exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 56 RSS Feed

Files Date: 2007-05-21

suf-v1.1.zip
Posted May 21, 2007
Site loranbase.com

This program can send spoofed UDP packets with a user specified data, source and destination port. For Windows XP versions prior to SP2. Includes Delphi source code.

tags | denial of service, udp, spoof
systems | windows
SHA-256 | bd4242c6c7bce4fc24809fa15081e36d14cdf2202cab3d216c8c38a3bc162b6d
syn-v1.6.zip
Posted May 21, 2007
Site loranbase.com

Syn flooder for Windows XP versions prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 08371b9ac880c3b02c72fbf7f7253ca3d95197f177fbec9238468e3601f9816d
udpflood-v1.0.zip
Posted May 21, 2007
Site loranbase.com

UDP Flooder for Windows 95 and above. It can send udp packets with a user specified data, source and destination port. Includes Delphi source code.

tags | denial of service, udp
systems | windows
SHA-256 | bd346a39aaf24f9e828d6fbd7d3529e7f49eea2dc33ef9234a102b9abcf13044
windowsrat-v1.0.zip
Posted May 21, 2007
Site loranbase.com

WindowsRAT is a small sized dos shell for windows. Just execute the exe on remote computer and connect it with telnet.

tags | remote, denial of service, shell
systems | windows
SHA-256 | 95079a022e0447fadfa904018f9e8e3335ef5426189f856ce83cefbd3afef6bb
smurf-v1.7.zip
Posted May 21, 2007
Site loranbase.com

Smurf for Windows XP takes advantage of networks without broadcast address filtering to flood a remote host with lots of ICMP traffic. For Windows XP versions prior to SP2. Includes Delphi source code.

tags | remote, denial of service
systems | windows
SHA-256 | 9aa5e2899788c6de2159246f9c7eea9b411aca4db98e5b706b38048695ce386d
sin-v1.3.zip
Posted May 21, 2007
Site loranbase.com

This program is a spoofed IRC nuker. For Windows XP versions prior to SP2. Includes Delphi source.

tags | denial of service, spoof
systems | windows
SHA-256 | cf4598606e7ec6528ad48e13aef00e638ef552f8af6f0c873a337e75a2f7c03f
pingflood-v1.0.zip
Posted May 21, 2007
Site loranbase.com

An ICMP Type 8 (ping) flooder for Windows 95 and above. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 4eeee02e8f122c7a16100f6fde75cfc7e18ec63370facb7f56928c7759395071
kod-v1.3.zip
Posted May 21, 2007
Site loranbase.com

Kiss of Death denial of service attack. Only works on Windows XP prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | bd51e7f7f622a7c28cc58dff4607981e7d04d4dae47555fcdc2bfa4883366c32
jolt2-v1.3.zip
Posted May 21, 2007
Site loranbase.com

This program is the port of jolt2 attack to Windows XP for versions prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | fab47a4257313739a2c082a7ac1a8cf4d019cad352005ac19e177b6176cbf218
igmpbomb-v1.4.zip
Posted May 21, 2007
Site loranbase.com

This program sends oversized IGMP packets. This causes bluescreens and crashes Windows 98 boxes. Works with winsock2 (Windows 98 and above). Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | d1a245a1aeda797aab17e60c4907a711e66273f790fe5d8bf1a134c5db7030d4
bonk-v1.1.zip
Posted May 21, 2007
Site loranbase.com

This program is the port of bonk attack to Windows XP versions prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 7a4bdb9008edfd098eca1bca2c37bde4eef7ae3dd1271967030ba4a7e8face0f
ath-v1.3.zip
Posted May 21, 2007
Site loranbase.com

Sends an icmp echo request including +++ATH0 string in its ICMP data. This data resets vulnerable modems if victim replies the request. Only works on Windows XP prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 292e5a0f49bc5fa0f5224e5e7ade8b35988d806db25ed0868b2f54bc5ed760c9
Ubuntu Security Notice 436-2
Posted May 21, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 436-2 - USN-436-1 fixed a vulnerability in KTorrent. The original fix for path traversal was incomplete, allowing for alternate vectors of attack. Bryan Burns of Juniper Networks discovered that KTorrent did not correctly validate the destination file paths nor the HAVE statements sent by torrent peers. A malicious remote peer could send specially crafted messages to overwrite files or execute arbitrary code with user privileges.

tags | advisory, remote, arbitrary
systems | linux, juniper, ubuntu
advisories | CVE-2007-1799
SHA-256 | 9639d94610747e9a97954734b5c101e1362174b07ea0275b2e5704d1ab214c07
VMware Security Advisory 2007-0004.1
Posted May 21, 2007
Authored by VMware | Site vmware.com

VMware Security Advisory - Multiple denial of service issues along with a directory traversal vulnerability has been fixed.

tags | advisory, denial of service
advisories | CVE-2007-1069, CVE-2007-1337, CVE-2007-1877, CVE-2007-1876, CVE-2007-1744
SHA-256 | a678b12e0b8ba30554e0498fe1d9269a513afd99bd97dd8c32508c86d25ff94e
REWTERZ-20070518.txt
Posted May 21, 2007
Authored by Muhammed Ahmed Siddiqui | Site rewterz.com

rewterz has discovered a critical vulnerability in Hidden Administrator. This vulnerability allows a remote attacker to execute arbitrary code in the context of the user who executed Hidden Administrator. Versions 1.7 and below are affected.

tags | advisory, remote, arbitrary
SHA-256 | 526e6ff2a121cacdb5f197605ddc3c3c999ac066ac8b15c49da5c127dc47f66a
ASPR-2007-05-14-1.txt
Posted May 21, 2007
Site acrossecurity.com

ACROS Security Problem Report #2007-05-14-1 - There is a session fixation vulnerability in HP Systems Insight Manager 4.2 and 5.0 SP4/5 (IM) that allows an attacker to gain administrative access to IM console. As a result, the attacker can take complete administrative control over all managed systems, upload and execute malicious code on them, extract any information from them and disable them at her will.

tags | advisory
SHA-256 | d39d5adb853db233faf38cc0069a7c6e5065e71f431d97ee7d5b6666e9216a87
packeteer.txt
Posted May 21, 2007
Authored by nnposter

The TCP/IP stack of Packeteer PacketShaper is generating predictable initial sequence numbers.

tags | advisory, tcp
SHA-256 | 00f76ddef98562439629259477f616b9fd65049dfcce2d8625c25cc2eb968378
OpenPKG Security Advisory 2007.17
Posted May 21, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - A Denial of Service (DoS) vulnerability exists in the Ratbox IRC Daemon, versions up to and including 2.2.5. Too many pending connections to the server from a single unknown client could result in a resource starvation.

tags | advisory, denial of service
SHA-256 | 7f887dd38929665069a85a9b5ef03b27f0f850f52837b0cb36cf19a9a5dac310
OpenPKG Security Advisory 2007.15
Posted May 21, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - A Denial of Service (DoS) vulnerability exists in the routing daemon Quagga, versions up to and including 0.99.6. The Quagga bgpd(8) daemon is vulnerable as configured peers may cause it to abort because of an assertion which can be triggered by peers by sending an "UPDATE" message with a specially crafted, malformed Multi-Protocol reachable/unreachable "NLRI" attribute.

tags | advisory, denial of service, protocol
advisories | CVE-2007-1995
SHA-256 | 12492b05bc1c9dd6d3ab14537255e48285c3a6cb1a68486580a7e74f2e78c677
Ubuntu Security Notice 461-1
Posted May 21, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 461-1 - It was discovered that Quagga did not correctly verify length information sent from configured peers. Remote malicious peers could send a specially crafted UPDATE message which would cause bgpd to abort, leading to a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2007-1995
SHA-256 | 3adbef0532f09c1add5f433acda4c39a1efb76b001e83facf47faa01db9d6cd7
Mandriva Linux Security Advisory 2007.105
Posted May 21, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The APOP functionality in fetchmail's POP3 client implementation was validating the APOP challenge too lightly, accepting random garbage as a POP3 server's APOP challenge, rather than insisting it conform to RFC-822 specifications. As a result of this flaw, it made man-in-the-middle attacks easier than necessary to retrieve the first few characters of the APOP secret, allowing them to potentially brute force the remaining characters easier than should be possible.

tags | advisory
systems | linux, mandriva
advisories | CVE-2007-1558
SHA-256 | 8cdc70d5729c5675cf32e4e2d8660e221d4d94e509a0e9ae2fb7c330fc5f4e4d
Debian Linux Security Advisory 1294-1
Posted May 21, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1294-1 - Several vulnerabilities have been discovered in the X Window System, which may lead to privilege escalation.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2007-1003, CVE-2007-1351, CVE-2007-1352, CVE-2007-1667
SHA-256 | 041774f5d08c1a2248f7f5bfafc8394a37277b57085add582ddcb8a761ddaf62
redoable-xss.txt
Posted May 21, 2007
Authored by John Martinelli from ISRD.com | Site redlevel.org

Redoable version 1.2 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 7d0dd4340c9b0f1d1ef16a94a5377aa35e45b904f488be9ab6c10246c83ca5be
OpenPKG Security Advisory 2007.13
Posted May 21, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - As confirmed by the vendor, a Denial of Service (DoS) vulnerability exists in the PNG image format library libpng. The bug is a NULL-pointer-dereference vulnerability involving palette images with a malformed "tRNS" PNG chunk, i.e., one with a bad CRC value. This bug can, at a minimum, cause crashes in applications simply by displaying a malformed image.

tags | advisory, denial of service
advisories | CVE-2007-2445
SHA-256 | 63c3acc1ae79ee72024eb0a8d12f1655d8911415ac30f629fe2c5728b871eecc
HP Security Bulletin 2007-14.22
Posted May 21, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA). Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin.

tags | advisory, vulnerability
SHA-256 | 2d4ed46e71de872ee2ca1670abd1a09bb45e06c32e9dd797bd8d59004657dec4
Page 1 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close