exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files

squidx.c
Posted Jun 21, 2003
Authored by Gunzip

Remote exploit for Squid V2.4.DEVEL4 and below on linux/x86.

tags | exploit, remote, x86
systems | linux
SHA-256 | 4d88b1cac25a2d926015a0a76de60258e2921cc54ee0b1bed4f093b1ee59cf9e
UO-SphereServer_Exploit.zip
Posted Sep 21, 2002
Authored by Tolueno

Windows exploit for the SphereServer Ultima Online Roleplay Server v0.5x for Linux, FreeBSD, and Win32 which runs on tcp port 2593 and contains a denial of service vulnerability.

tags | exploit, denial of service, tcp
systems | linux, windows, freebsd
SHA-256 | a64dae8c58f0d75a11ad1e08404fc73668bcf42f4df4deefbba515c05aae8215
7350wurm.c
Posted Jul 18, 2002
Authored by Lorian | Site team-teso.net

7350wurm is a linux/x86 wu_ftpd remote root exploit for the double free() bug affecting v2.4.2 to 2.6.1. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86, root
systems | linux
SHA-256 | 61e426d8b881456407974cf5ba70fc5699bcc3a5684973685457044f14ce29c5
7350squish.c
Posted Jul 18, 2002
Authored by scut, Lorian | Site team-teso.net

7350squish is a Linux / x86 Squid remote exploit. Tested against Debian Squid_2.3.4-2, squid_2.4.1-1, and squid_2.4.2. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86
systems | linux, debian
SHA-256 | c9d3a3dd4dd2f657e576ad62e4b0332e4678ac9a512951acc8c4fe28403a63ef
7350963.c
Posted Jul 18, 2002
Authored by scut | Site team-teso.net

Solaris /bin/login remote root exploit for SPARC and x86. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86, root
systems | solaris
SHA-256 | 9a7dc0465ec7420e64c78c101c235a1124f003775a78c77e6d511355683dc689
0205-exploits.tgz
Posted Jun 3, 2002
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for May, 2002.

tags | exploit
SHA-256 | 8650725205a461908be4ba21749215d0a22d1bab51a9b3c9b8df1f4bada63029
msh.tar.gz
Posted May 29, 2002
Authored by Luigi Grandini, Skyrim

3CDaemon FTP Server v2.0 buffer overflow dos exploit.

tags | exploit, overflow
SHA-256 | d0bb8165e0bcac7204de3d63e1564b55afe72a5111b6aed167cf88b2697764d8
iis-asp-overflow.tar.gz
Posted May 29, 2002
Authored by Luigi Grandini, Hsj

IIS 5.0 .asp buffer overrun remote exploit which runs cmd.exe. The .asp overflow is documented in ms02-018.

tags | exploit, remote, overflow, asp
SHA-256 | 666b2cf056c8a68d889f9a532157b8522f2cb61c48f94e39001224f4a29e815a
uw-imap.c
Posted May 29, 2002
Authored by Christophe "korty" Bailleux, Kostya Kortchinsky

Imap4 prior to v2001a remote exploit for Linux. Requires user account, includes offsets for Slackware 7.1 and Redhat 7.2.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | e3d4caaea2b25eed9bb16c6915f9acac7dcca8886f577518fc678d5f31d4874a
war-ftpd-bof.pl
Posted May 29, 2002
Authored by Kago

WarFTPd v1.65 for Win2k remote buffer overflow exploit in win32 perl. Included shellcode pops up a message box.

tags | exploit, remote, overflow, perl, shellcode
systems | windows
SHA-256 | 4d51ac1438509a6db6d42e889b5f2204a336e230d13d61319f50f9395026bad2
sendmail-flock-sploit.txt
Posted May 25, 2002
Authored by Zillion | Site safemode.org

Local exploit for the Sendmail 8.12.3 and below flock denial of service vulnerability.

tags | exploit, denial of service, local
SHA-256 | bbaf654cf0fc0e59bbd9e31ec8803d66b440dda134c4511d4ff41af8c42ac323
servletexec-4.1.txt
Posted May 24, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

NewAtlanta ServletExec ISAPI v4.1 contains three vulnerabilities. Remote users can read any file in the webroot, crash the server, and display the physical path of the web root. Patch available here.

tags | exploit, remote, web, root, vulnerability
SHA-256 | fc28cc03d24fa98eb266f32deaf3daa32abc63bfc958831609ba5849b34c2d4a
ie.css.txt
Posted May 20, 2002
Authored by Thor Larholm | Site jscript.dk

IE 6sp1 for Windows 2000 and 98 has bugs in the showModalDialog and showModelessDialog methods of displaying dialog boxes which can be used to execute arbitrary commands. Most unpatched IE and Outook installations are vulnerable. Online demonstration exploit MS02-023, but IE 5.5 and 5.0 are still vulnerable.

tags | exploit, arbitrary
systems | windows
SHA-256 | adc13976e792486d71a781d3724cb4456937c63b31fb36bdbe418a967f248f48
injoin.txt
Posted May 15, 2002
Authored by Cyberiad | Site nmrc.org

NMRC Advisory #21 - The inJoin Directory Server v4.0 for Solaris 2.8 has a vulnerability in the iCon admin interface listening on tcp port 1500 which allows an attacker with the correct username and password to read any file accessible to the ids user. Exploit URLs included. Fix available here.

tags | exploit, tcp
systems | solaris
SHA-256 | 6eede2a2c8e66f0b5f7073fa9ba6f676e7b5fbe09f3603da7f67b73d7fa26a17
wolfmail.cgi.txt
Posted May 13, 2002
Authored by Dead Beat | Site advknowledge.net

WolfMail.cgi, a script that works similarly to formmail.cgi, allows users to send mail via a web interface. The configuration for WolfMail.cgi is not internally hardcoded but is passed via parameters in html input statements allowing any user to send fake mail.

tags | exploit, web, cgi
SHA-256 | 3778400e8f79eb597d173c53cc2b7232adf9d3124bea0458e83e4ede52030d94
cURL-remote-FBSD.pl
Posted May 10, 2002
Authored by Zillion | Site safemode.org

Remote FreeBSD cURL exploit for versions 6.1 - 7.3. More info available here.

tags | exploit, remote
systems | freebsd
SHA-256 | cb3b41070a035495a6c0d2f9b4a6cfc27b235c73e132f73706c9a2910cdd0597
cURL-remote-LNX.pl
Posted May 10, 2002
Authored by Zillion | Site safemode.org

Remote linux cURL exploit for versions 6.1 - 7.3. More info available here.

tags | exploit, remote
systems | linux
SHA-256 | dad91fe61044ca9a5d49c69ade363fac8dad8e28d8281dc3943fb2ce21ed8fb8
fd_openbsd.c
Posted May 10, 2002
Authored by Fozzy | Site dmpfrance.com

Local root exploit for OpenBSD up to 3.1 which takes advantage of the fd race and skeyaudit binary.

tags | exploit, local, root
systems | openbsd
SHA-256 | 942689559f299505c2d3b0892168e2f9e4a4e49b301c8a85a802e0d8e1361e0d
w00w00-AIM-2.txt
Posted May 8, 2002
Authored by w00w00, Matt Conover, John Hennessy | Site w00w00.org

AOL Instant Messenger (AIM) contains a buffer overflow in the code that is responsible for parsing requests to run external applications. The overflow can be used to remotely penetrate a system and it is not possible to block these requests in the AIM client. No client side fix is currently available.

tags | exploit, overflow
SHA-256 | 946194c0c09dedf0c32dd70f3f60b1ba047cf82d56205fa98f75e4a934abf0cb
iis-asp-overflow.c
Posted May 7, 2002
Authored by Hsj

IIS 5.0 .asp buffer overrun remote exploit which runs cmd.exe. The .asp overflow is documented in ms02-018.

tags | exploit, remote, overflow, asp
SHA-256 | 031a9428d1affec8b88f1c6878ae1fe05b1eb6fe28ea7cfafec0ea2297691a87
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close