exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files

WebCart.pl
Posted Apr 2, 2003
Authored by SPAX | Site spabam.tk

Remote exploit for Webcart v8.4 that will spawn a bash shell with the webserver uid.

tags | exploit, remote, shell, bash
SHA-256 | 9f3b471eb2039d0f0de8bb0d68e591d5438e2f29acfb6467664919a7a3b3517a
comphack.c
Posted Dec 5, 2001
Authored by Indigo

Comphack.c is a remote exploit for Compaq Insight Manager.

tags | exploit, remote
SHA-256 | 77ce882eebad3c846cad7406ee942408f5d27df5e3e7c6d6733ae42461dcf0d9
php-nuke.5.1.txt
Posted Nov 22, 2001
Authored by Cabezon Aurelien | Site iSecureLabs.com

PhpNuke v5.1 allows remote users to steal the admin password, which is Base 64 encoded. The password is in a cookie which needs to be stolen from the admin by asking him to visit a link.

tags | exploit, remote
SHA-256 | 7af6df4201e5053dd29cb236178603fdb4a5bda31c8042192edb2f568326c3d9
CgiXp.exe
Posted Nov 22, 2001
Authored by Trippin Smurfs

CgiXp.exe is a remote exploit for Webcart v8.4 (bugtraq id 3453) and several unicode vulnerabilities (bugtraq id 1806). Tested against Windows NT Server 2000 / IIS 5.0 and Linux Red Hat 7.2 / Apache 1.3.22 +webcart.cgi. Gui based, requires Visual Basic 5.0 .OCX files in your system directory (richtext ocx, msinet dll).

tags | exploit, remote, cgi, vulnerability
systems | linux, redhat, windows
SHA-256 | bfb17b9ce107c0b63e002bf9a232a47c3933a3eba05ece3d08aebbad41d5c025
fingerd-cgi.txt
Posted Nov 22, 2001
Authored by gobbles | Site bugtraq.org

Berkeley finger.cgi has a remote command execution vulnerability because it does not strip out newlines.

tags | exploit, remote, cgi
SHA-256 | 9522938f90cc239769620d06fc8cdd679f71ea497be3e18b34ec0cfceaaf02f6
flickstitan.txt
Posted Nov 22, 2001

The Flicks Titan application firewall for IIS has a vulnerability in the url inspection allowing it to be easily bypassed.

tags | exploit
SHA-256 | c9ae3c7cec218aa4c0a512ca5aab4dada76da541b52fcc647bd0702fc4ea36a6
write.c
Posted Nov 21, 2001

Proof of concept code for the Solaris 2.6 and 2.7 (SPARC) "write" buffer overflow. Guile Cool

tags | exploit, overflow, proof of concept
systems | solaris
SHA-256 | f21badab966bdf7e602bc08f4a5c985093b94ac2fd1db132e7a1e225c048e477
hp-ux-bdf.c
Posted Nov 14, 2001
Authored by Brainstorm, electronicsouls | Site es.xor.ru

Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.

tags | exploit, overflow, local, root
systems | hpux
SHA-256 | 0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce
dwarf.tgz
Posted Nov 13, 2001
Authored by Scrippie | Site synnergy.net

Dwarf.cpp is an unreleased exploit for Troll ftpd, a supposedly secure ftp server.

tags | exploit
SHA-256 | c289a2eefb385f3cef6e155cc5d978a8d0952c549cb00ff74ebb244d1261355f
tuxDOS.pl
Posted Nov 6, 2001
Authored by Malcom-x

Tux web server remote dos attack. Sends a large host parameter inside the get request. Tested again RedHat 7.2.

tags | exploit, remote, web
systems | linux, redhat
SHA-256 | 029a738f9b68551f68b054c1d398abfbab7c1c19c344eabb37256f52d1ec0928
IIS5-Koei.zip
Posted Nov 6, 2001
Authored by eSDee | Site hoepelkoe.cjb.net

IIS 5.0 remote win32 exploit for the null.printer buffer overflow.

tags | exploit, remote, overflow
systems | windows
SHA-256 | ce2073743bd10136edc549bb174a68f191651fd565885d653fb6d128c2ecc388
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close