accept no compromises
Showing 1 - 25 of 58 RSS Feed

Files

uni.pl
Posted Nov 22, 2001
Authored by Stealthmode316

Uni.pl checks a host for the recent IIS unicode vulnerability in 14 different ways.

tags | exploit
MD5 | c6698e5cebd9eb773117d22e6b65c4b5
0011-exploits.tgz
Posted Dec 15, 2000
Authored by Todd J.

Packet Storm new exploits for November, 2000.

tags | exploit
MD5 | 863457b59a95f668b4133a6f072e7ff1
tessa.c
Posted Dec 7, 2000
Authored by Incubus | Site securax.org

Remote denial of service exploit for Microsoft Exchange 5.5 SP3 Internet Mail Service and Information Store. The bug is in the handling of a line containing Content="".

tags | exploit, remote, denial of service
MD5 | 0943fe0243c5f19593bfcb6ee1ecddd1
oidldapd.c
Posted Dec 6, 2000

Exploit Code for oidldapd in Oracle 8.1.6 (8ir2) for Linux. I tested in RH 6.2 and 6.1.

tags | exploit
systems | linux
MD5 | 82bbd3bd2b8d511e99cc7fbb4242334f
cgiforum-1.0.txt
Posted Dec 3, 2000
Authored by Zorgon

CGIForum v1.0i (cgi-bin/cgiforum.pl) allows remote users to view any file on the system via a ../.. bug.

tags | exploit, remote, cgi
MD5 | 1901c1e1b5c5d1c8e953de726ce71974
xp-bitchx.c
Posted Dec 3, 2000
Authored by RaiSe | Site netsearch-ezine.com

BitchX v1.0c16 remote exploit. Tested against Redhat 6.0, 7.0, and Debian 2.2.

tags | exploit, remote
systems | linux, redhat, debian
MD5 | aae3f3cd93834c7b28d6520216e210b2
libc-language.su.c
Posted Dec 3, 2000
Authored by Doing

Glibc 2.1 + /bin/su local root exploit. Tested on Redhat 6.2, 6.1, and SuSE 6.2.

tags | exploit, local, root
systems | linux, redhat, suse
MD5 | a34f4fc9b9000678841750b678eaf4f1
mogrify.c
Posted Dec 3, 2000
Authored by Zucco | Site w3.swi.hu

/usr/X11R6/bin/mogrify local buffer overflow exploit for Redhat 7.0.

tags | exploit, overflow, local
systems | linux, redhat
MD5 | 1d641a893d715883f240d11109ba7782
lnapster_dos.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

The Linux Napster Client v0.9 through v1.4.4 contains remote denial of service vulnerabilities, including a buffer overflow.

tags | exploit, remote, denial of service, overflow, vulnerability
systems | linux
MD5 | afbf258c087dc2ddc335aa08591d3187
xrcvtty.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0/4.0 /usr/contrib/mh/lib/rcvtty local exploit - Gives a egid=4(tty) shell.

tags | exploit, shell, local
MD5 | d9f75c9bd0bbf4c31d1e2540f8152663
bsdi_inews.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 local Inews (inn-2.2) buffer overflow exploit. Gives egid=news shell.

tags | exploit, overflow, shell, local
MD5 | 221439ff1bb4b7185203de338bf2ef76
bsdi_sperl.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/bin/suidperl local root exploit.

tags | exploit, local, root
MD5 | ac4e2d7d44a8bb589aabb1308fe979a0
bsdi_inc.c
Posted Nov 29, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.

tags | exploit, local, root
MD5 | 46db6094aa575402f671da8c14887aef
NIT_UNICODE.zip
Posted Nov 29, 2000
Authored by Stealthmode316

Microsoft IIS Unicode remote exploit which uses tftp to obtain code to run.

tags | exploit, remote
MD5 | e96d45812c527f6782da9b8023411b96
SynAttackProtect.txt
Posted Nov 26, 2000
Site videotron.ca

Windows NT 4.0 SP6a with SynAttackProtect set is vulnerable to a remote denial of service attack.

tags | exploit, remote, denial of service
systems | windows, nt
MD5 | c38a8f38eb7f48b6fccf2b88312ecf17
super-sadmin.c
Posted Nov 26, 2000
Authored by Optyx

Super Solaris sadmin Exploit - works with solaris 2.6/7.0 SPARC and x86, does the sp guessing (much like sadmin-brute.c).

tags | exploit, x86, add administrator
systems | solaris
MD5 | 357a72ab9c2216a0f21fe566a0c0d50e
coolz.cpp
Posted Nov 21, 2000
Authored by Scrippie | Site synnergy.net

Koules v1.4 (svgalib version) local root exploit.

tags | exploit, local, root
MD5 | c6e905f5b258f2192813d0e28c25f3f2
analogx-4.10.dos.txt
Posted Nov 21, 2000
Authored by Zerologic | Site nssolution.net

Network Security Solutions Security Advisory - A denial of service vulnerability has been discovered in AnalogX proxy v4.10. POP, FTP, and SMTP are vulnerable to a buffer overflow, crashing all the proxy services.

tags | exploit, denial of service, overflow
MD5 | 473fb8c79cfbd0f1f31f9ada019e1a58
tetrinet-1.13.dos.txt
Posted Nov 19, 2000
Site m4dskill.org

Tetrinet v1.13 has a denial of service vulnerability which is caused by telnetting to the tetrinet port and pressing enter once, freezing the game.

tags | exploit, denial of service
MD5 | 6a6cba71110da021980b8459ef6d0ffe
sbo_ethereal.c
Posted Nov 19, 2000
Authored by JW Oh | Site hacksware.com

Ethereal v0.8.13 advisory and remote exploit for Linux x86. A stack overflow in the AFS packet parsing routine allows a spoofed packet to start a root shell bound to TCP port 36864.

tags | exploit, remote, overflow, shell, x86, root, spoof, tcp
systems | linux
MD5 | fd8ecf481dd69e08202db3024f1d0e74
wkit.joe.txt
Posted Nov 17, 2000
Authored by Patrik Birgersson | Site wkit.com

Joe's Own Editor File Link Vulnerability - If a joe session with an unsaved file terminates abnormally, joe creates a rescue copy of the file being edited called DEADJOE. The creation of this rescue copy is made without checking if the file is a link.

tags | exploit
MD5 | be8e7cf49d0d3008503014289c862566
vixie-cron.sh
Posted Nov 17, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Vixie crontab local root exploit - an insecure fopen() call in Paul Vixie's crontab code is exploitable on systems where /var/spool/cron is user readable, such as Red Hat 6.1.

tags | exploit, local, root
systems | linux, redhat
MD5 | 0287065999f56b790417f3f4c827bc0d
1080r.c
Posted Nov 16, 2000
Authored by Doable | Site members.tripod.com

Socks5 v1.0r10 remote buffer overflow exploit. Tested against Turbolinux 4.0.5 and Redhat 6.0.

tags | exploit, remote, overflow
systems | linux, redhat
MD5 | 5e29097026a9e3a42c4647d9a5636446
aim.caching.txt
Posted Nov 16, 2000
Authored by F3d

AOL Instant Messenger contains a caching vulnerability where once you have logged onto AIM with a screenname, you can permanently login with that screenname.

tags | exploit
MD5 | 99a2e51cc23ed272d12c982aa7726b6d
bsdi_elm.c
Posted Nov 16, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI Elm 2.4 local buffer overflow exploit. Tested on BSDI/3.0, gives a group mail shell.

tags | exploit, overflow, shell, local
MD5 | ae7dc6ee571f2b2bfe82a7905702872c
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Millions Of High Security Crypto Keys Crippled By Newly Discovered Flaw
Posted Oct 16, 2017

tags | headline, flaw, cryptography
Pizza Hut Latest To Be Hit In Card Data Breach
Posted Oct 16, 2017

tags | headline, hacker, privacy, bank, cybercrime, data loss, fraud
Artificial Intelligence - Hype, Hope, And Fear
Posted Oct 16, 2017

tags | headline, botnet, cyberwar
KRACK Attacks: Breaking WPA2 By Forcing Nonce Reuse
Posted Oct 16, 2017

tags | headline, privacy, phone, wireless, flaw, cryptography
Even Pokemon Go Was Used By Russia To Meddle In The Election
Posted Oct 13, 2017

tags | headline, government, usa, russia, cyberwar
US Voices Frustration With Warrant-Proof Encryption
Posted Oct 13, 2017

tags | headline, government, privacy, usa, cryptography
An Unknown Hacker Stole Sensitive Data On Australia's War Planes
Posted Oct 13, 2017

tags | headline, hacker, government, australia, data loss, cyberwar
Legacy Office Feature Used In Novel Document Attacks
Posted Oct 13, 2017

tags | headline, hacker, malware, microsoft, flaw
Equifax Rival TransUnion Also Sends Site Visitors To Malicious Pages
Posted Oct 12, 2017

tags | headline, malware
The Myth Of Responsible Encryption: Experts Say It Can't Work
Posted Oct 12, 2017

tags | headline, government, backdoor, cryptography
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close