Exploit the possiblities
Showing 1 - 22 of 22 RSS Feed

Files

unichk.tar.gz
Posted Jan 19, 2002
Site tomktech.n3.net

Unichk is a tool for Linux which checks for 224 Unicode vulnerabilities in Microsoft IIS.

tags | exploit, vulnerability
systems | linux
MD5 | 2943d568f744cc6ec23a8b8cb87e9e38
2001-exploits.tgz
Posted Jan 10, 2002
Authored by Todd J.

Packet Storm new exploits for 2001.

tags | exploit
MD5 | 77aee8be15fceb090950605ec8e7a4f3
XPloit.c
Posted Jan 1, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

WinME/XP UPNP remote dos and buffer overflow overflow exploit. Sends malformed data to TCP port 5000. Includes the option to spawn a shell on port 7788.

tags | exploit, remote, overflow, shell, tcp
systems | windows
MD5 | f9206046fe2db51c88104dea21788ee8
smash_bin_login.c
Posted Dec 28, 2001
Authored by JW Oh | Site monkey.org

Solaris x86 v2.8 /bin/login via telnet remote buffer overflow exploit. Uses fixed addresses. Executes any command as root.

tags | exploit, remote, overflow, x86, root
systems | solaris
MD5 | a738b5f4370aa08653cf62c7c419bf8b
pmexpl.c
Posted Dec 28, 2001
Authored by IhaQueR@IRCnet

Pmake <= 2.1.33 local root exploit. Some distributions have pmake suid root by default.

tags | exploit, local, root
MD5 | 60072037d04fb99236213b82a4239fdf
nb-isakmp.pl
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.pl is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. Perl version.

tags | exploit, remote, denial of service, perl, proof of concept
systems | windows
MD5 | f5af9905a00822bcb51cfbd06064da72
nb-isakmp.c
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.c is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. C version.

tags | exploit, remote, denial of service, proof of concept
systems | windows
MD5 | 690321d47ef04f0d314c84e8da296191
adstreamer.txt
Posted Dec 26, 2001
Authored by Gobbles Security | Site bugtraq.org

AdStreamer is a cgi package with several remote vulnerabilities, one of which allows remote command execution. Buggy open calls were found in addbanner.cgi, banner.cgi, bannereditor.cgi, and report2.cgi.

tags | exploit, remote, cgi, vulnerability
MD5 | 06fc404d3b77658241ef7dfe94f0d8bf
ie.cert.attack.txt
Posted Dec 26, 2001
Authored by Stefan Esser | Site e-matters.de

A flaw in Microsoft Internet Explorer allows an attacker to perform a SSL Man-In-The-Middle attack without the majority of users recognizing it. In fact the only way to detect the attack is to manually compare the server name with the name stored in the certificate due to a flaw in the way IE checks HTTPS objects that are embedded into normal HTTP pages.

tags | exploit, web
MD5 | 813b3f6b340271cde3c512bb61deeb01
twlc-adv-plesk211201.txt
Posted Dec 26, 2001
Authored by twlc, Supergate | Site twlc.net

Plesk, a popular server administration tool used by many web hosting companies, has a bug which allows remote users to view the source of .php hosted files. All versions prior to v2.0 are affected.

tags | exploit, remote, web, php
MD5 | a7d92ef2dc4845c652651a3543755d05
script.command.txt
Posted Dec 18, 2001
Authored by Marco van Berkum | Site ws.obit.nl

The script command overwrites hardlinks named typescript in the current directory.

tags | exploit
MD5 | e546ea507ca071abe3463d61624074c1
atphttpd.pl
Posted Dec 17, 2001
Authored by Tamer Sahin | Site securityoffice.net

ATPhttpd v0.4a remote denial of service buffer overflow Tested against OpenBSD 2.9.

tags | exploit, remote, denial of service, overflow
systems | openbsd
MD5 | 392571248a30489738ca74447900141a
atphttpd-smack.c
Posted Dec 17, 2001
Authored by Tony Lambiris | Site sec.angrypacket.com

ATPhttpd v0.4b remote buffer overflow exploit. Tested on and against OpenBSD 2.8. Binds a shell to port 6969 which has the UID of the webserver.

tags | exploit, remote, overflow, shell
systems | openbsd
MD5 | ebcb55b399e6cc1df9b8a7590bfa606b
itransact.txt
Posted Dec 17, 2001
Authored by Jesse S. Williams

A security flaw in the itransact.com credit card payment system allows users to change the price of merchandise ordered.

tags | exploit
MD5 | 156e08a83f72f8a46397366a52e8ad1f
SpeedXess.txt
Posted Dec 13, 2001
Authored by secret | Site wowhacker.com

SpeedXess DSL routers come with a default password of speedxess.

tags | exploit
MD5 | 415cfed7781561fcb5133a3b24345773
01-wu261.c
Posted Dec 12, 2001
Authored by Zen-Parse

Wu-Ftpd v2.6.1 and below remote root exploit which takes advantage of the SITE EXEC globbing vulnerability. Includes instructions on finding the offset with gdb.

tags | exploit, remote, root
MD5 | faa411281a9318348a43d54c8ab92769
own-ettercap.c
Posted Dec 9, 2001
Authored by gobbles, Alicia | Site bugtraq.org

Ettercap v0.6.2 local root format string exploit. Works if the administrator made Ettercap SUID.

tags | exploit, local, root
MD5 | d6e5951f7604f7851edf50f992c03724
UseLogin.txt
Posted Dec 9, 2001
Authored by War | Site genhex.org

OpenSSH v3.0.1p1 and below root exploit which only works of the administrator has turned on the UseLogin feature. Uses the libroot library. Requires an account on the remote machine.

tags | exploit, remote, root
MD5 | ee90a8217d3ebac2b297609567373f38
kebi-webmail_vul.txt
Posted Dec 9, 2001
Authored by secret | Site wowhacker.org

The Kebi Webmail server allows remote users to have administrator access by going to http://site.com/a/.

tags | exploit, remote, web
MD5 | faaf892f274f6a268f6768e4f56b1b5d
jack.c
Posted Dec 5, 2001
Authored by Indigo

Jack.c is a remote exploit for the Active Perl ISAPI overflow described in Bugtraq ID 3526. Sends you a shell with SYSTEM level access.

tags | exploit, remote, overflow, shell, perl
MD5 | 485e818e6aa9c8cd8c3a3d692a4a084f
jim.c
Posted Dec 5, 2001
Authored by Indigo

Jim.c is an exploit for the remote IIS server side include buffer overflow vulnerability. Tested on Linux and Win32. To exploit this vulnerability you must have write access to the web root of the target web server. Causes the server to send you a shell with SYSTEM level access.

tags | exploit, remote, web, overflow, shell, root
systems | linux, windows
MD5 | ce7ba29b042a913db88bb171d6db8db4
badboy.c
Posted Dec 5, 2001
Authored by Indigo

Badboy.c is a remote exploit for the Win32 Checkpoint Firewall-1 GUI log viewer program. Binds a shell to a port with SYSTEM level access. Must be run from a valid GUI client machine.

tags | exploit, remote, shell
systems | windows
MD5 | 30aecb9b9cc3b85879d290607853efe9
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
After False Hawaii Missile Notice, FCC Launches Investigation
Posted Jan 15, 2018

tags | headline, government, usa, cyberwar
MaMi Malware Targets Mac OS X DNS Settings
Posted Jan 15, 2018

tags | headline, malware, dns, fraud, apple
Meltdown-Spectre Patches Causing Issues With Industrial Companies
Posted Jan 15, 2018

tags | headline, flaw, patch, scada, intel
Oracle Still Silent On Meltdown, But Lists Patches For x86 Servers Among 233 New Fixes
Posted Jan 15, 2018

tags | headline, database, flaw, patch, oracle, intel
House Expands Warrantless Surveillance Against US Citizens
Posted Jan 12, 2018

tags | headline, government, privacy, usa, phone, spyware, nsa
Retpoline Fix Supposedly Solves Performance Hits For Spectre
Posted Jan 12, 2018

tags | headline, flaw, google, patch, intel
EMC, VMware Security Bugs Throw Gasoline On Cloud Security Fire
Posted Jan 12, 2018

tags | headline, amazon, flaw, intel
Mueller Adds DOJ Cybercrime Prosecutor To His Team
Posted Jan 12, 2018

tags | headline, government, usa, russia, cybercrime, fraud, fbi
Android Trojan Targets North Korea Defectors And Their Supporters
Posted Jan 11, 2018

tags | headline, government, malware, cyberwar, korea
Bitcoin-Crazy South Korea May Face A Ban On Trading
Posted Jan 11, 2018

tags | headline, government, bank, korea, cryptography
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close