exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 31 RSS Feed

Files

linx86_bind.c
Posted Nov 17, 2002
Site lsd-pl.net

Bind 8.2 8.2.1 8.2.2 8.2.2-PX remote root exploit for Slackware 4.0 and Redhat 6.2. Exploits the infoleak bug to generate a DNS tsig exploit packet. The uses an assembly routine to bypass tightly configured firewall systems (with only 53 tcp/udp port open).

tags | exploit, remote, root, udp, tcp
systems | linux, redhat, slackware
SHA-256 | 07e26538f419d09ee9e0fc5519733ba25fb27bc9ccf20586e861c82bcc2d9146
sendmail.8.11.x.c
Posted Oct 3, 2002
Authored by sd

Sendmail 8.11.5 and below local root exploit. Tested against Red Hat 7.0 and 7.1, SuSE 7.2, and Slackware 8.0.

tags | exploit, local, root
systems | linux, redhat, suse, slackware
SHA-256 | 91760643cbea23f0d407bfbe6adb92fff440f2e21775e64c29e8d836351f91b9
solx86_bind.c
Posted Oct 3, 2002
Authored by The Last Stage of Delerium | Site lsd-pl.net

Bind v8.2, 8.2.1, 8.2.2, and 8.2.2-PX remote root exploit for Solaris 2.7 x86.

tags | exploit, remote, x86, root
systems | solaris
SHA-256 | ae23adfe8e413cf29b90daaa2aa3fa68779d3affba2a40e82e14dc7e57560754
bp_artsd.c
Posted Aug 1, 2002
Authored by Kokane

KDE 2/3 artsd 1.0.0 local root exploit proof of concept. Artsd is not suid - exploit written for practice.

tags | exploit, local, root, proof of concept
SHA-256 | 63ef555eeac80b7d7bbeafa9a3ab3f506a639c7134188c6267fce0f2f4d197db
0207-exploits.tgz
Posted Aug 1, 2002
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for July, 2002.

tags | exploit
SHA-256 | d8eec74c4a639b0dfe04e9dca80d7c5f56c303ee564a8c41a2c7e6be00a63c10
opensslrv.txt
Posted Jul 31, 2002
Authored by Haxors Lab, Bastard Slacker

OpenSSL v0.9.6d and below remote exploit. In Spanish and HTML.

tags | exploit, remote
SHA-256 | c34b8fba056f5bcd3a787b5a7169313629bd6aefd0786a4f6dd8dcd59e681114
xploit.phps
Posted Jul 31, 2002
Authored by dodo | Site darkshells.ath.cx

PHP exploit lab v1.0 - Attempts to browse, read, execute, and mysqlread.

tags | exploit, php
SHA-256 | 1246fe064866a0ec61ae145cf847039bbc1ff2f2a60977d2c4104bfae6cf3569
su.c
Posted Jul 30, 2002
Authored by phased | Site snosoft.com

/bin/su tru64 local root exploit. Works even with non-exec stack enabled.

tags | exploit, local, root
SHA-256 | 7191ae0c7ab446286470772096239fc512f0f6319ed88e297d994f5cdcdd45ea
eat_gopher.pl
Posted Jul 30, 2002
Authored by JW Oh | Site monkey.org

IE gopher buffer overflow exploit. Tested on W2k Korean and Wme Korean.

tags | exploit, overflow
SHA-256 | 85e52c61271025804b7c1b580740ed4678d9ae456002868ea97d71c273e26b37
imailexp.c
Posted Jul 30, 2002
Authored by 2c79cbe14ac7d0b8472d3f129fa1df55

IPSwitch IMail Server v7.11 remote system exploit. Overflows the GET parameter in the Web Messaging daemon in all IMail versions to date. There are over 49 million users of IMail worldwide. Patch available here.

tags | exploit, remote, web, overflow
SHA-256 | 35c821776d9bb0af1fc4b049f211ca07fb58ac7eecd2c428058fac0629803de5
DSR-php4.2x.c
Posted Jul 27, 2002
Authored by Bob, dsr

PHP v4.2.0 and 4.2.1 with Apache 1.3.26 POST bug proof of concept exploit for x86. Produces a segmentation violation (signal 11).

tags | exploit, x86, php, proof of concept
SHA-256 | e1e66701c77072a167c7aa5778b3d30cc69da1019bee73ce24e76872d8212be9
codeblue.txt
Posted Jul 24, 2002
Authored by Demi Sex God from Hell

Code Blue remote exploit for OpenBSD. Code blue is a code red scanner with several vulnerabilities.

tags | exploit, remote, vulnerability
systems | openbsd
SHA-256 | cff16d5936946288cd9899071ceab6d62a74a4b57a019d0ed58b1845d5195c7d
mmaxexp.c
Posted Jul 24, 2002
Authored by 2c79cbe14ac7d0b8472d3f129fa1df55

MailMax Standard/Professional popmax v4.8.2.5 and below remote exploit. Sends a long USER string to the pop3 daemon. Tested against Windows 2000 Professional/Server and Windows XP Professional. Patch available here.

tags | exploit, remote
systems | windows
SHA-256 | 6463001871555a4dde5d4631306b9a8eea057ffea8d2462e5fd5a2f22fe762f5
tracerouteexp.tgz
Posted Jul 24, 2002
Authored by SpaceWalker | Site minithins.net

Nanog traceroute format string local root exploit.

tags | exploit, local, root
SHA-256 | 5fec0e1d8861a9656e800d1b688a2f580c667ee63c38b1e84d84cffb102fe6ab
gpm-ex.pl
Posted Jul 24, 2002
Authored by Killah

Gpm v1.19.6 and below local format string exploit in perl. Note that GPM is not suid. Tested on gpm-Linux 1.19.2.

tags | exploit, local, perl
systems | linux
SHA-256 | 1bfffab9cf16fd0d2d417966737317ebe681c08d8af6f04757392603ec7972fe
mercrexp.c
Posted Jul 18, 2002
Authored by 2c79cbe14ac7d0b8472d3f129fa1df55

Mercur mail server v4.2 remote exploit. The Mercur mail server's control service listens to tcp port 32000 and is vulnerable to a buffer overflow in the password field. Tested against Windows 2000 and XP pro. Sends a shell to port 3333.

tags | exploit, remote, overflow, shell, tcp
systems | windows
SHA-256 | 5d47b93de6b6b5e44524436f14aa61eeae568221c556a2a9290570d4db621bef
nn-expl.pl
Posted Jul 12, 2002
Authored by Zillion | Site safemode.org

Remote format string exploit for the nn news reader v6.6.4 and below. The vulnerability resides in the code that handles NNTP server responses.

tags | exploit, remote
SHA-256 | bd02d3ca74768f8d26a7e158028072e79242e1adb157d1507c85bafb371c854e
snmpXauto.c
Posted Jul 11, 2002
Authored by tracewar

SnmpXdmid auto rooter based on snmpXdmid exploit from http://lsd-pl.net.

tags | exploit, web
SHA-256 | 94ebe956f7f5a101e3099ef94b7ebd458085d3ce2490d32e37966d74a51c61e6
0x4553artsd.c
Posted Jul 10, 2002
Authored by electronicsouls, Burn-X, 0x90 | Site es.xor.ru

Local buffer overflow exploit for KDE's artsd v2.x and 3.x.

tags | exploit, overflow, local
SHA-256 | c4ee9b2be56eb009a8530167e522b3e52eb220e1569d1a0b77a0f7358526114c
apache-chunk.c
Posted Jul 8, 2002
Authored by Bob, dsr | Site dtors.net

Apache remote DoS (1.3.x/2.0.x branches) based on the recent flaw met in chunked encoding.

tags | exploit, remote
SHA-256 | cec28b70971878ff54768796e2494d2f8f48cedd275ac84b1261c0bfa5ecdbd3
kcms_sparc.c
Posted Jul 8, 2002
Authored by Adam Slattery

Kcms_configure -o -S command line local root buffer overflow for SPARC/solaris 8. More information available here.

tags | exploit, overflow, local, root
systems | solaris
SHA-256 | 78bc78b679916c2da141474802dd02ab271715c5e4e3edc5e7bc694f77031ccc
kf-1.2.txt
Posted Jul 8, 2002
Authored by Arnaud Jacques | Site securiteinfo.com

The KF Web Server v1.0.2 shows file and directory content if %00 is appended to the URL. Patch available here.

tags | exploit, web
SHA-256 | 57f627a9f7b88cd3cc183123645d6f6df32860f6e50530dad88c452563699256
ieen030.zip
Posted Jul 8, 2002
Authored by Soap | Site securityfriday.com

IE'en remotely controls Internet Explorer using DCOM. Windows username and password required. This tool can capture data sent and received using Internet Explorer and more.

tags | exploit
systems | windows
SHA-256 | 9ef911b4b08a0221e78596c8ed1e45ef18ad4ebfd6e83362e9bc571939b71cad
2fax.c
Posted Jul 8, 2002
Authored by crazy_einstein@yahoo.com | Site lbyte.void.ru

2fax -bpcx option local exploit for Linux.

tags | exploit, local
systems | linux
SHA-256 | ebae72f5d4e6a1ffe3acb022e81f8c0f51e05a3a4c47eaa2b903e3d2c92066ef
safemode-adv-nn.txt
Posted Jul 6, 2002
Authored by Zillion | Site safemode.org

NN v6.6.3 and below remote format string exploit for FreeBSD. Malicious server owners can use this vulnerability to execute code on systems that are connected with affected clients. Fix available here.

tags | exploit, remote
systems | freebsd
SHA-256 | 196d39f26cc27f3b7ab41de171afbed92adacc402a4519d9444770b26a2bf244
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close