Exploit the possiblities
Showing 1 - 25 of 26 RSS Feed

Files

imap4.c
Posted Nov 30, 2002

Redhat 7.0 remote buffer overflow exploit for IMAP4rev1 prior to v10.234.

tags | exploit, remote, overflow
systems | linux, redhat
MD5 | 3dd9c868ec269c63686555a75456a4a3
0208-exploits.tgz
Posted Sep 2, 2002
Authored by Todd J.

Packet Storm new exploits for August, 2002.

tags | exploit
MD5 | 329e36e5423b59526f6dbff6b2de6f0c
smb.c
Posted Aug 31, 2002
Authored by Matt Miller | Site uninformed.org

Denial of service exploit for Core ST's recently discovered Windows SMB vulnerability which works against Windows NT/2k/XP.

tags | exploit, denial of service
systems | windows, nt
MD5 | 55227b050b4c92b696ada37ba58bac50
adv-002-mirc.htm
Posted Aug 30, 2002
Authored by James Martin | Site uuuppz.com

Many scripts installed in mIRC below version 6.03 allow remote compromise if they use the $asctime identifier, which is used to format unix time stamps. Includes proof of concept code which causes mIRC to execute a command line on any supported OS. Most users have not yet upgraded.

tags | exploit, remote, proof of concept
systems | unix
MD5 | 59dd94fbd0009f547687ef2391fae6ac
DSR-apache2.0x.c
Posted Aug 29, 2002
Authored by Bob, dsr | Site dtors.net

This Proof of Concept exploit for the current directory traversal design flaw in apache 2.0.x - 2.0.39 allows any attacker to view any file on the target machine. Original vulnerability found by Luigi Auriemma. Affected Systems: Windows [win32], Netware, OS2, Cygwin.

tags | exploit, proof of concept
systems | windows, 32
MD5 | 2ba457a832be506c17d2c9da5e1d72ab
calderax.txt
Posted Aug 29, 2002
Authored by Pavel Kankovsky

Proof of concept local exploit for the Caldera Linux X11 server. The Xserver calls xkbcomp in an insecure manner while not dropping privileges.

tags | exploit, local, proof of concept
systems | linux
MD5 | 15bc29b478956ad0af8d1972de40145a
asctime-poc
Posted Aug 29, 2002
Authored by James Martin

mIRC, the popular chat client for the IRC has support for a scripting language that has been found to be vulnerable. A buffer overflow exists in the $asctime identifier where an error lies in the handling of oversized format specifier strings.

tags | exploit, overflow
MD5 | fbe9bc40fafa8162c63e4dfa0ea4ca8f
omnihttpd.txt
Posted Aug 29, 2002
Authored by Mark Litchfield | Site ngssoftware.com

OLE controls or OCX controls, are components (or objects) you can insert into a Web page or other application to reuse packaged functionality someone else programmed. An unchecked buffer exists in the ActiveX control used to display specially formatted text. This could be executed by encouraging an unsuspecting user to visit a malicious web page.

tags | exploit, web, activex
MD5 | d92ee78f70532bbebb1aa788ef028804
ubpbbs.txt
Posted Aug 29, 2002
Authored by Goodwin | Site security-ru.net

A flaw in the Ultimate PHP Board (UPB) software allows standard users to create an admin accounts with lower case letters that has standard user privileges but that may cause confusion to other users. Fix included.

tags | exploit, php
MD5 | eb111e58b1527e562386937cfb8827d7
idefense.webmin.txt
Posted Aug 29, 2002
Authored by Noam Rathaus | Site idefense.com

iDEFENSE Security Advisory 08.28.2002 - Webmin v0.92 and below contains remote vulnerabilities which allow any file to be read from or written to as root. Perl exploit code included.

tags | exploit, remote, root, perl, vulnerability
MD5 | a969450dba9e13229675f93214488405
SMBdie.zip
Posted Aug 27, 2002
Authored by Zamolx3

SMBdie is a proof of concept tool which crashes Windows machines with Netbios enabled by sending a specially crafted SMB request. Tested against Windows NT/2k/XP/.NET RC1.

tags | exploit, proof of concept
systems | windows, nt
MD5 | c812c8b9b3e5fe258fa8c56e04dce843
gdam123-expl.c
Posted Aug 27, 2002
Authored by netric, Sacrine | Site netric.org

Local proof of concept exploit for the gdam123 software package. Exploits an unchecked buffer in filename option.

tags | exploit, local, proof of concept
MD5 | 876e85bf6bbd0067196c597ad407f032
holygrail.c
Posted Aug 21, 2002

Holygrail.c is a remote root exploit for telnetd under Solaris Sparc 2.5.1, 2.6, 2.7, and 8. Verified to work against Solaris 7 and 8 sparc - spawns a root shell.

tags | exploit, remote, shell, root
systems | solaris
MD5 | 5b960e84817c776cd85af819db973969
imapdog.pl
Posted Aug 18, 2002
Authored by electronicsouls, -BuRn-X | Site es.xor.ru

IMAP4rev1 remote exploit written for RedHat and Slackware Linux.

tags | exploit, remote
systems | linux, redhat, slackware
MD5 | 9528a6672e2124190c2eb1fc9057a74c
UltimaRatioVegas.c
Posted Aug 18, 2002
Authored by FX | Site phenoelit.de

Phenoelit Ultima Ratio - a Cisco IOS exploitation of a heap overflow and using actual shell code to upload a new config; all in one UDP packet. Exploits an issue in the 11.x IOS TFTP server. Works against Cisco 1600 and 1000 series routers, but is designed as PoC.

tags | exploit, overflow, shell, udp
systems | cisco
MD5 | c89c9794e4f50e92e03e8170a6cdb8ee
MWS_exp.pl
Posted Aug 16, 2002
Authored by D4rkGr3y | Site dhgroup.org

MyWebServer v1.0.2 remote buffer overflow exploit in perl. Included shellcode opens a shell on port 7788.

tags | exploit, remote, overflow, shell, perl, shellcode
MD5 | f4d46ef5f62de7311f2dd514eaad0733
HelpMe2.pl
Posted Aug 13, 2002
Authored by Gary O'Leary-Steele | Site Sec-1.com

Exploit code for Winhlp32.exe remote buffer overflow vulnerability. Calls WinExec SW_HIDE and executes supplied command. Tested against Windows 2000 Professional SP2. Written for Kernel32.dll version 5.0.2195.2778.

tags | exploit, remote, overflow
systems | windows, 2k
MD5 | 3d9b0b9443e634977c358e53e06c4108
HelpMe.pl
Posted Aug 13, 2002
Authored by Gary O'Leary-Steele | Site Sec-1.com

Exploit code for Winhlp32.exe remote buffer overflow vulnerability. Calls WinExec SW_HIDE and executes supplied command. Tested against Windows 2000 Professional SP2. Written for Kernel32.dll version 5.0.2195.4272.

tags | exploit, remote, overflow
systems | windows, 2k
MD5 | 1a8e8b5b527b3d3bf230966975a8248c
sql2kx2.txt
Posted Aug 13, 2002
Authored by sk | Site scan-associates.net

SQL Server 2000 remote buffer overflow exploit. Uses tcp port 1433. More information here.

tags | exploit, remote, overflow, tcp
MD5 | 18cd802f3a0c48f0962e4c3b72f963d3
sql2kx.c
Posted Aug 13, 2002
Authored by sk | Site scan-associates.net

SQL Server 2000 remote buffer overflow exploit. Tested against Win2ksp2. Included shellcode creates the file \scan_sql2k_bo. Fix available here.

tags | exploit, remote, overflow, shellcode
MD5 | 95d98c6c7fc8be9fac23f02dd1c66757
int.exp.txt
Posted Aug 11, 2002
Authored by decker | Site n3t.net

This exploit works against a recent bug found in RedHat's Interchange commerce system that allows for the typical directory traversal attack.

tags | exploit
systems | linux, redhat
MD5 | 66cc43ab5a834c2cf451948d5d9793e7
GOBBLES-own-ipppd.c
Posted Aug 10, 2002
Authored by gobbles, Gobbles Security | Site bugtraq.org

Gobbles exploit for ipppd which is part of the isdn4linux-utils package and is part of the default install of many linux distributions. Under Suse 8.0, ipppd is installed suid root but can only be run by users in the group "dialout". The exploit works on a syslog(3) format string problem: syslog(LOG_NOTICE,devstr). This code is normally only reached with a valid device string but if you feed ipppd a devicename that is >= 256 bytes it will merrily proceed to log this string using the faulty syslog(3) call. Subsequently handing over root access to the machine.

tags | exploit, root
systems | linux, suse
MD5 | 5fcb7f50a51088c23c51cfb1b614c767
shatter.zip
Posted Aug 10, 2002
Authored by Foon | Site security.tombom.co.uk

This exploit was designed as a proof-of-concept application to show how the vulnerable Win32 Messaging System fails to authenticate a source of a message. This particular application was designed to be used against Network Associates VirusScan v4.5.1 running on Win2k Professional. Microsoft VP Jim Allchin stated under oath that there were flaws in Windows so great that they would threaten national security if the Windows source code were to be disclosed. This is the exploitation that was being referenced. Please reference the white paper for more information.

tags | exploit
systems | windows, 2k, 32
MD5 | 0f2133efecd3fafd4890a2e1abc45eca
mozillaftp.txt
Posted Aug 9, 2002
Authored by Eiji Yoshida | Site geocities.co.jp

Mozilla FTP View Cross-Site Scripting Vulnerability - Mozilla allows the running Malicious Scripts due to a bug in 'FTP view' feature. If you click on a malicious link, the script embedded in URL will run. This problem is in 'FTP view' feature. The 'URL' is not escaped. Fixed in Mozilla 1.0.1.

tags | exploit, xss
MD5 | ff56ac2537cdac89d185046aabe286a8
operaftp.txt
Posted Aug 9, 2002
Authored by Eiji Yoshida | Site geocities.co.jp

Opera FTP View Cross-Site Scripting Vulnerability - Opera allows running Malicious Scripts due to a bug in 'FTP view' feature. If you click on a malicious link, the script embedded in URL will run. This problem is in 'FTP view' feature. The 'URL' is not escaped. Vulnerable: Windows2000 SP2 Opera 6.03 and Windows2000 SP2 Opera 6.04

tags | exploit, xss
MD5 | 79fe393d0b0250af170528ac069da3cb
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close