Exploit the possiblities
Showing 1 - 25 of 35 RSS Feed

Files

bind_optdos.c
Posted May 31, 2003
Authored by Spybreak

Remote exploit that makes use of the BIND OPT vulnerability to create a denial of service attack.

tags | exploit, remote, denial of service
MD5 | b077d9697cf1a490bde07c32534be7b4
artyfarty.c
Posted Dec 24, 2002
Authored by Knight420

artyfarty.c is a local root /opt/kde/bin/artswrapper exploit tested against Slakware 8.1. Artswrapper is setuid on some distributions.

tags | exploit, local, root
MD5 | 5d4fe9514d8fcdb1df0501a379536b86
0211-exploits.tgz
Posted Dec 5, 2002
Authored by Todd J.

Packet Storm new exploits for November, 2002.

tags | exploit
MD5 | 983f14ce602bbef6a9a8f47f2f99a103
hlfsd-xp.c
Posted Dec 3, 2002
Authored by Rooterx

Hlfsd local exploit tested on FreeBSD 4.6-STABLE and 4.7-RELEASE. Hlfsd is not SUID by default.

tags | exploit, local
systems | freebsd
MD5 | 9785bb5cee9d785c0e97d286f37f68f6
0x82wsmp3.c
Posted Nov 30, 2002
Authored by Xpl017Elz | Site x82.i21c.net

WSMP3 Remote root exploit for Linux which spawns a shell on tcp port 36864.

tags | exploit, remote, shell, root, tcp
systems | linux
MD5 | d511e3b41688c8eb1d3e2e07d7e128d4
ex_pfinger.c
Posted Nov 30, 2002
Authored by Dvdman

Pfinger v0.7.8 and below local root exploit. Tested on Red Hat 7.2 - 8.0, Debian 3.0, Slackware 8.0, FreeBSD-4.6 and OpenBSD-3.1.

tags | exploit, local, root
systems | linux, redhat, freebsd, slackware, openbsd, debian
MD5 | b0bba19c112e81b8775fde89fcc0dc1a
traceroute-exploit.c
Posted Nov 30, 2002
Authored by Carl Livitt

Nanog traceroute v6.0 to 6.1.1 local root stack overflow exploit. Tested on SuSE 7.1, 7.2, 7.3 & 8.0, and should work on 7.0 and 6.x.

tags | exploit, overflow, local, root
systems | linux, suse
MD5 | fd1b29e427bd7740cdb7f11217170d38
hudo.c
Posted Nov 27, 2002
Authored by Michel Kaempf

Linux exploit for versions of sudo 1.6.3p7 and below. Takes advantage of the Sudo prompt overflow in v1.5.7 to 1.6.5p2. Detailed exploitation instructions included.

tags | exploit, overflow
systems | linux
MD5 | 42847df931b3d90cce4fe4c5bac5f3ce
SF-talkischeap.pl
Posted Nov 25, 2002
Authored by subversive | Site securityfreaks.com

Calisto Internet Talker Version 0.04 Remote Denial of Service exploit.

tags | exploit, remote, denial of service
MD5 | 09acae77211b07f74c3142a55a4e2fac
zerooexploit.txt
Posted Nov 24, 2002
Authored by Matthew Murphy

Zeroo HTTPd server remote command execution exploit. Based on advisory by InetCop.

tags | exploit, remote
MD5 | 85ea5cabd6e20390b1eb75c32ad83e69
d7-mdaemonx.c
Posted Nov 19, 2002
Authored by Smurf, Phrail, Elu1d | Site division7.us

Mdaemon v6.0.7 and below remote denial of service exploit which takes advantage of the UIDL bug. Exploit code tested to run on Redhat8 and FreeBSD 4.7-STABLE. Requires POP3 account on vulnerable daemon.

tags | exploit, remote, denial of service
systems | freebsd
MD5 | 826436855e62f7b3eb25b44c814679dd
sql2.exe
Posted Nov 19, 2002
Authored by David Litchfield, Lion

MSSQL Server 2000 SP0 - SP2 remote exploit which uses UDP to overflow a buffer and send a shell to tcp port 53. Windows binary, C++ source code here.

tags | exploit, remote, overflow, shell, udp, tcp
systems | windows
MD5 | 0c44bf698947b98ba405d11f6ce7a339
sql2.cpp
Posted Nov 19, 2002
Authored by David Litchfield, Lion

MSSQL Server 2000 SP0 - SP2 remote exploit which uses UDP to overflow a buffer and send a shell to tcp port 53.

tags | exploit, remote, overflow, shell, udp, tcp
MD5 | 84ce83fb7a4607df03a928124093ee3a
grpck-expl.pl
Posted Nov 19, 2002
Authored by Black Rose | Site uhagr.org

/usr/sbin/grpck proof of concept local exploit. Not setuid by default. Tested on SuSE, Red Hat, Debian, and Mandrake.

tags | exploit, local, proof of concept
systems | linux, redhat, suse, debian, mandrake
MD5 | 4d8850d74917747f5a571735c247166b
ora-isqlplus.txt
Posted Nov 19, 2002
Authored by David Litchfield | Site ngssoftware.com

The Oracle iSQL*Plus 91 R1 and R2 web based application has an authentication buffer overflow on all OS's in the User ID parameter which allows remote attackers to execute arbitrary code as the oracle user on Unix and SYSTEM on Windows. Patch available here.

tags | exploit, remote, web, overflow, arbitrary, sql injection
systems | windows, unix
MD5 | 327019a2b3830dce9355dbcfa12783ea
tftpd32.traverse.pl
Posted Nov 19, 2002
Authored by Aviram Jenik | Site SecuriTeam.com

Tftpd TFTP server v2.50.2 and below remote exploit which allows any file on the system to be viewed and written to arbitrary locations. Fix available here.

tags | exploit, remote, arbitrary
MD5 | 18d1597e67623da2b320a5e61658f4b9
tftpd32.pl
Posted Nov 19, 2002
Authored by Aviram Jenik | Site SecuriTeam.com

Tftpd TFTP server v2.21 and below remote command execution exploit in perl. Fix available here.

tags | exploit, remote, perl
MD5 | bfdcaf6fee00de1a6085cff776e6672d
iplanet-ngxss.sh
Posted Nov 19, 2002
Authored by FJ Serna | Site ngsec.com

iPlanet Remote root exploit tested on v4.x up to SP11. Advisory for this bug here.

tags | exploit, remote, root, xss
MD5 | bfe033f7f720ac34128ceaca8fea4652
ex_cifslogin.c
Posted Nov 17, 2002
Authored by Watercloud

Local root exploit for cifslogin on HP-UX 11.11 and below.

tags | exploit, local, root
systems | hpux
MD5 | a5c4c35b2cef9d42a894f614dadc63f7
SavantSlap.zip
Posted Nov 17, 2002
Authored by Tolueno

Windows with Delphi interface denial of service exploit for Savant HTTP Server 3.0 and below. This exploit utilizes four methods, all from old known vulnerabilities, to crash the daemon.

tags | exploit, web, denial of service, vulnerability
systems | windows
MD5 | 643974eee11381fa51bda2e554138e47
liteserve.txt
Posted Nov 17, 2002
Authored by Matthew Murphy

A vulnerability in the LiteServe combination server for Win32 exists in that the handling of filenames on Win32 platforms may reveal the code of a desired CGI script to an attacker. Windows handles file names with the period character (0x2E) on the end as if the character had been removed. LiteServe fails to compensate for this behavior, and is vulnerable to a simple CGI disclosure attack.

tags | exploit, cgi
systems | windows, 32
MD5 | b7fabdfdb7bb9206e4b61e9d0855447e
XSS-Cookie-Advisory.txt
Posted Nov 17, 2002
Authored by NightHawk

Cross Site Scripting vulnerabilities exist in the e-mail web services of hotmail.com, yahoo.com, and excite.com. These problems allow for cookie capturing of unsuspecting victims who may easily give up their cookies via clicking on a link in an e-mail or elsewhere and with the link actually pointing to the legitimate site.

tags | exploit, web, vulnerability, xss
MD5 | 6c8859dbe61b1953b195e03088b63841
sorsync.c
Posted Nov 17, 2002
Authored by Sorbo

Remote exploit for rsync version 2.5.1 and below run on Linux. This exploit makes use of a simple frame pointer overflow.

tags | exploit, remote, overflow
systems | linux
MD5 | 8338e72e4ebeaded8b24ff73a92fee78
exploitipppd.c
Posted Nov 17, 2002

Another exploit for ipppd, the daemon that is part of the isdn4linux-utils package and is part of the default install for many linux distributions. Tested on SuSE 7.3 and should work on SuSE 8.0. Anonymously submitted.

tags | exploit
systems | linux, suse
MD5 | 27f0912fe4731939f9c6c5d741f2eaa1
zeroobug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-004 - Various buffer overflow vulnerabilities exist in Zeroo HTTP Server v1.5. Remote linux exploit included to gain root privileges.

tags | exploit, remote, web, overflow, root, vulnerability
systems | linux
MD5 | a842ba1e9a7b5841befe87a3c82fda22
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close