what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files

mtrewt.c
Posted Apr 3, 2003

Local root exploit for mtr versions lower than 4.0.6. Vulnerability originally found by KF of Snosoft.

tags | exploit, local, root
SHA-256 | d8abcbb929ad05dfb21ec534c2ad715d568011e3df645bbfcfb8825327e5eb29
x2.tgz
Posted Jul 18, 2002

X2 exploits the SSH CRC-32 attack detection code buffer overflow vulnerability that exists in SSH1 implementations. The exploit is distributed in binary form and has been encrypted. Includes 45 target types. 319 target types are available Fair Use Law 17 U.S.C.A 107

tags | exploit, overflow
SHA-256 | 12258dcf8899d36e83ad1f68fd80e8b11b98188582068bf2c92b683f048f2711
7350fun
Posted Jul 18, 2002
Authored by Lorian

7350fun is a remote exploit for mod_php v4.0.2rc1-v4.0.5 and v4.0.6-v4.0.7RC2. This exploit appears to be a revised version of the 73501867 exploit, which was written by the same author, contained less functionality and was not encrypted. Note: this exploit also causes PHP 4.1.2 versions to segfault. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, php
SHA-256 | 8a1c0c6bcdd15226fa9559cd421b9ccc4eefd1e6864a6e563ecc6a07fb3258aa
pUll.pl
Posted Jul 8, 2002
Authored by Zillion, Alex Hernandez | Site safemode.org

Slrnpull '-d' buffer overflow exploit. Executes shellcode with group 'news' privileges. Tested to work on an Intel Red Hat 6.2 installation .

tags | exploit, overflow, shellcode
systems | linux, redhat
SHA-256 | eccfcdb6d3ad013958b3649b816be1230bf50ad9509fddc11a59fc1c14880407
0204-exploits.tgz
Posted May 7, 2002
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for April, 2002.

tags | exploit
SHA-256 | 8b9eddaafaebf6f06350f3a4d1d0a213ef6be8a89e1286ebfcdb5c7a518ff599
cisco677.pl
Posted May 5, 2002
Authored by DNV | Site mail.dhbit.ca

Cisco 677/678 Telnet Overflow denial of service perl exploit.

tags | exploit, denial of service, overflow, perl
systems | cisco
SHA-256 | cb4e9ab3984d7182248fb779619975b9ac913a2df54b7cecd9ca0a65b3f66fe9
tshttpd.pl
Posted May 5, 2002
Authored by TrippinSmurfs

AnalogX SimpleServer:WWW HTTP Server v1.1 denial of service buffer overflow exploit.

tags | exploit, web, denial of service, overflow
SHA-256 | 03c2897500c5a4b914acc5b464372800613e7e69016a97e8a3ab5d7d2919f9ff
tgt_v1_x86Lnx.tar.gz
Posted May 1, 2002
Authored by Marcell Fodor | Site mantra.freeweb.hu

Exploit for the local root bug in Kerberos IV TGT and AFS Token implementation of the OpenSSH server (sshd) version 2.2.0 - 3.1.0.

tags | exploit, local, root
SHA-256 | 615c14091c2a14f0145ea91725a05309132d3183e87da264223c7b7de7a6d8aa
food_for_the_poor.c
Posted May 1, 2002
Authored by Marcell Fodor | Site mantra.freeweb.hu

Food_for_the_poor is a linux exploit for a heap overflow in the Kerberos 4 ftp client which creates a suid shell in /tmp.

tags | exploit, overflow, shell
systems | linux
SHA-256 | bf578a293cf0fb675fef500fdd69f10ee9038332f6d871a043dc039d9beab1ce
msh3comdos.c
Posted May 1, 2002
Authored by Skyrim

3CDaemon FTP Server v2.0 buffer overflow dos exploit.

tags | exploit, overflow
SHA-256 | f356eb7981527a6a7920c4ab593bce2ccab2cacf56294d5cb8ded14619d5adae
epop.c
Posted Apr 25, 2002
Authored by Cult

This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions.

tags | exploit
SHA-256 | b8a406b2935f40c49f13e6e3d79fda76022255d9736da36f4610cbda284aaf71
psydos.txt
Posted Apr 25, 2002
Authored by Nawok

PsyBNC v2.3 has a problem dealing with oversized passwords, making it possible to tie up all the connection slots and consume a lot of CPU on the server.

tags | exploit
SHA-256 | 0076bdd43e597952dd16a6f401e73eea906e8ced691f051d4aff0d921f56940b
iischeck.pl
Posted Apr 25, 2002
Authored by Filip Maertens | Site filip.compsec.be

Microsoft IIS .HTR heap overflow checker. Determines remotely if patch MS02-018 has been applied.

tags | exploit, overflow
SHA-256 | 52133ff9dadd4573b967bc8fb29cf1e30d48c51d0ca09a8652e9a86b701d1b23
screen-stuff.tgz
Posted Apr 25, 2002
Authored by Gobbles Security

Screen v3.9.11 local root linux/x86 exploit for braille module bug.

tags | exploit, x86, local, root
systems | linux
SHA-256 | 90a3c9a09aff132ce76e2ff92bcfae748992637421e40057034ec7da4b1f6c8f
evelyne.sh
Posted Apr 25, 2002
Authored by netric, Atje | Site netric.org

Local root exploit for the "Suid application execution bug" (< FreeBSD 4.5-STABLE) that was discovered by Joost Pol from Pine.

tags | exploit, local, root
systems | freebsd
SHA-256 | f0a04ead1fe242bd1e5e26bb4bf52e05952b5a51e90dc885185f96487aee999d
iosmash.c
Posted Apr 25, 2002
Authored by phased

Iosmash.c is an exploit for the stdio kernel bug that resides in all releases of FreeBSD up to and including 4.5-RELEASE. The exploit uses keyinit, which is part of the S/key package, to create 5 valid root passwords that give instant root access trough S/key.

tags | exploit, kernel, root
systems | freebsd
SHA-256 | 6a6a5e8af30ab97b224a0e42ecc45ae27efc070689420d081e0ef24f01aa745c
pos_expl.c
Posted Apr 23, 2002
Authored by eSDee, netric | Site netric.org

Posadis m5pre1 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 02990a3bf9a9b52f587bd26ec96d8142429acc8d34e02e69e765ef4fb60221b1
pos_expl2.c
Posted Apr 23, 2002
Authored by eSDee, netric | Site netric.org

Posadis m5pre2 local format string exploit.

tags | exploit, local
SHA-256 | 025e81c77e339b0490a61b132dcf3996293528d7e06703be59938c0e883873e7
iisfux0r.txt
Posted Apr 23, 2002
Authored by Filip Maertens | Site filip.compsec.be

Microsoft IIS W3SVC Denial of Service - Brings down the inetinfo.exe process, crashing IIS.

tags | exploit, denial of service
SHA-256 | 81814de9d2e596727cfc98782533c7d68dd2b7ae0b565762aba72a987fd5e7bd
obsd-cron.c
Posted Apr 15, 2002
Authored by Venglin

OpenBSD 3.0 cron / mail local root exploit. Creates a suid shell after /etc/daily runs.

tags | exploit, shell, local, root
systems | openbsd
SHA-256 | a5b14450d1deca2a74846d64060b6c511cf04d505827df0274ff8d1380dc0745
iis.asp.overflow.txt
Posted Apr 11, 2002
Authored by Marc Maiffret | Site eEye.com

A vulnerability in the ASP (Active Server Pages) ISAPI filter, loaded by default on all NT4 and Windows 2000 server systems (running IIS), can be exploited to remotely execute code of an attackers choice. Example which causes an application error included. Microsoft advisory on this vulnerability here.

tags | exploit, asp
systems | windows
SHA-256 | 4e83e6b8e01187a334ff07545a457cce7fd15e5e451d031b026e792361bb9d42
xtelld261.c
Posted Apr 3, 2002
Authored by Spybreak

Xtell from the Debian Linux distribution is a network messaging client for sending messages to users on different computers. Xtell 2.6.1 with at least 3 remote buffer overflows, symlink bug, ".." directory traversal, file race condition, and more. Exploit spawns a shell on port 12321. Tested against Red Hat 7.2, 7.1; Debian Potato.

tags | exploit, remote, overflow, shell
systems | linux, redhat, debian
SHA-256 | 6ed195d3194377e4df0ecc29f2f8cb1d1bf25bebd9ce482ebca0708bafb87e3b
logwatch211.sh
Posted Apr 3, 2002
Authored by Spybreak | Site kaybee.org

LogWatch 2.1.1 is a part of the Red Hat Linux 7.2 distribution, enabled by default and daily run by the cron daemon. On a system running LogWatch, a local user is able to gain unauthorized root access, due to a race condition during the temporary directory creation.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | 98ffcd498de4f7ca5cccf49a33a3d679c6ee9645522f117edf6b2e34c567d01a
icx.c
Posted Apr 2, 2002
Authored by Bab Boon

Icecast v1.3.11 and below remote root exploit for linux/x86. Binds a shell to port 30464. Tested against SuSE 7.2, Debian 2.2r2, and Slackware 8.0.

tags | exploit, remote, shell, x86, root
systems | linux, suse, slackware, debian
SHA-256 | 15679ffcee48c2b319d6b32319e3a3603c8e5e5f6e3e6fdca3e63eba9856f9bd
guninski-53.txt
Posted Apr 2, 2002
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #53, 2002 - Two serious security vulnerabilities have been found in Microsoft Office XP. It is possible to embed active content (object + script) in HTML mail which is triggered if the user replies to or forwards mail. In addition, a bug in the Host() function of the spreadsheet allows creating files with arbitrary names and their content may be specified to some extent at which is sufficient to place an executable file (.hta) in user's startup directory which may lead to taking full control over user's computer.

tags | exploit, arbitrary, vulnerability
SHA-256 | 3f49c6b96bb45bdcb1c169996f326348feabd1e79660329b74273529af5b2f1f
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close