what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 58 RSS Feed

Files

uni.pl
Posted Nov 22, 2001
Authored by Stealthmode316

Uni.pl checks a host for the recent IIS unicode vulnerability in 14 different ways.

tags | exploit
SHA-256 | 32bd5f34a95c46295f57976cfbf6555ee9b99614f669f3c03817d94d1fb5c99d
0011-exploits.tgz
Posted Dec 15, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for November, 2000.

tags | exploit
SHA-256 | bceee421a4f65a0ececf0fa87e308b9cb4bcd88b4982b651a42a90dc7473b73c
tessa.c
Posted Dec 7, 2000
Authored by Incubus | Site securax.org

Remote denial of service exploit for Microsoft Exchange 5.5 SP3 Internet Mail Service and Information Store. The bug is in the handling of a line containing Content="".

tags | exploit, remote, denial of service
SHA-256 | 0c9cfdbafe736d4492e5824460e8cf1c11123d2a6f395721ed470ff9d5905c32
oidldapd.c
Posted Dec 6, 2000

Exploit Code for oidldapd in Oracle 8.1.6 (8ir2) for Linux. I tested in RH 6.2 and 6.1.

tags | exploit
systems | linux
SHA-256 | 538b4209e4761c7b41607b2d2c04a48d5372e427a9bd4d58ec3f97fb47945eb3
cgiforum-1.0.txt
Posted Dec 3, 2000
Authored by Zorgon

CGIForum v1.0i (cgi-bin/cgiforum.pl) allows remote users to view any file on the system via a ../.. bug.

tags | exploit, remote, cgi
SHA-256 | 54a31d246b1ce0df322a76314cf66492c32c1c40d5388c5187fc9b897b0070fa
xp-bitchx.c
Posted Dec 3, 2000
Authored by RaiSe | Site netsearch-ezine.com

BitchX v1.0c16 remote exploit. Tested against Redhat 6.0, 7.0, and Debian 2.2.

tags | exploit, remote
systems | linux, redhat, debian
SHA-256 | f60db0f8af808e077c41cddcfbc5286c210560d141961d680824e2410e37b026
libc-language.su.c
Posted Dec 3, 2000
Authored by Doing

Glibc 2.1 + /bin/su local root exploit. Tested on Redhat 6.2, 6.1, and SuSE 6.2.

tags | exploit, local, root
systems | linux, redhat, suse
SHA-256 | 3b8551005bb76b0f86b59553d698f22a5a05b785634f1f4f7e8c60bdb0459e09
mogrify.c
Posted Dec 3, 2000
Authored by Zucco | Site w3.swi.hu

/usr/X11R6/bin/mogrify local buffer overflow exploit for Redhat 7.0.

tags | exploit, overflow, local
systems | linux, redhat
SHA-256 | 3b8cfa09a9e36ebc44c23db2716680788f2f6f2f3d559d5ca6ce1e6da6db44ea
lnapster_dos.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

The Linux Napster Client v0.9 through v1.4.4 contains remote denial of service vulnerabilities, including a buffer overflow.

tags | exploit, remote, denial of service, overflow, vulnerability
systems | linux
SHA-256 | df942f2957c52dfcabfae137dce7e503c3a18bb3aa36ce6d8d404a43e2c6b85a
xrcvtty.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0/4.0 /usr/contrib/mh/lib/rcvtty local exploit - Gives a egid=4(tty) shell.

tags | exploit, shell, local
SHA-256 | 97df13bd07d261bb87a10c4f6335d25e1cca2a73e97e369c44265dec113c0303
bsdi_inews.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 local Inews (inn-2.2) buffer overflow exploit. Gives egid=news shell.

tags | exploit, overflow, shell, local
SHA-256 | ea9a24a0938e3ecdaf81b1eb284380066bc47043343c111cae4471b9d5273e75
bsdi_sperl.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/bin/suidperl local root exploit.

tags | exploit, local, root
SHA-256 | 58941d3c91d8b42f6784c8091f0c39755ddd7d5f6ad6a1825b63d7ab8c720c3c
bsdi_inc.c
Posted Nov 29, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.

tags | exploit, local, root
SHA-256 | ed628d1321ba3d0225a71dc5d95a94974deec4e382e6feef884016cddda04dd0
NIT_UNICODE.zip
Posted Nov 29, 2000
Authored by Stealthmode316

Microsoft IIS Unicode remote exploit which uses tftp to obtain code to run.

tags | exploit, remote
SHA-256 | e0f403b11dab3aab5b3ee904e8e8bce6c11936552abdcf36a5b3990cd728aa32
SynAttackProtect.txt
Posted Nov 26, 2000
Site videotron.ca

Windows NT 4.0 SP6a with SynAttackProtect set is vulnerable to a remote denial of service attack.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 714cad616a29fdfca52b206e8783d4c79dbf59b9a095f42bcd9514ec4ce0f734
super-sadmin.c
Posted Nov 26, 2000
Authored by Optyx

Super Solaris sadmin Exploit - works with solaris 2.6/7.0 SPARC and x86, does the sp guessing (much like sadmin-brute.c).

tags | exploit, x86, add administrator
systems | solaris
SHA-256 | 1bc5ba57da0d2994c387df4be7a70b3d1a5261e3f76ef1792396e253ad6d576c
coolz.cpp
Posted Nov 21, 2000
Authored by Scrippie | Site synnergy.net

Koules v1.4 (svgalib version) local root exploit.

tags | exploit, local, root
SHA-256 | c1aa67a699bdb06becfd648b8e011150782023036520a46cdbdfa729d406a53d
analogx-4.10.dos.txt
Posted Nov 21, 2000
Authored by Zerologic | Site nssolution.net

Network Security Solutions Security Advisory - A denial of service vulnerability has been discovered in AnalogX proxy v4.10. POP, FTP, and SMTP are vulnerable to a buffer overflow, crashing all the proxy services.

tags | exploit, denial of service, overflow
SHA-256 | 5aef40f870f3d865e1fac6523c6b03f76193a5c55734a094120a524fc881f6ab
tetrinet-1.13.dos.txt
Posted Nov 19, 2000
Site m4dskill.org

Tetrinet v1.13 has a denial of service vulnerability which is caused by telnetting to the tetrinet port and pressing enter once, freezing the game.

tags | exploit, denial of service
SHA-256 | ed11e968ca11f1ec388ea80f84379db00319fe1bf75648088cf4b43c2f6bc74f
sbo_ethereal.c
Posted Nov 19, 2000
Authored by JW Oh | Site hacksware.com

Ethereal v0.8.13 advisory and remote exploit for Linux x86. A stack overflow in the AFS packet parsing routine allows a spoofed packet to start a root shell bound to TCP port 36864.

tags | exploit, remote, overflow, shell, x86, root, spoof, tcp
systems | linux
SHA-256 | 5849011e1fbedaeca9f6469317a94d0d5df77b160e51dc2cfaf731ba6fdbc8e5
wkit.joe.txt
Posted Nov 17, 2000
Authored by Patrik Birgersson | Site wkit.com

Joe's Own Editor File Link Vulnerability - If a joe session with an unsaved file terminates abnormally, joe creates a rescue copy of the file being edited called DEADJOE. The creation of this rescue copy is made without checking if the file is a link.

tags | exploit
SHA-256 | 81d90d5f00752f52b9f0c8ad8e4f3c8f10e765b68b658e3a52086b00f61ecc5a
vixie-cron.sh
Posted Nov 17, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Vixie crontab local root exploit - an insecure fopen() call in Paul Vixie's crontab code is exploitable on systems where /var/spool/cron is user readable, such as Red Hat 6.1.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | ab44f3d242c7a1c5af9df46eb9bdc3905efc1ef485b1406235d10775c03e5ede
1080r.c
Posted Nov 16, 2000
Authored by Doable | Site members.tripod.com

Socks5 v1.0r10 remote buffer overflow exploit. Tested against Turbolinux 4.0.5 and Redhat 6.0.

tags | exploit, remote, overflow
systems | linux, redhat
SHA-256 | 1a9303c0f97246dd3156fb56a5fa42a61bf599c1860acd6a5af0eb6f7dfe2135
aim.caching.txt
Posted Nov 16, 2000
Authored by F3d

AOL Instant Messenger contains a caching vulnerability where once you have logged onto AIM with a screenname, you can permanently login with that screenname.

tags | exploit
SHA-256 | 082713c2e36c75c665e6bb56ba99874d4c5196b712c54fcc9aafe49eff7eae7f
bsdi_elm.c
Posted Nov 16, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI Elm 2.4 local buffer overflow exploit. Tested on BSDI/3.0, gives a group mail shell.

tags | exploit, overflow, shell, local
SHA-256 | 6a330ce2fc59bf584d239c77e5b345d9e7bb1abdf51acce4a1c2b43634c09ae2
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close