exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files

proftpdr00t.c
Posted Oct 14, 2003
Authored by Haggis

Remote root exploit for ProFTPd versions 1.2.7 - 1.2.9rc2 that breaks the chroot and uses brute force. Tested against SuSE 8.0/8.1 and RedHat 7.2/8.0.

tags | exploit, remote, root
systems | linux, redhat, suse
SHA-256 | e1b8169e56e2b24443a163f1d695b621b114d4358c11fe13d71fa81194edffd3
ms2k3traversal.txt
Posted Oct 9, 2003
Authored by Eiji James Yoshida

Microsoft Windows Server 2003 allows a remote attacker to traverse directories and access arbitrary files via shell: references.

tags | exploit, remote, arbitrary, shell
systems | windows
SHA-256 | c746e2a9099c4bcf5bf8b1e876119b6acf3fd8066c84a86cf3960711f866973b
dtprintinfo.txt
Posted Oct 9, 2003
Authored by Davide Del Vecchio | Site alighieri.org

HPUX dtprintinfo on B.11.00 is vulnerable to a buffer overflow that can allow for privilege escalation.

tags | exploit, overflow
systems | hpux
SHA-256 | 18cece8ec7ddb9a30360119d056d1a27c301a94681f9e7898fecc7084e1d9e7a
openoffice110.txt
Posted Oct 9, 2003
Authored by Marc Schoenefeld | Site illegalaccess.org

Illegalaccess.org Security Alert - Openoffice 1.1.0 is vulnerable to a denial of service attack when enabled and a TCP connection to the daemon gets fed a bunch of zeroes.

tags | exploit, denial of service, tcp
SHA-256 | f0e475822a5cb5d02bafd4ef52b5d3bcc86b303db8dcd07cd2bef486b0ce779b
wmpphp.txt
Posted Oct 7, 2003
Authored by Mindwarper | Site mindlock.bestweb.net

Exploit that swaps the Windows Media Player with a message from Mindlock by making use of the Internet Explorer 6 XML bypass flaw.

tags | exploit
systems | windows
SHA-256 | 6d864fa1511c92363d78b3e78af1299d57f03f4e40cdc69d731afd9c894c6e8f
easyfile12.txt
Posted Oct 6, 2003
Authored by nimber | Site nimber.plux.ru

Easy File Sharing Web Server 1.2 allows for remote access to logs and options without any type of authentication.

tags | exploit, remote, web
SHA-256 | 1f238918cd90aa0dc5dd59a8410daa436e3f3811bccae026948c30e06e1ae6a1
conexant.txt
Posted Oct 6, 2003
Authored by Chris Norton

The Conexant Access Runner DSL Console has faulty authentication capabilities that allow an attacker to login as the administrator after one failed attempt.

tags | exploit
SHA-256 | 9ca461e85238f47a1609559d07b6f180830fdb3564d26d03d99cffae24b0061d
I2S-LAB-25-09-2003.txt
Posted Oct 6, 2003
Authored by Fred Chaverot, Aurelien Boudoux | Site I2S-LaB.com

I2S LAB Security Advisory - The HTTP daemon for FirstClass build 133 (SP3) and below suffers from a heap overflow that allows a remote attacker to shutdown various services on the server.

tags | exploit, remote, web, overflow
SHA-256 | 4b4cb1c418dd9a284c326f4da4b54e1bd17564a3e611c57ea4f3c95584b47532
guppy24.txt
Posted Oct 6, 2003
Authored by Frog Man | Site phpsecure.info

GuppY versions 2.4p3 and below are susceptible to cross site scripting attacks and have a lack of authentication when various data submissions are performed.

tags | exploit, xss
SHA-256 | 638ddd4acfb1768d65554ad49dc68964fd98689e44a4646b73d7ba18355e680b
EMML.txt
Posted Oct 6, 2003
Authored by Frog Man | Site phpsecure.info

EMML version 1.32, or EternalMart Mailing List Manager, and EMGB version 1.1, or EternalMart Guestbook, are both vulnerable to cross site scripting attacks that allow for remote PHP code execution from another site.

tags | exploit, remote, php, code execution, xss
SHA-256 | 850e833f809c4877c234514fd44139518b0302cac84561137c81c6348bc08e0e
php67.txt
Posted Oct 6, 2003
Authored by Frog Man | Site phpsecure.info

PHP Nuke 6.7 is susceptible to allowing arbitrary file upload and execution via the file mailattach.php.

tags | exploit, arbitrary, php, file upload
SHA-256 | 685e128399a15d42c3ea8f47b608c882803d1bd7b26e13a3e5a915ccdbd4fabf
cafelog.txt
Posted Oct 3, 2003
Authored by Seth Woolley

WordPress Cafelog is vulnerable to a number of SQL injection attacks that allow a local attacker with access to the same filesystem as the database to exploit.

tags | exploit, local, sql injection
SHA-256 | 74b75135b16d5c546fca3aaed5d5aa888b0f45c7d26468f13f0b98bff599dfbb
leap.tgz
Posted Oct 3, 2003

Exploit that brute forces Microsoft's Active Directory authentication used in conjunction with the Cisco LEAP authentication on Cisco wireless access points.

tags | exploit
systems | cisco
SHA-256 | 5c87ee16dceaedfff86ef27f5cf5d747efa9ad7350b93a83fb929b17843d3b02
prockill.txt
Posted Oct 2, 2003
Authored by Brett Moore SA | Site security-assessment.com

Inside the PostThreadMessage API, any user of any security level can give a WM_QUIT message causing the process to terminate. Sample exploit code included.

tags | exploit
SHA-256 | dae92371caa61085fff77e818f7e1bd44af495374120d1706c46fb9deee38189
winshadow.zip
Posted Oct 1, 2003
Authored by Peter Winter-Smith, Bahaa Naamnmeh | Site elitehaven.net

OmniCon WinShadow version 2.0 exploit that makes use of a buffer overflow in the client handling of hostnames in host files.

tags | exploit, overflow
SHA-256 | 86813402c8fb4dfc3ce919ffaaa3d42a89d9a501b49144029fa04d5764e3e764
dcpportal.txt
Posted Oct 1, 2003
Authored by Lifo Fifo | Site hackingzone.org

DCP Portal 5.5 is susceptible to multitudes of SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 4f047b815f0a078df914af5f2b80023f7c43c58e79712d72f8210ace0cbbed7c
c-sillyPoker.c
Posted Oct 1, 2003
Authored by demz | Site c-code.net

Local proof of concept exploit that makes use of the HOME environment variable related overflow in Silly Poker v0.25.5. Yields group id of games.

tags | exploit, overflow, local, proof of concept
SHA-256 | 88b463d11b64bec685313e31b98d0f4ed4c1b35c157792bd2f92bcfc6e7a6850
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
14 Dead As Hezbollah Walkie Talkies Explode In Second, Deadlier Attack
Posted Sep 19, 2024

tags | headline, cyberwar, israel, terror, backdoor
UK Activists Targeted With Pegasus Spyware Ask Police To Charge NSO Group
Posted Sep 19, 2024

tags | headline, government, privacy, britain, israel, spyware
Pip Dreams And Security Schemes: Chaos In Your Configuration Files
Posted Sep 18, 2024

tags | headline, backdoor
Apple Suddenly Drops NSO Group Spyware Lawsuit
Posted Sep 18, 2024

tags | headline, privacy, phone, flaw, israel, spyware, apple
11 Dead, Thousands Injured In Explosive Supply Chain Attack On Hezbollah Pagers
Posted Sep 18, 2024

tags | headline, wireless, cyberwar, israel, terror, backdoor
CloudImposer Attack Targets Google Cloud Services
Posted Sep 18, 2024

tags | headline, hacker, google
AT&T Fined $13 Million For Data Breach
Posted Sep 18, 2024

tags | headline, privacy, phone, data loss
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close