Exploit the possiblities
Showing 1 - 25 of 25 RSS Feed


Posted Apr 3, 2003

Local root exploit for mtr versions lower than 4.0.6. Vulnerability originally found by KF of Snosoft.

tags | exploit, local, root
MD5 | dcc4e35730a2a0dca69cb23d2fbf53c3
Posted Jul 18, 2002

X2 exploits the SSH CRC-32 attack detection code buffer overflow vulnerability that exists in SSH1 implementations. The exploit is distributed in binary form and has been encrypted. Includes 45 target types. 319 target types are available Fair Use Law 17 U.S.C.A 107

tags | exploit, overflow
MD5 | 5ad26f20c8eeae79c09718165e21621d
Posted Jul 18, 2002
Authored by Lorian

7350fun is a remote exploit for mod_php v4.0.2rc1-v4.0.5 and v4.0.6-v4.0.7RC2. This exploit appears to be a revised version of the 73501867 exploit, which was written by the same author, contained less functionality and was not encrypted. Note: this exploit also causes PHP 4.1.2 versions to segfault. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, php
MD5 | 55dd71bbb7d23d1220f8bb33a4b20edd
Posted Jul 8, 2002
Authored by Zillion, Alex Hernandez | Site safemode.org

Slrnpull '-d' buffer overflow exploit. Executes shellcode with group 'news' privileges. Tested to work on an Intel Red Hat 6.2 installation .

tags | exploit, overflow, shellcode
systems | linux, redhat
MD5 | ddc9cde518d7a4282d6cb3248b448e48
Posted May 7, 2002
Authored by Todd J.

Packet Storm new exploits for April, 2002.

tags | exploit
MD5 | da76776c09caeb80dc346c3147fe4567
Posted May 5, 2002
Authored by DNV | Site mail.dhbit.ca

Cisco 677/678 Telnet Overflow denial of service perl exploit.

tags | exploit, denial of service, overflow, perl
systems | cisco
MD5 | 71acdbfebdc481e031687d06bbb810e7
Posted May 5, 2002
Authored by TrippinSmurfs

AnalogX SimpleServer:WWW HTTP Server v1.1 denial of service buffer overflow exploit.

tags | exploit, web, denial of service, overflow
MD5 | cb8368a36e1c06aa0f994e1dce369789
Posted May 1, 2002
Authored by Marcell Fodor | Site mantra.freeweb.hu

Exploit for the local root bug in Kerberos IV TGT and AFS Token implementation of the OpenSSH server (sshd) version 2.2.0 - 3.1.0.

tags | exploit, local, root
MD5 | 98f1f82d423d16819bc96da528d31ca8
Posted May 1, 2002
Authored by Marcell Fodor | Site mantra.freeweb.hu

Food_for_the_poor is a linux exploit for a heap overflow in the Kerberos 4 ftp client which creates a suid shell in /tmp.

tags | exploit, overflow, shell
systems | linux
MD5 | 02f164a7343a06b6563818a43d6d7357
Posted May 1, 2002
Authored by Skyrim

3CDaemon FTP Server v2.0 buffer overflow dos exploit.

tags | exploit, overflow
MD5 | 2bf501dc4f6312377a58c1130e5beb44
Posted Apr 25, 2002
Authored by Cult

This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions.

tags | exploit
MD5 | d53cc8ba199088d13beffe904c1f9450
Posted Apr 25, 2002
Authored by Nawok

PsyBNC v2.3 has a problem dealing with oversized passwords, making it possible to tie up all the connection slots and consume a lot of CPU on the server.

tags | exploit
MD5 | 72882c16409c851c3e19cdd8edf515a6
Posted Apr 25, 2002
Authored by Filip Maertens | Site filip.compsec.be

Microsoft IIS .HTR heap overflow checker. Determines remotely if patch MS02-018 has been applied.

tags | exploit, overflow
MD5 | 2b2edd24b76ee0b58d5186d14b8d3923
Posted Apr 25, 2002
Authored by Gobbles Security

Screen v3.9.11 local root linux/x86 exploit for braille module bug.

tags | exploit, x86, local, root
systems | linux
MD5 | bf834c1357f2a2f6814bd7bf51ecea1d
Posted Apr 25, 2002
Authored by netric, Atje | Site netric.org

Local root exploit for the "Suid application execution bug" (< FreeBSD 4.5-STABLE) that was discovered by Joost Pol from Pine.

tags | exploit, local, root
systems | freebsd
MD5 | 6e686fc543c6ddbad436bfb0f81fd5be
Posted Apr 25, 2002
Authored by phased

Iosmash.c is an exploit for the stdio kernel bug that resides in all releases of FreeBSD up to and including 4.5-RELEASE. The exploit uses keyinit, which is part of the S/key package, to create 5 valid root passwords that give instant root access trough S/key.

tags | exploit, kernel, root
systems | freebsd
MD5 | 5a17bababe3ea7ff5e73ed68e8bf079d
Posted Apr 23, 2002
Authored by eSDee, netric | Site netric.org

Posadis m5pre1 local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | aba3e4e67681520ccc17f4d5f548bbc0
Posted Apr 23, 2002
Authored by eSDee, netric | Site netric.org

Posadis m5pre2 local format string exploit.

tags | exploit, local
MD5 | 7475676aaa562e43d95925828590fb52
Posted Apr 23, 2002
Authored by Filip Maertens | Site filip.compsec.be

Microsoft IIS W3SVC Denial of Service - Brings down the inetinfo.exe process, crashing IIS.

tags | exploit, denial of service
MD5 | 187ee85dc854e518c0b386d561dd3a33
Posted Apr 15, 2002
Authored by Venglin

OpenBSD 3.0 cron / mail local root exploit. Creates a suid shell after /etc/daily runs.

tags | exploit, shell, local, root
systems | openbsd
MD5 | 72d35ea6ab315d9c96c3184343dee252
Posted Apr 11, 2002
Authored by Marc Maiffret | Site eEye.com

A vulnerability in the ASP (Active Server Pages) ISAPI filter, loaded by default on all NT4 and Windows 2000 server systems (running IIS), can be exploited to remotely execute code of an attackers choice. Example which causes an application error included. Microsoft advisory on this vulnerability here.

tags | exploit, asp
systems | windows, 2k
MD5 | 4cdf305e59b0d7ba7de3156cc1e0c3c2
Posted Apr 3, 2002
Authored by Spybreak

Xtell from the Debian Linux distribution is a network messaging client for sending messages to users on different computers. Xtell 2.6.1 with at least 3 remote buffer overflows, symlink bug, ".." directory traversal, file race condition, and more. Exploit spawns a shell on port 12321. Tested against Red Hat 7.2, 7.1; Debian Potato.

tags | exploit, remote, overflow, shell
systems | linux, redhat, debian
MD5 | 1cafde97c61ae5070ffa7332f1bba3ea
Posted Apr 3, 2002
Authored by Spybreak | Site kaybee.org

LogWatch 2.1.1 is a part of the Red Hat Linux 7.2 distribution, enabled by default and daily run by the cron daemon. On a system running LogWatch, a local user is able to gain unauthorized root access, due to a race condition during the temporary directory creation.

tags | exploit, local, root
systems | linux, redhat
MD5 | 26509d094a11d67a23e651d2e6fd95a6
Posted Apr 2, 2002
Authored by Bab Boon

Icecast v1.3.11 and below remote root exploit for linux/x86. Binds a shell to port 30464. Tested against SuSE 7.2, Debian 2.2r2, and Slackware 8.0.

tags | exploit, remote, shell, x86, root
systems | linux, suse, slackware, debian
MD5 | 30658aa7461384b8a294cfc3db8fab5a
Posted Apr 2, 2002
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #53, 2002 - Two serious security vulnerabilities have been found in Microsoft Office XP. It is possible to embed active content (object + script) in HTML mail which is triggered if the user replies to or forwards mail. In addition, a bug in the Host() function of the spreadsheet allows creating files with arbitrary names and their content may be specified to some extent at which is sufficient to place an executable file (.hta) in user's startup directory which may lead to taking full control over user's computer.

tags | exploit, arbitrary, vulnerability
MD5 | 2fbb5a730b6516363c61c5ba49238bcb
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By