Exploit the possiblities
Showing 1 - 25 of 59 RSS Feed

Files

0003-exploits.tgz
Posted May 19, 2000
Authored by Todd J.

Packet Storm new exploits for March, 2000.

tags | exploit
MD5 | 95701a59743701a83fb0299332670474
win98-bluescreen.txt
Posted Apr 20, 2000
Authored by RUBINHO

More ways to abuse c|/con/con - In mail with html tags, in normal html, serv-u ftp, and win registry.

tags | exploit, registry
MD5 | c0b4300165f98b796552d4d6959b3013
cgimail.txt
Posted Apr 20, 2000
Authored by Chopsui-cide

Anyone who can execute CGIMailer (anyone who can use the forms that use CGIMailer) can specify what configuration file to use and this can be any file on the system CGIMailer is running on. This allows for the existance of private files to be detected. There are more dangerous implications though: this vulnerability could possibly be exploited to obtain private files from the target system. If there is an FTP server running on the target system on which an attacker has upload priviledges, he/she could upload a malicious configuration file, and then run it using CGIMailer. Configuration files can be used to send files to the attacker via e-mail (among other things).

tags | exploit
MD5 | f7de5eda40daf04436bf842b5da50d4e
ircii_exploit.txt
Posted Apr 20, 2000
Authored by Bladi, Almudena

Two exploits are included in this. It is a dcc chat buffer overflow in seperate exploits for linux and mirc.

tags | exploit, overflow
systems | linux
MD5 | a5f3255a68ccceb208d72b8d2e5f1fbe
exp-wmcd.c
Posted Apr 19, 2000
Authored by Dethy

Local exploit for Linux Mandrake 7.0's wmcdplay 1.0 beta 1. Unlike the Teso exploit for wmcdplay, this code exploits the -position argument.

tags | exploit, local
systems | linux, mandrake
MD5 | 785feed4909216091acb3e38b39c0624
x11amp.txt
Posted Apr 19, 2000
Authored by Grampa Elite

Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.

tags | exploit
MD5 | 6a3502236ea9eb76b2781d450922a5bb
irix-objectserver.c
Posted Apr 4, 2000
Authored by Marcy

SGI IRIX objectserver remote exploit - Remotely adds account to the IRIX system. Patched February, 1998. Tested on IRIX 5.2, 5.3, 6.0.1, 6.1 and even 6.2.

tags | exploit, remote
systems | irix
MD5 | f8f3902c4810ad26e5c2a990e4c83666
rpc.AMD.FreeBSD3.2REL.tar.gz
Posted Apr 1, 2000
Authored by Anathema

FreeBSD 3.2-REL AMD remote root exploit.

tags | exploit, remote, root
systems | freebsd
MD5 | 351208884d8865d37e90e355a1e8be3e
icadecrypt.c.txt
Posted Apr 1, 2000
Authored by Dug Song | Site monkey.org

icadecrypt cracks the weak hash encryption on stored Citrix ICA passwords (in appsrv.ini).

tags | exploit
MD5 | de9aa7ad940c82d0edd4703d36cd2948
ass.pl
Posted Mar 31, 2000
Site cs.uni-potsdam.de

Atsacd local root exploit. Halloween linux, possibly others affected.

tags | exploit, local, root
systems | linux
MD5 | f83769b2ead1d2061f05cddbbc0c92b8
NXT-Howto.txt
Posted Mar 30, 2000
Authored by E-Mind | Site hack.co.za

BIND 8.2 - 8.2.2 remote root exploit how-to. Explains how to manipulate DNS records on a primary name server to exploit this vulnerability.

tags | exploit, remote, root
MD5 | 7d9cc546371b262932998b08e87fb80f
tpgnrock.c
Posted Mar 29, 2000
Authored by Presto

Crash Exploit for AnalogX SimpleServer v1.03

tags | exploit
MD5 | c2fde24f4e43c6cbf56263a39c56d0f7
winmail305.txt
Posted Mar 29, 2000
Authored by Frankie Zie

Winmail 3.05 for Windows NT allows any file on the system to be read. Exploit code included.

tags | exploit
systems | windows, nt
MD5 | a5d9914f57188dd6dd5ca0b928c4145c
kreatur.pl
Posted Mar 29, 2000
Site cs.uni-potsdam.de

kreatecd local root-exploit helper script - Halloween Linux 4.0 and SuSE 6.0 - 6.3.

tags | exploit, local, root
systems | linux, suse
MD5 | 29ce5fe6509e50d7519f3d4adf34192b
position.c
Posted Mar 29, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

Overflows the -position arg buffer in wmcdplay due to a bad sprintf call.

tags | exploit, overflow
MD5 | 39c483ebee434226c7d9214e09d580c9
domain-socket.c
Posted Mar 26, 2000
Site hack.co.za

Domain Socket Denial of Service Vulnerability affecting Linux kernel 2.3.99-pre2, Linux kernel 2.2.14, Linux kernel 2.2.12, RedHat Linux 6.2, RedHat Linux 6.1 sparc, RedHat Linux 6.1 i386, and RedHat Linux 6.1 alpha.

tags | exploit, denial of service, kernel
systems | linux, redhat
MD5 | d499f5779e57039381df358aabe37d48
browser-bug.txt
Posted Mar 26, 2000
Authored by SET-FW | Site set-ezine.org

Linux web browsers are affected by accessing devices, this bug may be considered similar to the \con\con bug except that the technological superiority of Linux will prevent a system crash.

tags | exploit, web
systems | linux
MD5 | 46f472e7290883f774edf84d22cad5e0
win98-con-lan.txt
Posted Mar 25, 2000
Authored by Toxic Waste

A windows 9x machine that shares any of its files, even read only, can be crashed remotely via the con/con issue.

tags | exploit
systems | windows, 9x
MD5 | 41a940671ba3803de8923b03b899962f
netscape-wp.dir-list
Posted Mar 24, 2000
Authored by Fobic | Site zsh.stupidphat.com

ZSH Advisory - Netscape WebPublisher Allows Directory Listing and Access. Netscape Webpublisher is an addon to Netscape's Enterprise webserver which allows remote file modifications, uploads and downloads. A third party user can access the WebPublisher via downloading a number of java applets and the webserver's directory structure without having a valid account on the system. Netscape v3.5.1 / 3.6 SP1-3 under solaris are vulnerable.

tags | exploit, java, remote
systems | solaris
MD5 | 5667dd97bbfa81899150d284dc189197
wmcdplay-exp.c
Posted Mar 24, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

5 exploits for wmcdplay (A cd player designed for WindowMaker - Release 1.0 Beta1) Tested on Mandrake 7.0.

tags | exploit
systems | linux, mandrake
MD5 | 3cf6ace990d3090acd8dd556a16b0284
pam-mdk.c
Posted Mar 21, 2000
Authored by Paulo Ribeiro

PAM/userhelper exploit - Ported to Mandrake 6.1. Also works on Red Hat 6.0 and 6.1, gives uid 0.

tags | exploit
systems | linux, redhat, mandrake
MD5 | 503fb14445e29d4a77c3a9234a5f26c8
spoon.c
Posted Mar 21, 2000
Authored by Obecian | Site celerity.bartoli.org

spoon.c - (ab)use dig.cgi to proxy DNS dig requests. Useful to request a zone transfer without revealing your IP.

tags | exploit, cgi
MD5 | babceccd9425d38d1d485e3dcb0404f7
gpm-root.sh
Posted Mar 20, 2000
Site hack.co.za

A vulnerability exists in the gpm-root program, part of the gpm package. A local console user can obtain root. Tested under RedHat Linux (6.2 / 6.1 / 6.0 / 6.0 / 5.2 / 5.1) and Debian Linux (2.2 / 2.1 / 2.0).

tags | exploit, local, root
systems | linux, redhat, debian
MD5 | 140d93251d1db3a2ddcaa1202e637d8b
imexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween 4 local root exploit for imwheel-solo. Other distros maybe affected as well.

tags | exploit, local, root
MD5 | c3666f47df53ac801b0213bec8395af0
led_color.c
Posted Mar 20, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

Overflows the -l arg buffer in wmcdplay due to a bad sprintf call. Tested on Mandrake.

tags | exploit, overflow
systems | linux, mandrake
MD5 | a2c8588ba1ab3eff35b1566532d99a8e
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Language Bugs Infest Downstream Software
Posted Dec 11, 2017

tags | headline, flaw
German Spy Agency Warns Of Chinese LinkedIn Espionage
Posted Dec 11, 2017

tags | headline, government, china, cyberwar, germany, spyware, social
Dynamics 365 Sandbox Leaked TLS Certificates
Posted Dec 11, 2017

tags | headline, privacy, microsoft, data loss, flaw, cryptography
Keylogger Uncovered On Hundreds Of HP PCs
Posted Dec 11, 2017

tags | headline, flaw, spyware, backdoor
PlexCoin Scam Founder Sentenced To Jail And Fined $10k
Posted Dec 10, 2017

tags | headline, cybercrime, fraud, scam, cryptography
Google Lifts Lid On FBI Data Requests: Now You Can Read Actual Letters Online
Posted Dec 9, 2017

tags | headline, government, privacy, usa, google, fbi
Android Flaw Lets Attack Code Slip Into Signed Apps
Posted Dec 9, 2017

tags | headline, malware, phone, flaw, google
Millions Stolen In NiceHash Bitcoin Heist
Posted Dec 9, 2017

tags | headline, hacker, cybercrime, fraud, cryptography
Apple HomeKit Flaw Left Smart Gadgets Vulnerable
Posted Dec 9, 2017

tags | headline, flaw, apple
Intel Management Engine Pwned By Buffer Overflow
Posted Dec 7, 2017

tags | headline, hacker, flaw, conference, intel
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close