Exploit the possiblities
Showing 1 - 10 of 10 RSS Feed


Posted Feb 22, 2002
Authored by scut | Site team-teso.net

7350854 - x86/bsd telnetd remote root exploit which takes advantage of the AYT buffer overflow. Tested against BSDI BSD/OS 4.1, NetBSD 1.5, FreeBSD 3.1, FreeBSD 4.0-REL, FreeBSD 4.2-REL, FreeBSD 4.3-BETA, FreeBSD 4.3-STABLE, and FreeBSD 4.3-RELEASE.

tags | exploit, remote, overflow, x86, root
systems | netbsd, freebsd, bsd
MD5 | 4af983d90b4d56942224b8389d83fe54
Posted Oct 4, 2001
Authored by Tony Lambiris | Site sec.angrypacket.com

Aimrape is a remote denial of service exploit for AOL Instant Messenger (AIM) v4.7.2480 and below.

tags | exploit, remote, denial of service
MD5 | c1eac4de81c5497037961f7de9f51d4e
Posted Sep 28, 2001
Authored by Nemes||y

Majordomo v1.94.4 local exploit in perl. Binds a shell to port 1234 with uid=Majordomo.

tags | exploit, shell, local, perl
MD5 | 93542c2ce8283244257ff38ed13f553c
Posted Sep 19, 2001
Authored by Marco van Berkum | Site ws.obit.nl

Majordomo v1.94.4 contains vulnerabilities which allow local users to obtain a uid=majordomo shell.

tags | exploit, shell, local, vulnerability
MD5 | f6097b21c3e3084814496027e4c89aad
Posted Sep 19, 2001
Authored by KK Mookhey

The Oracle 9i Application Server uses the Apache web server for HTTP service. However, if a request is made for a non-existent .jsp file, the complete path is shown.

tags | exploit, web
MD5 | 03c1cfbb8ebb0f71cef657b855fb25dc
Posted Sep 12, 2001
Authored by Paul Godfrey

Kazaa and Morpheus remote denial of service exploit in perl - Floods the server using non-rate limited shared folder connections.

tags | exploit, remote, denial of service, perl
MD5 | 37d8b33d6f5e3d0b8f357405a0f0a59b
Posted Sep 11, 2001
Authored by venomous | Site rdcrew.com.ar

A code red mass fix/abuse tool.

tags | exploit
MD5 | 3961bb92858e36a6743c5afc12a8b11e
Posted Sep 11, 2001
Authored by Magnetic

Denial of service attack against a 3com ADSL 812 router in Java. Resets the router without any password, as described here.

tags | exploit, java, denial of service
MD5 | 36a23d0969a3dfa812dc12aef2354cab
Posted Sep 11, 2001
Authored by hhp, Ben Schultz | Site hhp-programming.net

Cso.c is a remote exploit for cgicso included with cgiemail 1.6. Tested on Slackware Linux 7.1 running Apache 1.3.20.

tags | exploit, remote
systems | linux, slackware
MD5 | bca688c3d593da49eb33f09d20d27877
Posted Sep 3, 2001
Authored by Nemes||y

Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.

tags | exploit, remote, perl
systems | linux, redhat
MD5 | b84cd17517203b65b5ed2cd4fe7002e7
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By