Exploit the possiblities
Showing 1 - 25 of 73 RSS Feed

Files

varitas.solaris.txt
Posted Nov 22, 2001
Authored by Echo8

Veritas Volume Manager 3.0.x for Solaris contains a security hole which can, under specific circumstances, allow local users to gain root access. Exploit description included.

tags | exploit, local, root
systems | solaris
MD5 | 11dc5c3932ca0eb6191ac53ab46ce704
bobek.c
Posted Dec 6, 2000
Authored by Venglin | Site b0f.freebsd.lublin.pl

Bobek.c is a Wu-Ftpd 2.6.0 remote root exploit (updated 05/08/2000). Bug is in the SITE EXEC command, an account is not required as anonymous access is enough. Tested against Redhat 6.2, FreeBSD 3.4-STABLE, and FreeBSD 5.0-CURRENT.

tags | exploit, remote, root
systems | linux, redhat, freebsd
MD5 | 72aa028cb868dcaf240a98d147e3f193
ex_winproxy.c
Posted Nov 14, 2000
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

Shadow Penguin Security Advsory #37 - WinProxy 2.0.0/2.0.1 (now known as Black Jumbo dog) contains many remotely exploitable buffer overflows. Exploit for the POP3 service included, tested on Japanese Windows98.

tags | exploit, overflow
MD5 | 198c837d86b4acc67f7042d7d8ed65f9
proxy.dos
Posted Aug 2, 2000
Authored by Sectorx | Site xorteam.cjb.net

Many HTTP proxies are vulnerable to a denial of service attack because they do not timeout connections to a remote host, causing the proxy to run out of available sockets and start refusing connections. Tested against Delegate 6.1.13. Exploit code included.

tags | exploit, remote, web, denial of service
MD5 | 18a3948acd3bf10e08a21b28714394db
0006-exploits.tgz
Posted Jul 13, 2000
Authored by Todd J.

Packet Storm new exploits for June, 2000.

tags | exploit
MD5 | cc442e6f3c03a4562c68541e76a8095a
wuXploit.tgz
Posted Jul 1, 2000
Authored by WC

Wu-Ftpd 2.4.2, 2.5, and 2.6 are commonly misconfigured on linux to allow users which only have a valid FTP account to execute code. This code takes advantage of this configuration, mentioned in SUID Advisory #1 to execute a backdoor on the remote host.

tags | exploit, remote
systems | linux
MD5 | d42dbe704ceb3b2ece51cbe5bab0635d
smallhttp.py
Posted Jun 30, 2000
Authored by Prizm

Small HTTP Server v. 1.212 remote dos attack written in python. See USSR Advisory #47

tags | exploit, remote, web, python
MD5 | 0a9c5ea0471b5c93cbaf5b6ade16b77c
dragonftp.py
Posted Jun 30, 2000
Authored by Prizm

Dragon Server(ftp) v1.00 and 2.00 remote dos exploit written in python.

tags | exploit, remote, python
MD5 | 1117ef96d1d535f1c2118a4b63201594
ie5.force-feed.txt
Posted Jun 29, 2000
Site malware.com

Microsoft Internet Explorer 5 and accompanying mail and news clients on win95, win98 and win2000 enjoy a unique status in that they choose to ignore user input. This document will show you how to manually force a file onto the target computer despite all prompts and warnings. Demonstration available here.

tags | exploit
systems | windows, 9x
MD5 | 0e5a8cec453f8222f6e3e629bc30081c
wingate.py
Posted Jun 29, 2000
Authored by Prizm

Wingate.py is a dos exploit for Qbik wingate 3.0. Connects to tcp port 2080 and sends 2000 characters, causing all wingate services to crash. Origional bug found by eEye.

tags | exploit, tcp
MD5 | e3c12ffd16dbf026757bbf6ce8f87904
ie5-access2000.txt
Posted Jun 29, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #14 - Internet Explorer 5.01 and Access 2000 allow executing programs when viewing a web page or HTML email message. This allows taking full control over user's computer. Access 2000 allows executing VBA code which has access to system resources and in particular executing files. Includes exploit code which silently opens and executes VBA code from Access 2000. Demonstration available here.

tags | exploit, web
MD5 | 30b9808ed4a00215c9d3ef253e27bd55
ie5-excel-powerpoint.txt
Posted Jun 29, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #13 - Internet Explorer 5.01, Excel 2000 and PowerPoint allow executing programs when viewing a web page or HTML email message via insecure ActiveX controls. This allows taking full control over user's computer. Demonstration available here.

tags | exploit, web, activex
MD5 | a645ac971b6499c52ca87fc991933ceb
imbof102.txt
Posted Jun 29, 2000
Authored by Blue Panda | Site bluepanda.box.sk

iMesh 1.02 builds 116 and 177 for Windows are vulnerable to a buffer overflow that can be exploited to execute arbitrary code. Once iMesh connects to a server, it begins listening on a TCP port (varies). An attacker can connect to this port and cause an overflow which will overwrite EIP, effectively redirecting the flow of execution.

tags | exploit, overflow, arbitrary, tcp
systems | windows
MD5 | 8b2233b642e513c4b6df6f1923af5f68
sawmill-5.0.21.txt
Posted Jun 29, 2000
Authored by Larry W. Cashdollar | Site vapid.betteros.org

Sawmill 5.0.21 is a site log statistics package for UNIX, Windows and MacOS which has remote vulnerabilities. Any file on the system can be read, and password is stored with a weak hash algorithm and can be decrypted using the included C program. This is dangerous because the previous security hole will allow you to read the hash and decrypt the admin password.

tags | exploit, remote, vulnerability
systems | windows, unix
MD5 | 95f24e0b8468ed474dad73b0c43d53cf
isc-dhcpd.exploit.txt
Posted Jun 27, 2000
Authored by Todd T. Fries

The ISC dhcp client contains a remote root hole. If the DHCP server gives out addresses containing backticks, shell commands can be run on the clients.

tags | exploit, remote, shell, root
MD5 | 04ea4ddd432cd62674c27a4d7a9c2edc
leafchat.dos
Posted Jun 27, 2000
Authored by Wizdumb | Site mdma.za.net

Java source to remotely crash LeafChat clients.

tags | exploit, java
MD5 | 29d54358d161fb637d458d71c94198f0
glftpd.privpath.txt
Posted Jun 27, 2000
Authored by Raymond Dijkxhoorn

Glftpd 1.18 through 1.21b8 has a serious problem with the privpath directives. Users with accounts can access directories on the site which they should not have access to.

tags | exploit
MD5 | 90b5dfbc29d7b975b7c9aaf7ab7184f8
netscape.netware.txt
Posted Jun 27, 2000
Authored by Vigilante | Site vigilante.com

Netscape Enterprise Server for Netware 5.0 and Netware 5.1 contain remote vulnerbailities. By issuing a malformed URL it is possible to cause a denial of service situation and/or execute arbitrary code on the server with the privileges of the web server.

tags | exploit, remote, web, denial of service, arbitrary
MD5 | 526d3c03dcf0eb07a22bb3698c2e131c
xfwm_bof.c
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xfwm buffer overflow exploit for Linux / x86. This will give you a euid=0 shell if /usr/X11R6/bin/xfwm is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
MD5 | 61aad401e016e20cf265fd5a1a0a924f
xwhois_bof.c
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xwhois buffer overflow, for Linux x86. This will give you a euid=0 shell if /usr/X11R6/bin/xwhois is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
MD5 | cc2e5ac99e25a22bdccd85dc5fdd9fc3
exim.c
Posted Jun 26, 2000

exim local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | 2243ccd688884ace831702555d777f26
iisdos.c
Posted Jun 26, 2000
Authored by WC

iisdos.c is a dos attack against Microsoft Windows 2000.0 running IIS.

tags | exploit
systems | windows, 2k
MD5 | 08933919ba6880204540127fbf899827
prlnx.sh
Posted Jun 26, 2000
Authored by Wojciech Purczynski

Sendmail & procmail & kernel less than 2.2.15 local root exploit.

tags | exploit, kernel, local, root
MD5 | c841acecbf5d353a86c31e89f6abfefb
smlnx.sh
Posted Jun 26, 2000
Authored by Wojciech Purczynski

Linux kernel 2.2.X (X<=15) & sendmail less than or equal to 8.10.1 local root exploit shell script.

tags | exploit, shell, kernel, local, root
systems | linux
MD5 | 2f09abe77167417bdc7ca9804fe3673e
2dopewars_exploits.txt
Posted Jun 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Dopewars 1.47-current has two local security holes. Dopewars is SGID games. Remote buffer overflows also exist.

tags | exploit, remote, overflow, local
MD5 | 274474aad175eb9d525a249b77c46e9b
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
NYPD Cops Need A Warrant To Snoop On Your Phone
Posted Nov 17, 2017

tags | headline, government, privacy, usa, phone
Oracle Scrambles To Fix Security Flaws In Tuxedo
Posted Nov 17, 2017

tags | headline, database, flaw, oracle
Github To Devs: Now You'll Get Security Alerts On Flaws In Popular Software Libraries
Posted Nov 17, 2017

tags | headline, flaw
Keystone Pipeline Leaked 210,000 Gallons Of Oil In South Dakota
Posted Nov 17, 2017

tags | headline, flaw
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close