft Security Bulletin (MS00-065) - Microsoft has released a patch for the "Still Image Service Privilege Escalation" buffer overflow vulnerability which allows a user logged onto a Windows 2000 machine from the keyboard to become an administrator on the machine. The Still Image Service is not installed by default, but is automatically installed, via plug-n-play, when a user attaches a still image device (i.e. digital camera, scanner, etc.) to a Windows 2000 host. Microsoft FAQ on this issue avalable here.

tags | overflow
systems | windows
SHA-256 | d5e4e41b9834aff14c44308e5d7e45417c9b5d4756c5030baa6efffc4e5ba53a
telnetfp_0.1.1.tar.gz
Posted Sep 7, 2000
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 32 OS fingerprints.

Changes: New OS fingerprints and bug fixes.
tags | remote
SHA-256 | e83fb59569a1389c70a22f1b784ff37e5e031e4c84a72080ca8a08acbb023d67
Page 3 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close