Exploit the possiblities
Showing 1 - 17 of 17 RSS Feed


Posted Jul 14, 2003
Authored by Todd J.

Packet Storm new exploits for January, 2003.

tags | exploit
MD5 | 12d6eca11008594b11e9a4a31a5a046e
Posted May 31, 2003

Cups v1.1.17 and below remote exploit which spawns a shell as lp. Modified version of the original sigcups.c exploit.

tags | exploit, remote, shell
MD5 | bfc5956950b52e54932b47d057edd76f
Posted Jan 27, 2003
Authored by Wojciech Purczynski | Site isec.pl

The at utility in Solaris has name handling and race condition vulnerabilities. Using the -r switch to remove a job allows an attacker to remove any file on the filesystem as root. Although at filters out absolute paths, a simple ../ directory traversal maneuver allows an attacker to remove files out of the allowed boundary.

tags | exploit, root, vulnerability
systems | solaris
MD5 | ade275e5de208f97a322a2f79d94f71c
Posted Jan 27, 2003
Authored by Dennis Rand | Site infowarfare.dk

PlatinumFTPserver, the server engine that runs as an application on Windows 9x and a service under NT/2K/XP, has a directory traversal vulnerability that allows remote attackers to enter directories that reside outside the bounding FTP root directory. Another vulnerability exists which allows an attacker to commit a DoS against the server. Version affected: 1.0.7. Version Unaffected: 1.0.8.

tags | exploit, remote, root
systems | windows, 9x
MD5 | a833b7d7a2a1d81359c6be96784cd9db
Posted Jan 27, 2003
Authored by Ulf Harnhammar | Site hypermail.org

Hypermail 2, a popular tool that converts mails into html, has two buffer overflows. One exists in the hypermail program itself and another is in the CGI program mail. The overflow in the main program can be overflowed by sending an email while the CGI program can be overflowed by a DNS server being populated with faulty information. Versions affected: 2.1.3, 2.1.4, 2.1.5, possibly others. 2.1.6 is not affected.

tags | exploit, overflow, cgi
MD5 | d197f6b39b31e4f89f67d75abd1b2706
Posted Jan 25, 2003
Authored by eSDee | Site netric.org

ISC dhcpd v3.0.1rc8 and below remote root format string exploit. Tested against Debian 3.0, Mandrake 8.1, Red Hat 7.2, 7.3, and 8.0, and SuSE 7.3. Includes the option to check for vulnerability on any platform by crashing the service.

tags | exploit, remote, root
systems | linux, redhat, suse, debian, mandrake
MD5 | 1da87ccba0bbd62b90b532655ce17f50
Posted Jan 20, 2003
Authored by Ledin | Site encephalon-zero.com

Middle2.c allows you to recover SMB password in clear text (from the network) when they should be encrypted. It operates a man in the middle attack with complete traffic redirection which does not need forwarding with transparent proxy. Tested under linux Debian 3.0.

tags | exploit
systems | linux, debian
MD5 | 72b94090bdeab6247eab00da6d230bed
Posted Jan 17, 2003
Authored by ^sq/w00nf | Site w00nf.org

Stunnel v3.15 - 3.21 remote format string exploit. Tested against Red Hat 7.2, 7.3, 8.0, Slackware 8.1, Debian GNU 3.0, and Mandrake 9.0. More information on the bug available here.

tags | exploit, remote
systems | linux, redhat, slackware, debian, mandrake
advisories | CVE-2002-0002
MD5 | 036f5e357caf9ea94e601b435e2e825d
Posted Jan 12, 2003
Authored by Gunzip@ircnet

PHP 3.0.16 and below remote format string exploit for Linux/x86. Gives a uid=nobody shell. File logging must be enabled for this exploit to work. Includes offset brute forcing and instructions for finding offsets.

tags | exploit, remote, shell, x86, php
systems | linux
MD5 | 8af5a42ddce32cd2f679e37bdf031475
Posted Jan 9, 2003
Authored by You Dong-hun | Site x82.i21c.net

Tanne v0.6.17 remote root format string exploit for Linux/x86 which has been tested against Redhat 6.1, 7.0, and 8.0. Tanne is a secure http session management tool sometimes used in online banking.

tags | exploit, remote, web, x86, root
systems | linux, redhat
MD5 | e24f9a3ee77041901841ec35bca67165
Posted Jan 9, 2003
Authored by Franky

S8forum GPG remote exploit in java which emulates a shell with the privileges of the web server.

tags | exploit, java, remote, web, shell
MD5 | bece5e7a608cfb12be2df0a1b34ec757
Posted Jan 5, 2003
Authored by Hi_Tech_Asslemon

Efstrip is an exploit for the efstool vulnerability. Unlike other exploits for this vulnerability, Efstrip is robust, doesn't need a wide range of attack options, and doesn't need brute forcing. It actually ./works.

tags | exploit
MD5 | 98075b5b8ff7957d017481f1985b1428
Posted Jan 5, 2003
Authored by Nasser.M.Sh

The S8forum v3.0 allows remote users to execute commands on the webserver. Includes exploit instructions and patch included.

tags | exploit, remote
MD5 | fb79079160eb35543d7b60bb52b21463
Posted Jan 4, 2003
Authored by Sigdom

Cups v1.1.17 and below remote exploit which spawns a shell as lp. Tested against Gentoo Linux with cups-1.1.17_pre20021025 installed.

tags | exploit, remote, shell
systems | linux, gentoo
MD5 | 6bd7f9189ad7341bed17442f15738257
Posted Jan 4, 2003
Authored by dreyer

Mysqlsuite includes three tools which take advantage of the vulnerability in check_scramble() function of mysql described in mysql.4.0.5a.txt. Mysqlhack allows remote command execution with a valid mysql user and pass. Mysqlgetusers allows you do a dictionary login-only attack to find other users. Mysqlexploit spawns a shell on port 10000 on vulnerable linux mysql servers with a valid mysql login and pass and writable database. Fixed in Mysql v3.23.54.

tags | exploit, remote, shell
systems | linux
MD5 | e6b7d33cae59e81b420ced9b17400378
Posted Jan 4, 2003
Authored by Knight420

Smart Search CGI remote exploit in perl which attempts to spawn netcat listening with a shell.

tags | exploit, remote, shell, cgi, perl
MD5 | 31fb8b6bf42663316758975253dff0b0
Posted Jan 4, 2003
Authored by Chown, Iplogd

Crashms exploits the microsoft-ds bug and crashes windows machines via tcp port 445. Sends many 10k blocks of NULLs, causing blue screens on unpatched Windows 2000 boxes with microsoft-ds running on port 445.

tags | exploit, tcp
systems | windows, 2k
MD5 | ace3a302efcccc811cf5470e45732221
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
What Ends With X And Won't Sue Security Researchers?
Posted Mar 22, 2018

tags | headline, hacker
Old Banking Trojan TrickBot Has Been Taught New Tricks
Posted Mar 22, 2018

tags | headline, malware, bank, trojan, cybercrime, fraud
Surgeon Thinks Hack Led To Syrian Air Strike
Posted Mar 22, 2018

tags | headline, hacker, cyberwar, syria
The NSA Tried Tracking Bitcoin Users In 2013
Posted Mar 22, 2018

tags | headline, government, privacy, usa, nsa, cryptography
IoT Security Spending To Reach $1.5 Billion In 2018
Posted Mar 21, 2018

tags | headline
"Tamper-Proof" Currency Wallet Backdoored By 15 Year Old
Posted Mar 21, 2018

tags | headline, flaw, backdoor, cryptography
The Motherboard Guide To Using Facebook Securely
Posted Mar 21, 2018

tags | headline, privacy, facebook, social
What A Bad Trip - Orbitz Loses Credit Card Data In Hack
Posted Mar 21, 2018

tags | headline, privacy, bank, cybercrime, data loss, fraud
AMD Promises Firmware Fixes For Security Processor Bugs
Posted Mar 21, 2018

tags | headline, flaw
FBI Raids Home Of Spy Sat Techie Over Leak Of Secret Comms Source Code On Facebook
Posted Mar 21, 2018

tags | headline, government, usa, data loss, spyware, fbi
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By