Exploit the possiblities
Showing 1 - 25 of 34 RSS Feed

Files

tsl_bind.c
Posted Apr 5, 2010
Authored by Gustavo Scotti, Thiago Zaninotti | Site axur.org

Bind prior to 8.2.3-REL remote root exploit - Includes instructions for finding the offset on linux. Tested against Redhat 6.1 8.2.2-P5 and Slackware. NOTE: This exploit is backdoored to also connect to 151.196.71.160 and dump information regarding the user running the exploit. User beware.

tags | exploit, remote, root
systems | linux, redhat, slackware
MD5 | 60d9926dcbd31d78bd4d04513c0b5823
0102-exploits.tgz
Posted Apr 10, 2001
Authored by Todd J.

Packet Storm new exploits for February, 2001.

tags | exploit
MD5 | e43135e7e3cc9c37b8531f6ec918648a
SQLExec.zip
Posted Mar 7, 2001
Authored by Egemen Tas

SQLExec v1.1 is a remote exploit for Microsoft SQL server which executes remote commands as Administrator over tcp port 1433. Requires a database sa login / password. Includes binary and source written in Visual C++ 6.0 for Windows NT/2K/9X. Note: Many AV software erroriously reports this as a trojan.

tags | exploit, remote, trojan, tcp
systems | windows, nt
MD5 | 38f900f09511693706dba15eff709f1f
hhp-gdc_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
MD5 | efae2c2cea50f03e11330ec67729ea53
hhp-ospf_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
MD5 | b41b1c1bc193511d950a1c291c22c23f
man-cgi.txt
Posted Feb 26, 2001
Authored by Krfinisterre

Man-cgi v1.3 and v2.0 contains remote vulnerabilities which allow any file on the web server to be viewed, and some implementations allow remote command execution due to lack of filtering of hex encoded characters. Exploit URL's included.

tags | exploit, remote, web, cgi, vulnerability
MD5 | 3245d6534465bdf950b124781e2eba7f
imapd_exploit.c
Posted Feb 24, 2001
Authored by Felipe Cerqueira

A remotely exploitable stack overflow has been discovered in Imapd v12.264 and below in the handling of the lsub command. Since an account is required, mail only users will be able to get shell access. Tested against Slackware 7.0, 7.1, Redhat 6.2, and Conectiva Linux 6.0. Fix available here.

tags | exploit, overflow, shell
systems | linux, redhat, slackware
MD5 | 8cb7018cec6491d94289309fa80cb3f8
sshdexpl.diff.gz
Posted Feb 22, 2001
Authored by Paul Starzetz

Patches for Openssh-2.1.1 to exploit the SSH1 crc32 remote vulnerability.

tags | exploit, remote
MD5 | 5b9cd4b729ec6e7561b1a57d158efd6c
ssh1.crc32.txt
Posted Feb 22, 2001
Authored by Paul Starzetz

This article discusses the recently discovered security hole in the crc32 attack detector as found in common ssh packages like OpenSSH and derivatives using the ssh-1 protocol. It is possible to exploit the crc32 hole to gain remote access to accounts without providing any password or to change login-uid if a valid account on the remote machine exists. Includes an exploit in the form of a set of patches to Openssh-2.1.1.

tags | exploit, remote, protocol
MD5 | d8723d5299634964440e1ff0b8c65d4a
cobull.c
Posted Feb 21, 2001
Authored by Sagi | Site idiotbox.co.il

Merant Micro Focus Cobol 4.1 local root exploit - Writes to /var/mfaslmf/nolicense.

tags | exploit, local, root
MD5 | cda9670c0ba5d6b9f1195c7b8e3fa2e4
exklock.c
Posted Feb 21, 2001
Authored by synnergy, Dethy | Site synnergy.net

FreeBSD X key lock (xklock) v2.7.1 and below local root exploit - Tested on FreeBSD ports collection v3.5.1 and v4.2.

tags | exploit, local, root
systems | freebsd
MD5 | c5a5aabc95055e9049edae3b5c5de143
ultimate-bb.txt
Posted Feb 16, 2001
Authored by Unregistered

The Ultimate Bulletin Board System allows remote users to get the username and pass of anyone that is a registered user of a ubb forum that has html enabled and uses cookies to store the username and passwords of the users.

tags | exploit, remote
MD5 | 828aa040cb14cedf7cc184ea53596262
RFP2101.txt
Posted Feb 14, 2001
Authored by rain forest puppy | Site wiretrip.net

RFP2101 - SQL hacking user logins in PHP-Nuke web portal. PHP-Nuke v4.3 contains authentication weaknesses in the SQL code which allows you to impersonate other users and retrieve their password hashes.

tags | exploit, web, php
MD5 | 3570beaf791c09186294e288c2be8fa3
sc.txt
Posted Feb 14, 2001
Authored by Echo8

Vulnerabilities in Sun Clustering v2.x - Leaks sensitive information to local and remote users and has tempfile bugs. Includes proof of concept exploits.

tags | exploit, remote, local, vulnerability, proof of concept
MD5 | 73b291ac1c752a9126ecaee506db3172
scx-sa-14.txt
Posted Feb 14, 2001
Authored by Root-dude | Site securax.org

Securax Security Advisory #14 - Symantec pcAnywhere 9.0 contains a remote denial of service vulnerability. Includes perl exploit.

tags | exploit, remote, denial of service, perl
MD5 | 718844623d215773f90f38c77a5052e2
urdls.c
Posted Feb 14, 2001
Authored by vade79, realhalo | Site realhalo.org

Urdls.c is an unreadable directory lister for listing files in directories on the local machine without having permission to do so. Guesses all possible alphanumeric filenames and uses stat() to check for existence.

tags | exploit, local
MD5 | 1d6fbb2a733fdc4734fdb685dfebe2d3
dc20exp.c
Posted Feb 14, 2001
Authored by Mray

Dc20ctrl local exploit for FreeBSD - exploits a call to getenv() in session.c giving a gid=dialer shell.

tags | exploit, shell, local
systems | freebsd
MD5 | cc98ffd5418eb7c676bef76c1231d1f2
Netscape.Publisher.ACL.txt
Posted Feb 12, 2001
Site netscape.com

Netscape Enterprise Server 3.5.1 (Publisher) has a problem with the default ACL settings that could allow an intruder to view/download "non-public" files in the web root.

tags | exploit, web, root
MD5 | 606350da577109d146a4a0d63edb271d
Infobot-0.44.5.3.txt
Posted Feb 12, 2001
Authored by Samy Kamkar | Site pdump.org

Infobot v0.44.5.3 and below contains vulnerabilities which allow remote users to execute commands due to an insecure open call.

tags | exploit, remote, vulnerability
MD5 | abd99f30f80cf7bce705f6763a7ac850
p-smash.c
Posted Feb 12, 2001
Authored by Paulo Ribeiro

P-smash.c is an exploit that uses 50 percent of the CPU on windows 98 machines and causes windows 95 machines to slow down by sending ICMP type 9 code 0 packets.

tags | exploit
systems | windows, 9x
MD5 | 003642b21a623125acc24e65efa3c22b
bind8x.c
Posted Feb 10, 2001
Authored by Ix, Lucysoft

Bind prior to 8.2.3-REL remote root exploit - exploits the named INFOLEAK and TSIG bug. Includes shellcode for Linux. Slightly broken.

tags | exploit, remote, root, shellcode
systems | linux
MD5 | c4f9cc6d4b7bc657ff22984adf7d206c
bugtraq.c
Posted Feb 6, 2001
Authored by Count Neithardt von Gneisenau

Bugtraq.c is an exploit for the Bind tsig bug which has been crippled somewhat. Tested against Slackware 7.0.

tags | exploit
systems | linux, slackware
MD5 | f406011573813d6eb463e3616775397d
defcom.easycom.txt
Posted Feb 2, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-06 - The Easycom/Safecom print server from I-Data International contains multiple vulnerabilities that allow a malicious user to bring down the print server. Execution of arbitrary code is also possible. Tested against Easycom/Safecom, firmware v404.590.

tags | exploit, arbitrary, vulnerability
MD5 | ff7e56247e2414c0c4d933c41bf3bafd
frel-1.0.beta.tgz
Posted Feb 2, 2001

Frel-1.0 is a modified version of fragrouter, used to evade NIDS. The frag proxy can run on the same machine as the attacker. It can also run in partial takeover mode, so that the fragmented attack stream seems to be coming from another active machine on the same physical subnet. The neighbor machine runs normally except for the ports being used by attacker. Mods by Lorgor

tags | exploit
MD5 | 54f511a94e5997a3e1766ab4eb609cd3
defcom.netscape-fasttrack.txt
Posted Feb 2, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-05 - Netscape Fasttrack Server 4.1 for Windows NT 4.0 has problems with its caching module. The problem can result in remote users consuming all the server memory and causing the server to perform very sluggishly.

tags | exploit, remote
systems | windows, nt
MD5 | 99e0fc6a08ba1f82da32b5184da1707e
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
NYPD Cops Need A Warrant To Snoop On Your Phone
Posted Nov 17, 2017

tags | headline, government, privacy, usa, phone
Oracle Scrambles To Fix Security Flaws In Tuxedo
Posted Nov 17, 2017

tags | headline, database, flaw, oracle
Github To Devs: Now You'll Get Security Alerts On Flaws In Popular Software Libraries
Posted Nov 17, 2017

tags | headline, flaw
Keystone Pipeline Leaked 210,000 Gallons Of Oil In South Dakota
Posted Nov 17, 2017

tags | headline, flaw
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close