what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files

0104-exploits.tgz
Posted May 3, 2001
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for April, 2001.

tags | exploit
SHA-256 | 1ee99a479d4700f9ed4ba3fc1f4a5c8f7734614567248a0d84cc0031c6ff919f
border.c
Posted May 1, 2001
Authored by Honoriak

Novell Border Manager Enterprise Edition 3.5 remote denial of service attack. Sends 256+ SYN's to TCP port 353.

tags | exploit, remote, denial of service, tcp
SHA-256 | 151fcdb66c1879a5f063dde6c0d4e7a4d0ebc3ae5887d7c236aae3bc6b13e312
cerberus.ftp.txt
Posted Apr 30, 2001
Authored by Andris K

Andrisk Security Advisory 2# - Cerberus FTP Server 1.05 for Windows 9x/NT allows remote users without accounts to view any file on the server.

tags | exploit, remote
systems | windows
SHA-256 | ac36f5c4f40ea379968ee64d982cb79cad04d53d8808bf71cd2833ea937ccc41
perlcal.txt
Posted Apr 30, 2001
Authored by ThePike | Site whizkunde.org

The Unix versions of the PerlCal CGI script have vulnerabilities which allow website visitors to view any file on the webserver. Exploit URL included.

tags | exploit, cgi, vulnerability
systems | unix
SHA-256 | 6008fabe1a329e1cad455aa8c84eeb5e7a5393d69a639699c592aa9613882baf
xnetprint.c
Posted Apr 30, 2001
Authored by vade79, realhalo | Site realhalo.org

Irix Netprint local root exploit. Exploits netprint's -n option. Tested on IRIX 6.2, but should work on other versions.

tags | exploit, local, root
systems | irix
SHA-256 | e1b15bb0206ea96a407bd99676b571620fc56bbe407ca2fe157fa97b328c6b5b
ftp.server.025.txt
Posted Apr 27, 2001
Authored by Andris K

A bug in FTP server v0.25 for Windows 9x/NT has a bug which allows remote users to download and view any file on the system.

tags | exploit, remote
systems | windows
SHA-256 | 910a99610a7baee20dce791605ca8060728ec4d8313637c82ca433e38c3120c8
hfaxd-fs-exploit.pl
Posted Apr 25, 2001
Authored by Telehor | Site teleh0r.cjb.net

Hylafax (/usr/libexec/fax/hfaxd) format string local root exploit. Tested on hylafax-4.0pl2-2.

tags | exploit, local, root
SHA-256 | 27326b522b9dab8a30cd201131238bab6559ce649d75129f48fd4a1556aa0ffe
Unisploit2.1.zip
Posted Apr 25, 2001
Authored by DarkWizard&Drakaz

IIS Unicode graphical exploit for Windows. This is an updated version of Unisploit1.0-FireLust which has more cool stuff.

tags | exploit
systems | windows
SHA-256 | 7001b497fb792bdfb74ef2a47fefe2e51fb5b4b9c317143fd9521347b0356319
Hexyn-sa-19.txt
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #19 - FTP Server Denial Of Service tested on Serv-U FTP Server, G6 FTP Server and WarFTPd Server. The servers will freeze for about one second, and the CPU usage will go through the roof. Includes perl exploit.

tags | exploit, denial of service, perl
SHA-256 | 2d2c1f7da07480b818ba73c4939a20bb83cb1d28705c9d63c332c2c8acb5f5fe
Hexyn-sa-18.txt
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #18 - Savant WWW Server is an HTTP server for Windows 9x/NT. A bug allows any user to change to any directory, and in most cases, execute MS-DOS commands.

tags | exploit, web
systems | windows
SHA-256 | 6f737629eeb7c998b7477e842ffe7e837b20a277e54d231e927e0c33aa58dc9b
Hexyn-sa-17.txt
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #17 - Bison FTP Server is an FTP server for Windows 9x/NT. A bug allows any user to change to any directory.

tags | exploit
systems | windows
SHA-256 | 51cbeefe5885ffa571c47f49a694aff56ebe3391b705e2d1ab287c0dd17fcb5a
Hexyn-sa-16.TXT
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #16 - G6 FTP Server is an FTP server for Windows 9x/NT. A bug allows any user to change to c:\ and sub directories.

tags | exploit
systems | windows
SHA-256 | 43d9198ebb5fa6616439c99764fe5b23245afb02e05b085d7cf0550c2d427b77
Hexyn-sa-15.txt
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #15 - G6 FTP Server is a popular FTP server for Windows 9x/NT. A bug allows any user to change to the directory G6 was installed in. Due to good programming, the only way to exploit this bug is by viewing the full installation path. Downloading the user-file (Users.ini) is impossible.

tags | exploit
systems | windows
SHA-256 | 8f913b2f91d2258ffaa0aeccb96c5ccf8854a601e46af43354cba4bda021b2e3
TalkBackcgi-exp.pl
Posted Apr 24, 2001
Authored by Nemes||y

TalkBack.cgi directory traversal remote exploit.

tags | exploit, remote, cgi
SHA-256 | 396c1d51895015c18e8733df3f237702266c9de2fd99fca89addccdee7fc09e6
7350cfingerd-0.0.4.tar.gz
Posted Apr 24, 2001
Authored by teso, scut | Site team-teso.net

Cfingerd prior to v1.4.2 remote root format string exploit. Includes information on finding offsets. Tested against Debian cfingerd v1.3.2, 1.4.0, 1.4.1, and RedHat 7.0 cfingerd 1.3.2.

tags | exploit, remote, root
systems | linux, redhat, debian
SHA-256 | 27d6d03e401bbc5d64121d7bf098b55babef4798dff575768d01cd2abac1b648
unidebug.zip
Posted Apr 21, 2001
Authored by Shrikant Raman

Unidebug is another exploit for the begging-to-get-patched IIS unicode bug. Takes advantage of the DOS/Win debug.exe to create binary files on the remote site.

tags | exploit, remote
SHA-256 | 8e17e7b0f8c5238e4b25523275f6838f53fb410606405d67218f8f95d39afcd6
iexslt.txt
Posted Apr 21, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #43, 2001 - It is possible to execute Active Scripting with the help of XML and XSL even if Active Scripting is disabled in all security zones. This is especially dangerous in email messages. Though this is not typical exploit itself, it may be used in other exploits especially in email. To use the demonstration, disable Active Scripting and click here. If you see any message box you are vulnerable.

tags | exploit
SHA-256 | c7fe5497623b82391c2f6f8c4e0d6f0cddd8405282c73ba789be9d2a1a709bdc
xlock.txt
Posted Apr 19, 2001
Authored by Marco van Berkum

Removing the SUID bit from xlock causes enter to work as a password to unlock the screen for all users except root. With no SUID bit it can no longer read /etc/shadow, creating a blank .xlockrc, causing enter to be a valid password.

tags | exploit, root
SHA-256 | 7a3fc00fea0ff0994ae858e317eefc68874f30058a8c8af694cc82126a795089
fancylogin.c
Posted Apr 17, 2001
Authored by Ghost

Fancylogin 0.99.7 buffer overflow exploit. Fancylogin is usually not +s so this exploit isn't that dangerous. Tested on debian potato and kernel 2.2.18 and 2.2.19.

tags | exploit, overflow, kernel
systems | linux, debian
SHA-256 | 29d03dc71d859bbe4e1a2875ecdcaa1d77c2adb10f17069da1e18b83a08771c0
01-2001.txt
Posted Apr 17, 2001
Authored by Cristiano Lincoln Mattos

Security flaw in Linux 2.4 IPTables using FTP PORT - If an attacker can establish an FTP connection passing through a Linux 2.4.x IPTables firewall with the state options allowing "related" connections (almost 100% do), he can insert entries into the firewall's RELATED ruleset table allowing the FTP Server to connect to any host and port protected by the firewalls rules, including the firewall itself. Advisory available here.

tags | exploit
systems | linux
SHA-256 | ae3602a2f75b24ef995eb290537dc514837d292b96235e884dbb43f17d8b9bcc
globulka.pl
Posted Apr 17, 2001
Authored by Venglin

FreeBSD-4.2-Stable ftpd GLOB remote root exploit in perl. This version requires user access and writeable home dir without chroot.

tags | exploit, remote, root, perl
systems | freebsd
SHA-256 | d9d003dd6fbf397662aaadea0cda37b79f4f487bbe81f0f4dca4c6995f5cb632
ISA.dos.txt
Posted Apr 17, 2001
Site securexpert.com

Denial of Service in Microsoft ISA server v1.0 - Microsoft ISA Server 1.0 on Windows 2000 Server SP1 is vulnerable to a simple network-based attack which stops all incoming and outgoing web traffic from passing through the firewall until the firewall is rebooted or the affected service is restarted. Exploit URL's included.

tags | exploit, web, denial of service
systems | windows
SHA-256 | 9d02d2508ec99a83764ebc8949250bbaa3f6a7f94d64565ec9d94e4721d64d5d
openbsd.glob.c
Posted Apr 17, 2001
Authored by Tomas Kindahl | Site codefactory.se

OpenBSD 2.x remote root GLOB exploit w/ chroot break. It is possible to exploit an anonymous ftp without write permission under certain circumstances. This is most likely to succeed if there is a single directory somewhere with more than 16 characters in its name. With write permissions, one could easily create such a directory.

tags | exploit, remote, root
systems | openbsd
SHA-256 | 5e2903fcb27602a8d106b23765838518455a5fb29fed0495120e4cdf16853274
clsidext.txt
Posted Apr 17, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #42, 2001 - By double clicking from Window Explorer or Internet Explorer on filenames with innocent extensions the user may be tricked to execute arbitrary programs. If the file extension has a certain CLSID, then Windows explorer and IE do not show the CLSID and only the harmless looking extension. Demonstration available here.

tags | exploit, arbitrary
systems | windows
SHA-256 | 4343d6e471cf14bde5baebc0d0bf30f0bf01a8f1220ae414f85aef130a942a42
fbsdftp-ex.c
Posted Apr 17, 2001
Authored by Noah | Site ns2.crw.se

FreeBSD v4.2 ftpd remote root exploit. Uses a GLOB vulnerability. Requires an account on the machine. Compiles on FreeBSD, Linux, and Solaris. Includes information on finding offsets.

tags | exploit, remote, root
systems | linux, solaris, freebsd
SHA-256 | 540b154821aa64ba0fdf0fbba86a254d332881eacb9247606a8b7fde62483b1e
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close