what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files

man-exp.c
Posted Apr 17, 2001
Authored by Andi | Site segfault.net

Man -l format string local exploit for Linux.

tags | exploit, local
systems | linux
SHA-256 | ca335bd4cdac2c35254a550caf5b711395186ac1f91e69c92d32054d17d198fc
sp-perlcal.pl
Posted Apr 13, 2001
Authored by Badpack3t | Site security-protocols.com

PerlCal directory traversal exploit - Takes advantage of a bug in cal_make.pl.

tags | exploit
SHA-256 | 45ac7b012dc6861b9f018d6dc2b6b359067b5bbd323b9f0b36ab15cc0d7d0911
imap-lsub.pl
Posted Apr 13, 2001
Authored by Zucco | Site w3.swi.hu

Remote imapd exploit for Red Hat 6.2 (Zoot) written in perl. Tested against IMAP4rev1 v12.264.

tags | exploit, remote, perl
systems | linux, redhat
SHA-256 | c10e5754cc22a45a1dc466fc265a3b46bec4230888f5bdc4faefe634c2980552
crazywwwb-exploit.pl
Posted Apr 10, 2001
Authored by Telehor | Site teleh0r.cjb.net

Remote buffer overflow exploit for CrazyWWWBoard which executes arbitrary code with the privileges of the webserver. Tested against CrazyWWWBoard2000p4 for RedHat 6.0 and CrazyWWWBoard2000LEp5 for RedHat 6.1. This is NOT that same overflow as discovered by Jin Ho You, 01.30.2001.

tags | exploit, remote, overflow, arbitrary
systems | linux, redhat
SHA-256 | 19688fd775a7f4f0a92299bf49551ce8414d7d354001d363cad28d1e972b9062
talkback.txt
Posted Apr 10, 2001
Authored by ThePike | Site whizkunde.org

Talkback.cgi allows remote users to view any file on the webserver. Exploit URL included. It is also possible to display the admin password. Fix available here.

tags | exploit, remote, cgi
SHA-256 | e4e768f74ba3a8097a57dd1359054407e765b0969853046f335247b526a09588
kmailbug.c
Posted Apr 9, 2001
Authored by Crashkiller

Remote buffer overflow exploit for Kmail, a mail client for KDE. Tested against kmail v1.0.29 and v1.0.20.

tags | exploit, remote, overflow
SHA-256 | f55166711a0a151507c36c9ae5b1a55081ad5bbd687b9780e99dbcb0964c7668
Unisploit1.0.zip
Posted Apr 9, 2001
Authored by DarkWizard&Drakaz

IIS Unicode graphical exploit for Windows.

tags | exploit
systems | windows
SHA-256 | 87d2f5e93a85060a386ba7f3a28d801f8a987c41206788d27cc1c6ab52a64768
vim_exp.pl
Posted Apr 9, 2001
Authored by Nemes||y

Vim 5.7 local exploit - This perl script creates a text file which when edited in vim executes an arbitrary file on the local system as the user running vim.

tags | exploit, arbitrary, local, perl
SHA-256 | 94ac1222cdab6241822c8841377d2a2604f38df90c7a18c05a1615eec0506075
ssh_dos.pl
Posted Apr 7, 2001
Authored by Nemes||y

Windows SSHD remote denial of service exploit - Written in perl, affects SSH Communications Security SSH 2.4 for Microsoft Windows 95,98,NT4,2000.

tags | exploit, remote, denial of service, perl
systems | windows
SHA-256 | 53a2efceffbe1c6830a7e37b74a54871d0ece685d060fe04b74b5d8b870a9167
splex.txt
Posted Apr 7, 2001
Authored by Echo8

Shareplex v2.x (Quest Software's product for Oracle database replication) contains a local security hole which allows users to read any file on the system. Vulnerable platforms include Solaris 2.6, HP/UX 10.20 & 11.00, AIX 3 and OSF/1 4.0. Patched in v2.1.3.21.

tags | exploit, local
systems | solaris, aix, hpux
SHA-256 | 411071a044dfae79b08eacc42c4cada905fb4b0a45a2d420fe4048e37c2273fa
ccc_harvest.txt
Posted Apr 7, 2001
Authored by Richard Scott

CCC Harvest v5.0, a tool to audit and maintain access control to source code, uses an encryption method which is susceptible to a chosen plaintext attack, allowing users to capture and decrypt the application admin password.

tags | exploit
SHA-256 | 5a798c2dd6883904e1ff332f33f014a1e9d3c67e7e7a1f395706ba7937e39ec3
Malevolence.sit
Posted Apr 7, 2001
Authored by Marukka Der Inhaber | Site msec.net

Malevolence is a exploit that allows users to view a unshadowed version of the /etc/password file on a Mac OS X computer. Malevolence is very easy to use, in either Terminal.app or though a telnet session just run Malevolence and it will create a file called "index.html" in the same directory as Malevolence. Then just open up the web browser of your choosing and view the index.html file that Malevolence created.

tags | exploit, web
systems | apple, osx
SHA-256 | 36ae0cac2571370054894118637a55c4248cdba8650f48e83563806593ab11dc
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Juniper Networks Publishes Dozens Of New Security Advisories
Posted Apr 15, 2024

tags | headline, flaw, juniper
LockBit Copycat DarkVault Spurs Rebranding Rumor
Posted Apr 12, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
French Issue Alerte Rouge After Local Govs Knocked Offline By Cyberattack
Posted Apr 12, 2024

tags | headline, government, denial of service, france
More Legal Acrimony For Truth Social, As Executive Says He Was Hacked
Posted Apr 12, 2024

tags | headline, hacker, password, social
Palo Alto Networks Warns Of Exploited Firewall Vulnerability
Posted Apr 12, 2024

tags | headline, hacker, flaw
Roku Says More Than 500,000 Accounts Impacted In Cyberattack
Posted Apr 12, 2024

tags | headline, hacker, privacy, data loss, flaw
US Government On High Alert As Russian Hackers Steal Critical Correspondence From Microsoft
Posted Apr 12, 2024

tags | headline, hacker, government, microsoft, email, usa, russia, data loss, cyberwar
Apple Drops Term State-Sponsored Attacks From Its Threat Notification Policy
Posted Apr 11, 2024

tags | headline, government, privacy, phone, india, cyberwar, spyware, apple
Google Cloud Unveils New AI-Powered Security Capabilities
Posted Apr 11, 2024

tags | headline, botnet, google
Fortinet Patches FortiClientLinux Critical RCE Vulnerability
Posted Apr 11, 2024

tags | headline, flaw, patch
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close