exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 58 of 58 RSS Feed

Files

pollex.pl
Posted Nov 5, 2000
Authored by Keelis

Poll It CGI v2.0 contains remote vulnerabilities which allow remote command execution and reading any file on the webserver. Fix available here.

tags | exploit, remote, cgi, vulnerability
SHA-256 | fd9088695736bd46e4c9077587b083d3e9c5da61927f63fb6d161aa1e5963121
IISHack1.5.zip
Posted Nov 5, 2000
Authored by eEye Digital Security | Site eEye.com

IISHack 1.5 attempts to remotely exploit a local buffer overflow in the IIS 4.0 and 5.0 .asp file parsing mechanism using the unicode bug, resulting in remote system access.

tags | exploit, remote, overflow, local, asp
SHA-256 | afcef2c9b91202ec97d8ad74851f7050f034f962c38fb8bf8733f531b474694d
hp-ux.cu.overflow.txt
Posted Nov 5, 2000
Authored by Zorgon

HP-UX vB.11.00 comes with /bin/cu SUID bin, which has a buffer overflow in the -l switch.

tags | exploit, overflow
systems | hpux
SHA-256 | 77af8460241fd99399a8eb2a90950ce6aa3a1b5653ac799c208865c42b2ef1d5
kde-exploit.gif
Posted Nov 5, 2000
Authored by Dotslash

KDE File Manager can be tricked into executing commands as root by creating a HTML file with a link to a binary.

tags | exploit, root
SHA-256 | d7f5f0c29d8e33e3eae4d5bbd47b000527c71b64246f27d556cd28df0782ba0e
mandrake.urpmi.txt
Posted Nov 5, 2000
Authored by Dotslash

Mandrake 7.1's /usr/bin/urpmi allows attackers to install RPM's as root if they have an account in the urpmi group and possibly physical access.

tags | exploit, root
systems | linux, mandrake
SHA-256 | 7c9b89ae1b7901292c8d5b0902bedd8ccaad79f8cc4b4e2702d359ba016ff272
xrestore.c
Posted Nov 4, 2000
Authored by vade79, realhalo | Site realhalo.org

Restore (/sbin/restore) v0.4b15 local root exploit. Tested against Redhat 6.2.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | 25b1655a9902e87c0615e5d189cded02d9d32a74028c352acca92baf010d53b9
dump-exp.sh
Posted Nov 2, 2000
Authored by Fish Stiqz

Dump v0.4b15 for Linux on Redhat and others contains a trivial local root vulnerability.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | 1cc730edaf82d8cf8af5f2a4f514fb02bdc686371b3f7ccea5653645df6e3c84
dump.sh
Posted Nov 2, 2000
Authored by JW Oh

Dump v0.4b15 and below for Linux contains a trivial local root vulnerability. Includes proof of concept exploit tested on Redhat 6.2.

tags | exploit, local, root, proof of concept
systems | linux, redhat
SHA-256 | 619ad6db79eab76deef0e838677432fc6d3bd08d012469e9ae413de13b917212
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close