exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files

ldap-exp2.c
Posted Jul 10, 2003
Authored by Fyodor | Site notlsd.net

Solaris 8 LDAP_OPTIONS local buffer overflow exploit which takes advantage of a bug in libsldap.so.1.

tags | exploit, overflow, local
systems | solaris
SHA-256 | fbf6de6cb08309b916fc1f7834bc383860b579ea95037740cc187c35f913b224
oas408-exp.pl
Posted Jul 10, 2003
Authored by Fyodor | Site notlsd.net

Oracle application server 4.0.8.2 + Netscape Enterprise 4.0 webserver remote exploit in perl which attempts to execute commands remotely as root. Netscape Enterprise webserver must be configured as external 'web listener' for Oracle. Overflow happens when a long string requested with prefix which has been 'linked' to oas. by default it is /jsp/. Takes advantage of the Oracle Application Server shared library buffer overflow which affects Oracle application server 4.0.8.2 + iWS 4.0/4.1 webserver, running on Sparc/Solaris 2.7.

tags | exploit, remote, web, overflow, root, perl
systems | solaris
SHA-256 | 045f497e451554365c75a888a54888851684db64b10d241f5348b3d6b422abc1
0105-exploits.tgz
Posted Jun 4, 2001
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for May, 2001.

tags | exploit
SHA-256 | f57f3b5f09f5712f1bd0ed4dd43383a800ec94fcc48e9e6646e82555f0ff4323
gnupig.tar.gz
Posted May 31, 2001
Authored by Fish Stiqz | Site gibson.analog.org

Gnupig is an advisory and exploit for the Gnupg v1.0.5 format string vulnerability which creates an encrypted file which executes code when it is decrypted.

tags | exploit
SHA-256 | ac649f815afe8db3e8e2d13836c1870964dd972e44857e461df7104d04761240
requiem.c
Posted May 31, 2001
Authored by Sagi | Site idiotbox.co.il

HP/UX local exploit for /opt/OV/bin/ecsd.

tags | exploit, local
systems | hpux
SHA-256 | 2de424af94be9fb6a61cd2c72d940df117c2eeaae50d877ddb06a4652ee9abce
cool2
Posted May 30, 2001
Authored by Renato Turini

Cool2 is a perl script which checks a list of hosts for IIS servers which are vulnerable to the decode bug and the old unicode bug.

tags | exploit, perl
SHA-256 | 992e799ee26d6aaa457432a5be7c3db3479c2f5ed9f94b41f92878e2fb8ebdd8
scx-sa-20.txt
Posted May 30, 2001
Authored by Incubus | Site securax.org

Securax Security Advisory #20 - The 1st Up Mail Server version 4.1.6a and below contains a remote denial of service vulnerability. Fix available here.

tags | exploit, remote, denial of service
SHA-256 | c9d3d44add8e60cf5afe922404991f19df0341b12c9296a9ea83fa9b2c70ae33
omnised.pl
Posted May 30, 2001
Authored by Speedy | Site dutchriot.com

Omnised.pl is an exploit for Omnihttpd v2.08 for Windows 98/me/nt/2000 which lets you dump the source of php perl and other files to a txt file. These files may contain passwords.

tags | exploit, perl, php
systems | windows
SHA-256 | 9276193adbdd9b969f90b2323644d613d1e30a9bebe9d41fa67790946031064b
xchat.c
Posted May 25, 2001
Authored by Sector X | Site crosswinds.net

X-Chat v1.2.x format string bug exploit. Tested against x-chat v1.2.1 on Slackware 7.1.

tags | exploit
systems | linux, slackware
SHA-256 | b469eda18d6e1805cd4e8a0be2fbb3cb43284ad07087b99b32725d1ff02f9fc4
decodecgi.pl
Posted May 24, 2001
Authored by **W**

This little piece of perl code tries to exploit the double decoding BUG on IIS 4 & 5.

tags | exploit, perl
SHA-256 | 33a120d3fdad4e6ced42a48f9ed06541f1a7acdd6e07b660fa045c63cafecb32
LinkMax.txt
Posted May 23, 2001

The WebAvail LinkMax2 (ASP) allows website visitors to view the LinkMax2 admin login and password. Fix included.

tags | exploit, asp
SHA-256 | bc49f92d642851afebdaa716c8669034d092c6652034fd4a9c0ddaa830453e4f
dqsexp.c
Posted May 21, 2001
Authored by Dex | Site raza-mexicana.org

DQS package v3.2.7 (/usr/bin/dsh) local root exploit. Tested against SuSE 6.3, 6.4, and 7.0.

tags | exploit, local, root
systems | linux, suse
SHA-256 | dc781082f966e7e84fd45bc05a9af244e12da062b9438a7c4ce05fe3639b7a91
execiis.c
Posted May 17, 2001
Authored by Filip Maertens | Site vorlon.hexyn.be

Execiis.c is a remote exploit for Bugtraq ID 2708 - Microsoft IIS CGI filename decode error.

tags | exploit, remote, cgi
SHA-256 | 930daed1380743902694409c2275d36ed101487eb3dbd8df8b795068aba598ba
sensedecode.tgz
Posted May 17, 2001
Authored by Roelof Temmingh | Site sensepost.com

Sensedecode.tgz includes 2 perl scripts which exploit the IIS url decoding bug. Decodecheck.pl checks for hosts that have the "decode" problem, and decodexecute executes code using the decoding problem, with redirection.

tags | exploit, perl
SHA-256 | d32db266c769e68dd5e55144cdff5aac3d5f570243d3c50560169d168c96b542
sa2001_02.txt
Posted May 17, 2001
Site nsfocus.com

NSFOCUS Security Advisory SA2001-02 - The nsfocus team has found a vulnerability in filename processing of CGI program in MS IIS4.0/5.0, as discussed in ms01-026. CGI filename is decoded twice by error. Exploitation of this vulnerability leads to intruders being able to run arbitrary system commands with IUSER_machinename account privilege. Exploit URL's included.

tags | exploit, arbitrary, cgi
SHA-256 | 1f24fde1bac96def60ac10c00a6e82940ada309470835ba73f5d78b25c6f6fec
webcgi98.txt
Posted May 17, 2001
Authored by Xbud

Acadsoft's webcgi98.exe displays the full path to the binary in an error message.

tags | exploit
SHA-256 | 87a2492754de406640b736c27877e5fea0ea2bf16f000790a41c42110d3365f5
sol8_mailx.c
Posted May 8, 2001
Authored by Nemes||y

/usr/bin/mailx local buffer overflow exploit. Gives gid=mail shell. Tested against Solaris 8.

tags | exploit, overflow, shell, local
systems | solaris
SHA-256 | 8270d776c54245c8f9730bdf87c4de6ee29ce8e325d9e3fb78e6f9951ae96cbc
rdC-cfingerd.c
Posted May 8, 2001
Authored by venomous | Site rdcrew.com.ar

Cfingerd prior to v1.4.3 remote root exploit for linux/x86. Exploits a format string vulnerability in the syslog() call.

tags | exploit, remote, x86, root
systems | linux
SHA-256 | d8bf8ec5db51a03a2a06971d1a62f5b817394a89a0963c7f4adf17a3b5bfdc71
jill.c
Posted May 7, 2001
Authored by Dark Spyrit

Jill.c (fixed version) is a remote exploit for the IIS 5.0 / Windows 2000 remote .printer overflow. Spawns a reverse cmd shell.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | 4eaf53b6615baedb4fac1be5c4beb5aa4c9708ae0370a0dd8b34bf8080a4ddbb
fingex.pl
Posted May 3, 2001
Authored by Lez

Cfingerd prior to v1.4.2 remote root exploit - Takes advantage of the syslog format string bug. Tested on Debian 2.1 and 2.2.

tags | exploit, remote, root
systems | linux, debian
SHA-256 | 70f413a4d20fd258ec79ede4b34842fe8435ef1209fb32fae0d717b0718d3107
ronin.c
Posted May 3, 2001
Authored by Styx

Ronin.c is a FreeBSD-4.2 remote root exploit. Requires user access and a writable home directory without chroot.

tags | exploit, remote, root
systems | freebsd
SHA-256 | d2e33c037790692c389b96a7601e8f1408b6545023a8abce9baf0cbcdda89c20
g6-dos.txt
Posted May 3, 2001
Authored by G_Kos

The G6 FTP server v2.00 freezes if told to create a directory "COM1", "COM2", "COM3" or "COM4".

tags | exploit, denial of service
SHA-256 | 716e570229564b04ebe6d9eb93f65830929d5d4b253495f360aab2e142e6e52f
iishack2000.c
Posted May 3, 2001
Authored by Ryan Permeh | Site eeye.com

Windows 2000 / IIS 5.0 sp0 + sp1 remote exploit. Overflows the Host: header of the isapi .printer extension. The included shellcode creates a file in the root drive of c:\ which contains instructions on how to patch your vulnerable server. Compiles on Windows, linux, and *bsd.

tags | exploit, remote, overflow, root, shellcode
systems | linux, windows, bsd
SHA-256 | 9fff87f325e3b0b2e95b688b5c791f29e66f7277f9fd816703595f63a89b9eeb
webexplt.pl
Posted May 3, 2001
Authored by Wanderley J. Abreu Jr.

Windows 2000 / IIS 5.0 + SP1 Internet Printing Protocol vulnerability test. Causes a memory leak and reports whether or not the remote site is vulnerable, but does not contain shellcode.

tags | exploit, remote, shellcode, protocol, memory leak
systems | windows
SHA-256 | 7acc303c4980d09fc650229e55553b5c0ada450b62f78168bace6cbcf5152918
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close