what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 108 RSS Feed

Files

5niffi7.c
Posted May 27, 2000
Authored by Michel Kaempf

5niffi7.c - Remote root exploit for sniffit (-L mail) 0.3.7.beta on Debian 2.2. Includes a detailed explanation of how the exploit works.

tags | exploit, remote, root
systems | linux, debian
SHA-256 | 024ddcc5e92f17b5a21a0b1e29b8e09fbda58d5ab78d29e5646d0557c2a197ff
Animal.c
Posted May 27, 2000
Authored by Gramble

Gauntlet firewall remote proof of concept code, tested against BSDI.

tags | exploit, remote, proof of concept
SHA-256 | e083c880ad28d303ffd72c300afb16fe308a4792b9bb9ff3042cfa2e79c3b4d2
xaosexp.c
Posted May 27, 2000
Authored by DiGiT | Site security.is

/usr/bin/xaos local root buffer overflow exploit. Works on suse 6.1, and could be modified for 6.2.

tags | exploit, overflow, local, root
systems | linux, suse
SHA-256 | 41063c66d14d76b252432334dc2031dd8d874cf94f253caf555c2a55974289a0
ssibug
Posted May 27, 2000
Authored by DiGiT | Site security.is

The thttpd web server comes with a CGI script called /cgi-bin/ssi which allows any file on the system to be read. Exploit URL included.

tags | exploit, web, cgi
SHA-256 | 25679f8183d70073b7bf52ab21666b2b31569ed14056ca67fae4e26e726dd272
elm_again.c
Posted May 27, 2000
Authored by vade79, realhalo | Site realhalo.org

elm_again.c exploits another buffer overflow in elm v2.5 giving a gid=12 shell if /usr/bin/elm is SGID. Tested on Slackware 3.6 and RedHat on elm2.5PL3.

tags | exploit, overflow, shell
systems | linux, redhat, slackware
SHA-256 | a63af30bfc97eb80e07b9f38915a5c778463721196ce3c7f4a6bf9172b6729c7
CISADV000524a.txt
Posted May 27, 2000
Site cerberus-infosec.co.uk

Cerberus Information Security Advisory (CISADV000524a) - The Cerberus Security Team has discovered a serious security flaw with Rockliffe's MailSite Management Agent for Windows (version 4.2.1.0). This server allows remote users to access their POP3 accounts and read their mail over HTTP. The service usually listens on TCP port 90. Unfortunately there exists a buffer overrun vulnerability that allows attackers to execute arbitrary code. As this service runs as system, by default, any code executed will run with system privileges - meaning any server running this agent could be fully compromised.

tags | exploit, remote, web, overflow, arbitrary, tcp
systems | windows
SHA-256 | 201140e806c2e3d3ec0bd2fb4cfda30b1743e7b0fd7054bcce93c848c6ca1a7a
access.counter-4.0.7.txt
Posted May 26, 2000
Authored by Howard M. Kash III

A popular CGI web page acess counter, version 4.0.7 by George Burgyan permits execution of arbitrary commands as a result of unchecked user input. Commands are executed as the same permission of the webserver.

tags | exploit, web, arbitrary, cgi
SHA-256 | 94ace7ee3453cc97474d0f764a764949d5e6287f3e4ff04fcae1b290ca7c34b5
elm_bof25.c
Posted May 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Elm v2.5 buffer overflow exploit which provides a gid=12 shell if /usr/bin/elm is SGID. Tested on elm 2.5PL1-3, on Red Hat. Perl script to find offsets included.

tags | exploit, overflow, shell, perl
systems | linux, redhat
SHA-256 | de3ca64288f925a9826cafbf271fc6605aa272bb27361e89cf5913320a7c513f
elm_bof24.c
Posted May 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Elm v2.4 buffer overflow exploit which provides a gid=12 shell if /usr/bin/elm is SGID. Tested on Slackware 3.6, elm 2.4PL25. Perl script to find offsets included.

tags | exploit, overflow, shell, perl
systems | linux, slackware
SHA-256 | 03d1978ea3b8ab5173fda42c7786dc04993514aae31b5c97466470d36a8dddcf
ezboard-scx-sa-03.txt
Posted May 26, 2000
Authored by Frazzle_Freckle

Securax-SA-03 - Ezboard v5.3.9 remote dos attack via wildcards in URL.

tags | exploit, remote
SHA-256 | ed822a1fc27e53ef490ca1eaffb4b388a0110ab561a1a5b201ae6e3397654cf5
lpsetexp.c
Posted May 26, 2000
Authored by DiGiT | Site security.is

solaris 2.7 lpset local exploit, i386.

tags | exploit, local
systems | solaris
SHA-256 | 82677b09b51b7eeb5f50474a25d70291b3e7b4d5eae939b2f28a8b28490519fa
fdmountx.c
Posted May 25, 2000
Authored by War | Site genhex.org

/usr/bin/fdmount local linux exploit.

tags | exploit, local
systems | linux
SHA-256 | bf34985b1a8b79c1e149fa1edad4560a07632b016f0109a4da99d03ceb463282
filterape.c
Posted May 25, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

filterape.c exploits a new elm buffer overflow to get EGID mail on Slackware.

tags | exploit, overflow
systems | linux, slackware
SHA-256 | 0283514040bf44953fc6a6a2b5828645f76e0fbbd4376d98586c0470084c52fc
Xsh0k.c
Posted May 25, 2000
Authored by Norby | Site ncl.cjb.net

Xwindows remote dos attack - creates a sequence of socket connections to tcp port 6000. Xwindows slows to a crawl and sometimes does not respond to user input.

tags | exploit, remote, tcp
SHA-256 | efe31e621870f97e050c9ccd97b857ea4370bb4acee4752fe8205face4d0fa94
CISADV000524b.txt
Posted May 25, 2000
Authored by Robert Horton | Site cerberus-infosec.co.uk

The Cerberus Security Team has discovered that a flaw in the Carello web shopping cart enables remote attackers to vi ew .asp files on the the server's computer Affected system: Windows NT running IIS.

tags | exploit, remote, web, asp
systems | windows
SHA-256 | 660eb984197ab48859340fb6d1ef3d916beb70b6534fb06bb49318f17b072048
dnsloop.tar.gz
Posted May 24, 2000
Authored by Hugo Breton

There is a remote denial of service exploit against tcpdump. Tcpdump interprets UDP packets on port 53 as DNS traffic, however, domain names in DNS packets use a compression scheme that jumps to a particular offset in the packet to avoid multiple occurances. Sending a packet that has the offset set to a particular location and if a program trying to decompress the domain name does not have a strategy for avoiding infinite loops, tcpdump may fall into an infinite loop.

tags | exploit, remote, denial of service, udp
SHA-256 | 3cb11869215cdb4a624ad46e732b853b543df65c25669d3daa61fa3108233ad0
b0f5-Qpopper.txt
Posted May 24, 2000
Authored by Prizm | Site b0f.freebsd.lublin.pl

BufferOverflow Security Advisory #5 - Remote shell via Qpopper2.53. qpop_euidl.c exploit included. Requires a qpop account and gives UID mail.

tags | exploit, remote, overflow, shell
SHA-256 | 3b9258be6be245c764411f6a0fb9887e6d3353efa7d0f966e6a4b94561a41ad0
socket-dos.c
Posted May 23, 2000
Site hack.co.za

socket-dos.c is a local ssh-1.2.27 exploit which creates a UNIX domain socket with an arbitrary file name anywhere in the filesystem on some machines.

tags | exploit, denial of service, arbitrary, local
systems | unix
SHA-256 | 7bdb442b497c168920cf7dcefe4563db3d8741d098266c65dd84c6cadc0ad94a
sniffitexp.c
Posted May 23, 2000
Authored by noir | Site olympos.org

Sniffit 0.3.7Beta Remote Exploit - sniffit has to be running (-L mail) flag set for this to work. Tested on RedHat 6.0.

tags | exploit, remote
systems | linux, redhat
SHA-256 | b573a5413280903555b0ee0798458bf852149647ac3a38ccab820bebcba4ba44
killsentry.c
Posted May 23, 2000
Authored by Andrew Alston

killsentry.c shows that automatic firewalling is a bad idea by sending spoofed FIN packets from different hosts in an attempt to confuse Portsentry. Tested on FreeBSD 3.2.

tags | exploit, spoof
systems | freebsd
SHA-256 | 53c616376a8cf4e338ec21587c689c67facb4791006565268125022e9ce67769
ascend.c
Posted May 23, 2000
Authored by The Posse | Site hack.co.za

Ascend remote denial of service - Upon receiving a packet with non zero length tcp offsets ascend terminal servers will crash. Linux based exploit included.

tags | exploit, remote, denial of service, tcp
systems | linux
SHA-256 | 1c9d5ce7aadfbcbc5a0f59fb1a4d4366d8f996bd3022ebe70ecda1d75003f9cf
kshux.c
Posted May 22, 2000
Authored by Jim Paris

kshux.c -- krshd remote root exploit. This program exploits a vulnerability in the 'krshd' daemon included with the MIT Kerberos distribution. All versions are apparently vulnerable. This exploit is for Linux/x86 with Kerberos version 1.0.

tags | exploit, remote, x86, root
systems | linux
SHA-256 | 21dbac49e32798d882c9cc979e90d774e5d8ce9558b1930028784d9a54094e1b
joe-fixed.c
Posted May 22, 2000
Authored by Sectorx | Site xorteam.cjb.net

joe v2.8 stack overflow. joe overflows when trying to open() $HOME/.joerc. This is simply proof of concept code, hopefully to get the bug fixed. It will attempt to spawn a rootshell.

tags | exploit, overflow, proof of concept
SHA-256 | 92174114b15928ccc797f3ac28878ca4c0229150414ef0e2334636a47b1b6e21
ksux.c
Posted May 22, 2000
Authored by Jim Paris

ksux.c -- ksu exploit. This program exploits a vulnerability in the 'ksu' utility included with the MIT Kerberos distribution. Versions prior to 1.1.1 are vulnerable. This exploit is for Linux/x86 with Kerberos version 1.0. Exploits for other operating systems and versions of Kerberos should also work.

tags | exploit, x86
systems | linux
SHA-256 | 575f9b9cd458226ac2f5b33532684894fb83b67d2d03b4ba8441db5ccbd69505
shellhit.c
Posted May 22, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

shellhit.c - TESO Hellkit contains a buffer overflow - exploit is just meant to be funny. To all scriptkiddies: You won't get root from this, go and find something more useful.

tags | exploit, overflow, root
SHA-256 | a3e149bc4123017c3cbb604fcda0c4db3c04f6e279d5b9a75f8c0c48fe6dd47f
Page 2 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close