seeing is believing
Showing 1 - 25 of 32 RSS Feed

Files

lpplus.txt
Posted Sep 18, 2001
Authored by Echo8

LPPlus is Plus Technologies print management system for unix. Versions prior to 3.3.x contain several serious security holes, some of which undermine the integrity of the printing subsystem, others threaten the security of the system on which the product is installed. Upgrade available here.

tags | exploit
systems | unix
MD5 | f8eacbf074a5a8841982762a92fe33dd
cnn_unsubscribe_bot.txt
Posted Aug 30, 2001
Authored by Jay Daniels

The CNN Unsubscribe Bot can Un-Subscribe other users from CNN's distribution list by placing a random number at the end of unsubscribe cgi URL's member_id.

tags | exploit, cgi
MD5 | 7559650c2e76073b04fb8c48d57ba4ec
RUS-CERT.apache.auth.txt
Posted Aug 30, 2001
Site cert.uni-stuttgart.de

RUS-CERT Advisory - Several Apache authentication modules which use SQL databases have remote vulnerabilities. Any Apache server using database-based authentication with the following modules is vulnerable - AuthPG 1.2b2, mod_auth_mysql 1.9, mod_auth_oracle 0.5.1, mod_auth_pgsql 0.9.5, and mod_auth_pgsql_sys 0.9.4. An attacker can execute arbitrary PostgreSQL or Oracle statements.

tags | exploit, remote, arbitrary, vulnerability
MD5 | 9193b07708544bcfec9f707cd421690c
bsdautoroot.c
Posted Aug 28, 2001
Authored by Goni

BSD Auto-rooter - Runs a trojan on many machines using the telnetd exploit.

tags | exploit, trojan
systems | bsd
MD5 | aed68be6b47a4a4221296d75fabe9899
patchadd.pl
Posted Aug 28, 2001
Authored by Larry W. Cashdollar

Solaris 2.8 patchadd local exploit. Takes advantage of a symlink vulnerability to clobber files with output from patchadd. Tested on Solaris 2.8 Sparc with the current patch cluster applied.

tags | exploit, local
systems | solaris
MD5 | e82cc2d3f9571ccb3e3fc241ddaebb1a
aolcrash.c
Posted Aug 28, 2001
Authored by Exty

AOLserver v3.0 and 3.2 remote denial of service bug. Sends a long HTTP request.

tags | exploit, remote, web, denial of service
MD5 | 3a23c1a446ea4da1a8848ba87ea5811d
alt3kx-advisories-2001-002.txt
Posted Aug 25, 2001
Authored by Alt3kx

Ntop v1.1 for Solaris/x86 contains a remotely exploitable buffer overflow in the http server which defaults to tcp port 8080.

tags | exploit, web, overflow, x86, tcp
systems | solaris
MD5 | b835b14e9bd0431144499b6dc3c5e6c7
xp.tar.gz
Posted Aug 25, 2001
Authored by Lucysoft

Sendmail 8.11.5 and below local root exploit for linux.

tags | exploit, local, root
systems | linux
MD5 | 945b1ee84290d2a8d065d059bc740dc3
alsou.c
Posted Aug 25, 2001
Authored by Grange

Sendmail-8.11.x linux x86 local exploit. Takes advantage of a memory access violation when specifying out-of-bounds debug parameters.

tags | exploit, x86, local
systems | linux
MD5 | 9ca3b58dee980471ff0c1c8d15d79a94
killbsdi.c
Posted Aug 21, 2001
Authored by vade79, realhalo | Site realhalo.org

BSDI v3.0 / 3.1 local dos exploit which reboots the system by running some shellcode.

tags | exploit, local, shellcode
MD5 | 1bb16ade4069cba6748f2563429b8bbc
ftpd.c
Posted Aug 20, 2001
Site lsd-pl.net

AIX PowerPC v4.3.x ftpd remote exploit (yyerror() bug).

tags | exploit, remote
systems | aix
MD5 | 87d572a2ae96a7adfa4f4f7365d3530d
pdnsd.c
Posted Aug 20, 2001
Site lsd-pl.net

AIX PowerPC v4.1 and 4.2 remote exploit for pdnsd.

tags | exploit, remote
systems | aix
MD5 | fc1a5da75298c8259b7a0027949821cb
setsenv.c
Posted Aug 20, 2001
Site lsd-pl.net

AIX PowerPC 4.1, 4.2, and 4.3.x local exploit for /usr/bin/setsenv.

tags | exploit, local
systems | aix
MD5 | de69263c8a6387806065612ff62b7c7c
portmir.c
Posted Aug 20, 2001
Site lsd-pl.net

AIX PowerPC 4.2 and 4.3.x local exploit for /usr/sbin/portmir.

tags | exploit, local
systems | aix
MD5 | 6517db6eaf1f8adff7b7b39a53b03a9f
piobe.c
Posted Aug 20, 2001
Site lsd-pl.net

AIX PowerPC 4.1, 4.2, and 4.3.x local /usr/lib/lpd/piobe exploit.

tags | exploit, local
systems | aix
MD5 | 78b06fc6e92bb13de9ff91dca89dec14
digest.c
Posted Aug 20, 2001
Site lsd-pl.net

AIX PowerPC 4.1, 4.2, and 4.3 local exploit for /usr/lib/lpd/digest.

tags | exploit, local
systems | aix
MD5 | 1878d266f1c3d3f1d93458ab0ff630a0
xlock.c
Posted Aug 20, 2001
Site nsfocus.com

xlock.c - Proof of Concept Code for xlock heap overflow bug. Tested in Solaris 8 x86.

tags | exploit, overflow, x86, proof of concept
systems | solaris
MD5 | 31f5870f393a6e156a20c61243890a7f
mailex.c
Posted Aug 20, 2001
Authored by Virtualcat | Site xfocus.org

Mailex.c is a Solaris x86 mail HOME environment variable buffer overflow exploit. Tested on Solaris 8 (x86).

tags | exploit, overflow, x86
systems | solaris
MD5 | 5d7612e078c5e26ab2a4f5710c5bd2fc
kcms.c
Posted Aug 20, 2001
Site xfocus.org

Solaris 7/8 kcms_configure command line buffer overflow on both sparc/Intel platforms.

tags | exploit, overflow
systems | solaris
MD5 | a5c2ec7e56db53af52ff19608a06d752
top.c
Posted Aug 20, 2001
Authored by Truefinder

FreeBSD 3.3 x86 top format string exploit. Tested against top-3.5beta9.

tags | exploit, x86
systems | freebsd
MD5 | 0541d60fbd5725a324bab97615d1c1a7
idqrafa.pl
Posted Aug 20, 2001
Authored by Rafa

Windows 2000 + IIS .ida exploit in perl. Binds a shell to port 8008.

tags | exploit, shell, perl
systems | windows, 2k
MD5 | 36c21688844e275f4f528a8716e9dd22
exp_w3m.pl
Posted Aug 19, 2001
Authored by White E | Site ttj.virtualave.net

w3m remote buffer overflow exploit for FreeBSD. Runs as a daemon and waits for w3m to connect. FreeBSD advisory about w3m here.

tags | exploit, remote, overflow
systems | freebsd
MD5 | 544144fce48058a131724c9c40bfd1fb
sa2001_06.txt
Posted Aug 19, 2001
Site nsfocus.com

NSFOCUS Security Advisory SA2001-06 - A buffer overflow vulnerability has been found in ssinc.dll which is triggered when Microsoft IIS 4.0/5.0 when processes server side include files. An attacker could obtain SYSTEM privilege if he can save html on the server. Discussed in ms01-046.

tags | exploit, overflow
MD5 | 9ced457870402db712f9b5caf630cd0a
groupwise.disclosure.txt
Posted Aug 16, 2001
Authored by Simple Nomad | Site nmrc.org

NetWare Enterprise Web Server 5.1 has a couple security problems - When NDS browsing via the web server is enabled, if an attacker can reach that server's port 80 they can enumerate information such as user names, group names, and other system information. In addition, poor handling of GET commands will allow for GroupWise WebAccess servers to display indexes of the directories instead of HTML files.

tags | exploit, web
MD5 | 3b5768becf6d2f625d569d0330371237
sendmail.php.txt
Posted Aug 16, 2001
Authored by Jonathan Wilkins | Site bitland.net

PHP-Nuke Written by Sequioa Software contains sendmail.php, which allows remote users to execute commands and see files on the web server.

tags | exploit, remote, web, php
MD5 | 66597f55d0a77fbc8df3117555e97aad
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close