Twenty Year Anniversary
Showing 1 - 17 of 17 RSS Feed

Files

0301-exploits.tgz
Posted Jul 14, 2003
Authored by Todd J.

Packet Storm new exploits for January, 2003.

tags | exploit
MD5 | 12d6eca11008594b11e9a4a31a5a046e
mod_sigcups.c
Posted May 31, 2003

Cups v1.1.17 and below remote exploit which spawns a shell as lp. Modified version of the original sigcups.c exploit.

tags | exploit, remote, shell
MD5 | bfc5956950b52e54932b47d057edd76f
isec-0008-sun-at.txt
Posted Jan 27, 2003
Authored by Wojciech Purczynski | Site isec.pl

The at utility in Solaris has name handling and race condition vulnerabilities. Using the -r switch to remove a job allows an attacker to remove any file on the filesystem as root. Although at filters out absolute paths, a simple ../ directory traversal maneuver allows an attacker to remove files out of the allowed boundary.

tags | exploit, root, vulnerability
systems | solaris
MD5 | ade275e5de208f97a322a2f79d94f71c
PlatinumFTP.txt
Posted Jan 27, 2003
Authored by Dennis Rand | Site infowarfare.dk

PlatinumFTPserver, the server engine that runs as an application on Windows 9x and a service under NT/2K/XP, has a directory traversal vulnerability that allows remote attackers to enter directories that reside outside the bounding FTP root directory. Another vulnerability exists which allows an attacker to commit a DoS against the server. Version affected: 1.0.7. Version Unaffected: 1.0.8.

tags | exploit, remote, root
systems | windows, 9x
MD5 | a833b7d7a2a1d81359c6be96784cd9db
hypermail.tgz
Posted Jan 27, 2003
Authored by Ulf Harnhammar | Site hypermail.org

Hypermail 2, a popular tool that converts mails into html, has two buffer overflows. One exists in the hypermail program itself and another is in the CGI program mail. The overflow in the main program can be overflowed by sending an email while the CGI program can be overflowed by a DNS server being populated with faulty information. Versions affected: 2.1.3, 2.1.4, 2.1.5, possibly others. 2.1.6 is not affected.

tags | exploit, overflow, cgi
MD5 | d197f6b39b31e4f89f67d75abd1b2706
dhcp-expl.c
Posted Jan 25, 2003
Authored by eSDee | Site netric.org

ISC dhcpd v3.0.1rc8 and below remote root format string exploit. Tested against Debian 3.0, Mandrake 8.1, Red Hat 7.2, 7.3, and 8.0, and SuSE 7.3. Includes the option to check for vulnerability on any platform by crashing the service.

tags | exploit, remote, root
systems | linux, redhat, suse, debian, mandrake
MD5 | 1da87ccba0bbd62b90b532655ce17f50
middle2.c.gz
Posted Jan 20, 2003
Authored by Ledin | Site encephalon-zero.com

Middle2.c allows you to recover SMB password in clear text (from the network) when they should be encrypted. It operates a man in the middle attack with complete traffic redirection which does not need forwarding with transparent proxy. Tested under linux Debian 3.0.

tags | exploit
systems | linux, debian
MD5 | 72b94090bdeab6247eab00da6d230bed
w00nf-stunnel.c
Posted Jan 17, 2003
Authored by ^sq/w00nf | Site w00nf.org

Stunnel v3.15 - 3.21 remote format string exploit. Tested against Red Hat 7.2, 7.3, 8.0, Slackware 8.1, Debian GNU 3.0, and Mandrake 9.0. More information on the bug available here.

tags | exploit, remote
systems | linux, redhat, slackware, debian, mandrake
advisories | CVE-2002-0002
MD5 | 036f5e357caf9ea94e601b435e2e825d
GUNphp.tar.gz
Posted Jan 12, 2003
Authored by Gunzip@ircnet

PHP 3.0.16 and below remote format string exploit for Linux/x86. Gives a uid=nobody shell. File logging must be enabled for this exploit to work. Includes offset brute forcing and instructions for finding offsets.

tags | exploit, remote, shell, x86, php
systems | linux
MD5 | 8af5a42ddce32cd2f679e37bdf031475
0x82-Remote.tannehehe.xpl.c
Posted Jan 9, 2003
Authored by You Dong-hun | Site x82.i21c.net

Tanne v0.6.17 remote root format string exploit for Linux/x86 which has been tested against Redhat 6.1, 7.0, and 8.0. Tanne is a secure http session management tool sometimes used in online banking.

tags | exploit, remote, web, x86, root
systems | linux, redhat
MD5 | e24f9a3ee77041901841ec35bca67165
s8Exploit.java
Posted Jan 9, 2003
Authored by Franky

S8forum GPG remote exploit in java which emulates a shell with the privileges of the web server.

tags | exploit, java, remote, web, shell
MD5 | bece5e7a608cfb12be2df0a1b34ec757
efstrip.c
Posted Jan 5, 2003
Authored by Hi_Tech_Asslemon

Efstrip is an exploit for the efstool vulnerability. Unlike other exploits for this vulnerability, Efstrip is robust, doesn't need a wide range of attack options, and doesn't need brute forcing. It actually ./works.

tags | exploit
MD5 | 98075b5b8ff7957d017481f1985b1428
s8forum.txt
Posted Jan 5, 2003
Authored by Nasser.M.Sh

The S8forum v3.0 allows remote users to execute commands on the webserver. Includes exploit instructions and patch included.

tags | exploit, remote
MD5 | fb79079160eb35543d7b60bb52b21463
sigcups.c
Posted Jan 4, 2003
Authored by Sigdom

Cups v1.1.17 and below remote exploit which spawns a shell as lp. Tested against Gentoo Linux with cups-1.1.17_pre20021025 installed.

tags | exploit, remote, shell
systems | linux, gentoo
MD5 | 6bd7f9189ad7341bed17442f15738257
mysqlsuite.tgz
Posted Jan 4, 2003
Authored by dreyer

Mysqlsuite includes three tools which take advantage of the vulnerability in check_scramble() function of mysql described in mysql.4.0.5a.txt. Mysqlhack allows remote command execution with a valid mysql user and pass. Mysqlgetusers allows you do a dictionary login-only attack to find other users. Mysqlexploit spawns a shell on port 10000 on vulnerable linux mysql servers with a valid mysql login and pass and writable database. Fixed in Mysql v3.23.54.

tags | exploit, remote, shell
systems | linux
MD5 | e6b7d33cae59e81b420ced9b17400378
smartass.pl
Posted Jan 4, 2003
Authored by Knight420

Smart Search CGI remote exploit in perl which attempts to spawn netcat listening with a shell.

tags | exploit, remote, shell, cgi, perl
MD5 | 31fb8b6bf42663316758975253dff0b0
crashMs-ds.rc2.tar.gz
Posted Jan 4, 2003
Authored by Chown, Iplogd

Crashms exploits the microsoft-ds bug and crashes windows machines via tcp port 445. Sends many 10k blocks of NULLs, causing blue screens on unpatched Windows 2000 boxes with microsoft-ds running on port 445.

tags | exploit, tcp
systems | windows, 2k
MD5 | ace3a302efcccc811cf5470e45732221
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
The SIM Hijackers
Posted Jul 19, 2018

tags | headline, hacker, phone, fraud, password
Thousands Of US Voters' Data Exposed By Robocall Firm
Posted Jul 19, 2018

tags | headline, hacker, government, privacy, usa, data loss
Password Stealing Spying Malware Targets Ukrainian Government
Posted Jul 19, 2018

tags | headline, government, malware, cyberwar, spyware
PayPal's Venmo Found Leaking Transaction Details
Posted Jul 19, 2018

tags | headline, privacy, bank, data loss, flaw, paypal
007 Code Helps Stop Spectre Exploits Before They Exist
Posted Jul 17, 2018

tags | headline, flaw, patch, intel
Trump Wants To Work With Russia On Infosec. Security Experts: Lol No.
Posted Jul 17, 2018

tags | headline, hacker, government, usa, russia, fraud, cyberwar, spyware
Thousands Of Mega Logins Dumped Online, Exposing User Files
Posted Jul 17, 2018

tags | headline, privacy, data loss, password
Early Warning System Hunts Election Hackers
Posted Jul 17, 2018

tags | headline, hacker, government, usa, russia, fraud, cyberwar
After Indictment, Russian Hackers' Lives Changed Forever, Ex-Ambassador Says
Posted Jul 16, 2018

tags | headline, hacker, government, usa, russia, fraud, cyberwar, spyware
Can Graphical Passwords Keep Us Secure Online?
Posted Jul 16, 2018

tags | headline, data loss, password
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close