what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 47 of 47 RSS Feed

Files

dbabble.txt
Posted Sep 18, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

DBabble 2.5i suffers from cross site scripting issues that can lead to cookie hijacking.

tags | exploit, xss
SHA-256 | 9621a85331b7dc09b3f7e86de4a39a480e82852474c273f85f4ca1868cd200b6
MS03-039-linux.c
Posted Sep 18, 2003
Authored by Eyas, nulluid

Remote Windows exploit for the RPC DCOM long filename heap overflow discovered by NSFOCUS. Upon success, the target will have a user added as the letter e with a password of asd#321.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 1aecaf0cce333af298b5df7d6880ca92c9442ee27738f94ed70f45095f52b0a2
liquidwar-exploit.c
Posted Sep 18, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Liquidwar 5.4.5 local exploit that has been tested on Slackware Linux 9.0.0 and Gentoo Linux 1.4.

tags | exploit, local
systems | linux, slackware, gentoo
SHA-256 | 6038ccaf0089d0c6b1b982024c5d6232813a117568c7c20900bb183dcfc26458
mounty.c
Posted Sep 17, 2003
Authored by newroot | Site newroot.de

Remote root exploit for rpc.mountd that makes use of the xlog off-by-one vulnerability discussed here.

tags | exploit, remote, root
SHA-256 | 8301fb1c155cefd9ce319e1358f25b7e25d8bf34a49b62722987e5f5a7b76328
09.16.MS03-039-exp.c
Posted Sep 16, 2003
Authored by Eyas

Remote Windows exploit for the RPC DCOM long filename heap overflow discovered by NSFOCUS. Upon success, the target will have a user added as the letter e with a password of asd#321.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 8deeb2c01d158751b1bf4ee8adcd15343d9a1beaeded00158eb8c71a0eb8577a
TEXONET-20030902.txt
Posted Sep 16, 2003
Site texonet.com

Texonet Security Advisory 20030902 - SCO OpenServer / Internet Manager (mana) versions 5.0.5 to 5.0.7 are susceptible to escalating a local attacker's privileges due to being tricked into executing the environment variable REMOTE_ADDR when it is set.

tags | exploit, local
SHA-256 | 5046fb8c6f2157de1eeef06f1ff7086a72da814debcc822a30e046b466d87a8d
09.14.mysql.c
Posted Sep 16, 2003
Authored by Bkbll

Remote exploit for Mysql 3.x versions 3.23.56 and Mysql 4.x versions below 4.0.15. More information available here.

tags | exploit, remote
SHA-256 | 031cb79c22ead773279128cdcad002a6b7cea61a3829c158c874f16857a8ab9e
sorpine.c
Posted Sep 16, 2003
Authored by Sorbo | Site darkircop.org

Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here.Binds a shell to port 6682. Written for Slackware 8.0, 8.1, and 9.0 and works for RedHat as well.

tags | exploit, remote, shell
systems | linux, redhat, slackware
SHA-256 | e851c723d21209a6b26900e885356e35a071b04eb77c23187facc15b5835af99
minihttp.txt
Posted Sep 16, 2003
Authored by Peter Winter-Smith

Minihttpserver 1.x Host Engine is susceptible to a directory traversal attack and has a login parsing flaw that allows a remote attacker to gain administrative privileges.

tags | exploit, remote
SHA-256 | c3811137432dca7f6b3480030b9e97885c8de1ef80de534902b0ea664f882952
easyfile.txt
Posted Sep 16, 2003
Authored by Dr. Insane

Easy File Sharing Web Server 1.2 is vulnerable to directory traversal bugs, cross site scripting, HTML injection, and password snatching due to them being left in the clear.

tags | exploit, web, xss
SHA-256 | f44612ef4731652eedc76c34971ccef6fbab01c107847e6496e2fa6d924e38f8
ftgatepro.txt
Posted Sep 13, 2003
Authored by Phuong Nguyen | Site secunia.com

Secunia Research Advisory - Two vulnerabilities have been identified in FTGatePro mail server version 1.x that allow malicious users to access sensitive information. One lies in the file ftgatedump.fts allowing an attacker to see the system configuration while another lies in exportmbx.fts that holds all the usernames and passwords for the system.

tags | exploit, vulnerability
SHA-256 | 37e62379ae7d3410654e1b6dbec013a2f429722f7a11bac666000f9c31637ac1
bandwebsite.txt
Posted Sep 13, 2003
Authored by Nasser.M.Sh

Bandsite portal system version 1.5 lacks authentication validation in its admin.php code when an administrator is added, thus allowing a remote attacker to gain administrative privileges.

tags | exploit, remote, php
SHA-256 | 5d166e4129b983e42146f8f03a2ab30cec5d84c35a9f1631e971a799a69627ba
4DWS_ftp.c
Posted Sep 13, 2003
Authored by B-r00t | Site doris.scriptkiddie.net

4D WebSTAR FTP server suite version 5.3.1 remote exploit that binds a shell to port 6969 as the uid running the server. This exploit makes use of the pre-authentication buffer overflow that exists in the login mechanism of the WebSTAR FTP service.

tags | exploit, remote, overflow, shell
SHA-256 | 01bd8e388df9d06a72dc6ebd9d02e2c90f9818694359d81010f1bde7d75c1d8e
myPHPNuke.txt
Posted Sep 13, 2003
Authored by Frog Man | Site phpsecure.info

myPHPNuke version 1.8.8_7 performs improper variable sanitizing that will inadvertently allow a remote attacker to upload files from another site to the current site.

tags | exploit, remote
SHA-256 | 3a1d3adb28ded0cb43ab4856777f220e3e957aa1f45290d28d02a1d2cd088a90
rp9-priv-esc.c
Posted Sep 11, 2003
Authored by Jon Hart

RealOne Player 9 exploit for Unix/Linux that escalates privileges to the person using the utility by taking advantage of group write permissions on user configuration files.

tags | exploit
systems | linux, unix
SHA-256 | a67aea9bdace7eee5565929ef499259903de9f4e7f7f1daf7852e5af5e5e6f4f
WebX.txt
Posted Sep 10, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

WebX 1.1 and WebX Lite 1.1 web servers are vulnerable to a directory traversal attack that allows a remote attacker to access any files outside of the web root.

tags | exploit, remote, web, root
SHA-256 | 7014784cf66c6d123c7d3916676819429d1d52080f19f20f5455df1029596905
sp-myserver.c
Posted Sep 10, 2003
Authored by Badpack3t | Site security-protocols.com

Remote denial of service exploit for MyServer 0.4.3.

tags | exploit, remote, denial of service
SHA-256 | 6f3302a7429180063c9629e4dcd76ed0569671725b2912b7a5a1de9b985dee4b
leak-sploit.c
Posted Sep 9, 2003

Stunnel v3.25 and below exploit which makes use of the file descriptor leak discussed in this Conectiva Security Advisory. Allows local attackers to hijack the stunnel server.

tags | exploit, local
SHA-256 | 09a9bb3888296e39b2d5be94dc6ce4fb1ec76e2101199eaddf6995a5a5035a8a
augustiner.c
Posted Sep 9, 2003
Authored by warlord | Site nologin.org

Denial of service exploit for Microsoft Windows 98 that floods UDP traffic to random destination ports causing the system to lock up.

tags | exploit, denial of service, udp
systems | windows
SHA-256 | d42c427dffab7c2d44d0d3ffe21318255dd5cf99fd207e095dd5ff374fa68ffe
word.zip
Posted Sep 6, 2003
Authored by Valgasu | Site valgasu.rstack.org

Exploit that makes use of the Microsoft Word WordPerfect document converter which has been found vulnerable to a buffer overflow when a malicious .doc file is opened.

tags | exploit, overflow
SHA-256 | 2fa509d670aa52809545e6a62f5886f884f5b653c4ef5c22e96e146011fc403f
bazooka_penaka.pl
Posted Sep 6, 2003
Authored by Pokleyzz | Site scan-associates.net

Proof of concept remote exploit for Foxweb 2.5 on Microsoft Windows that achieves access of the web server user id and makes use of a buffer overflow found in the PATH_INFO variable in foxweb.dll.

tags | exploit, remote, web, overflow, proof of concept
systems | windows
SHA-256 | acda3c0fb0938e9fbbd07848f2cc1d6b3651f7d31839f816dca84820331df857
tellurian.txt
Posted Sep 4, 2003
Authored by storm | Site securiteam.com

Tellurian TFTPDNT server version 1.8 for Windows NT and Windows 9x suffers from a buffer overflow that allows remote attackers to execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
systems | windows
SHA-256 | 934987843a4ddfbb1fb41d02028e9084c43e90a88dbcd8c1079c016552ea4f9d
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close