Twenty Year Anniversary
Showing 1 - 25 of 71 RSS Feed


Posted Nov 22, 2001

Working Solaris x86 /usr/bin/mail exploit

tags | exploit, x86
systems | solaris
MD5 | ffaa045c2d7832322410f14958a800f8
Posted Oct 4, 1999

Linux exploit for w3-auth authentication module from mini-sql package.

tags | exploit, overflow, sql injection
systems | linux
MD5 | 74cc966b418fb3576616833eb2a638c0
Posted Oct 4, 1999

IE 5.0 vulnerability allows reading local and remote text files using "download behavior".

tags | exploit, remote, local
MD5 | 890e1b91d2a3b6a5968f7f48230da7e1
Posted Oct 4, 1999

Remote buffer overflow in ftpd under AIX 4.3.2 running on an RS6000.

tags | exploit, remote, overflow
systems | aix
MD5 | 9a64e32bcd7c7a3593cd2b7259b03e86
Posted Oct 2, 1999
Authored by Cheitan

Apparently this program will give you any privileges you like under NT, any service pack. We haven't tested it yet, but it looks interesting. The instructions state: simply run Abaddon.exe, and answer the two questions that are asked (You can change them or leave them on default), then press OK. We highly recommend you add yourself to the Administrators group while your at it, but of course, it's your choice =). You'll become what you chose to be the next time an Administrator logs in. Dont worry, you'll be warned of what you became =).

tags | exploit
MD5 | b19b0faf52fc2e535b3e5b0d5eb99586
Posted Sep 28, 1999

The unsetenv function in glibc 2.1.1 suffers from a problem whereby when running through the environment variables, if the name of the variable being unset is present twice consecutively, the second is not destroyed.

tags | exploit
MD5 | 4529909a635f9bbdcfe84047c2098958
Posted Sep 28, 1999

On SuSE 6.2, /usr/bin/pb and /usr/bin/pg, suid root by default allow any user to read any file on the system.

tags | exploit, root
systems | linux, suse
MD5 | 5a682377f2bf004596a748a2c5d3105f
Posted Sep 28, 1999

A fully functional unix virus that will infect your manpages when started

tags | exploit, virus
systems | unix
MD5 | 8fca1fcb3b8cf397db15d8aadcf2e50c
Posted Sep 28, 1999

/usr/bin/sccw contains a bug allowing a local root compromise through an overflow in handling $HOME. For Linux x86 tested on SuSE 6.2.

tags | exploit, overflow, x86, local, root
systems | linux, suse
MD5 | 999bc34265cbc09cdc5da047ad04f596
Posted Sep 28, 1999

nlservd/rnavc local root exploit for Linux x86 tested on SuSE 6.2. Exploits Arkiea's Knox backup package.

tags | exploit, x86, local, root
systems | linux, suse
MD5 | da1961ba54069b5f3dc255102cf03207
Posted Sep 28, 1999

SSH 1.2.27 vulnerable to a denial of service attack

tags | exploit, denial of service
MD5 | 8d1ce7f8432b61de4cd7763bf36870fa
Posted Sep 28, 1999

SSH has the option of setting up "authentication sockets", used to pass authentication keys securely. When this is used, a socket is created on both client and server machines; the socket created on the server uses an often easy to guess filename (based on the PID)...

tags | exploit
MD5 | f4df5c33dc23f4302cf81588e4119461
Posted Sep 28, 1999

Local root exploit for Solaris 2.6 through ps and way it handles $LD_PROFILE.

tags | exploit, local, root
systems | solaris
MD5 | 551bfa3074f8ea348922b7243658515b
Posted Sep 28, 1999

SCO 5.0.x exploits for scosession and scoterm allowing bin/root respectively.

tags | exploit, root
MD5 | dcf8a826a71aba3ecbec4c6ff0b9dc9c
Posted Sep 28, 1999

root exploit for the ProFTPD log_xfer() buffer overflow.

tags | exploit, overflow, root
MD5 | 36f58bf2b4ae6702077144913e7681e6
Posted Sep 28, 1999

When lynx calls external programs for protocols (e.g. telnet), the location is passed unchecked. This can be used to activate commandline parameters.

tags | exploit, protocol
MD5 | e9217106bf08e25490b55400cb9cc511
Posted Sep 28, 1999

proftpd 1.2.0pre6 patch

tags | exploit
MD5 | e5752061e304350e18d367df213e5a45
Posted Sep 28, 1999

Virtually any program using the GNOME libraries is vulnerable to a buffer overflow attack!

tags | exploit, overflow
MD5 | b341b08aa8cd1e699d97a687d0bc5680
Posted Sep 28, 1999

FreeBSD vfs_cache.c in version 3.0 and later is vulnerable to a denial of service attack as there is no way to purge entries from the cache.

tags | exploit, denial of service
systems | freebsd
MD5 | efbed8d79521edc435cf513437519d0a
Posted Sep 28, 1999

fts library routine vulnerability. Local users could gain root access.

tags | exploit, local, root
MD5 | 137a3049f82cc851bef5a508afed5acb
Posted Sep 28, 1999

The dtaction vulnerability in CDE can be exploited for local root compromise on Digital Unix systems. Also verified for Solaris 7, 2.6, 2.5.1.

tags | exploit, local, root
systems | unix, solaris
MD5 | ffae3a2b0d4246543b89f881eeb7b563
Posted Sep 28, 1999

cfingerd version 1.4.2 is vulnerable to local buffer overflow attack through not checking the gecos field properly. Exploit for FreeBSD provided.

tags | exploit, overflow, local
systems | freebsd
MD5 | 3f5e0845aec6aff5529c64192892331d
Posted Sep 28, 1999

Patch for amd. Prevent remote users from executing arbitrary code as root in the amd daemon context.

tags | exploit, remote, arbitrary, root
MD5 | db89c88a0310e15336340d4ccb2d909e
Posted Sep 28, 1999

Several ActiveX buffer overruns

tags | exploit, overflow, activex
MD5 | 831c1325432033e88757cf86eddabe71
Posted Sep 25, 1999

Linux loadable kernel module backdoor for 2.0.X. kbd is a nice little backdoor that allows root access by modifing the SYS_creat and SYS_getuid system calls. Usage after insmod is fairly strait forward: 1. login as a normal user 2. host:~$ touch foobar 3. login again under the *same* username 4. the second login session will be given root privileges 5. Remember to repeat this procedure everytime you plan on using the backdoor. To keep this covert, the special uid resets after root is given out, this prevents the legitimate owner of the account from receiving a suspicious root shell when he/she logs in.

tags | exploit, shell, kernel, root
systems | linux
MD5 | 5391235593edac1a1ec2d0ad1c0452e4
Page 1 of 3

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Ex-Fitbit Employees Indicted For Allegedly Stealing Secrets
Posted Jun 15, 2018

tags | headline, data loss, fraud
This New Android Malware Delivers Banking Trojan, Keylogger And Ransomware
Posted Jun 15, 2018

tags | headline, malware, phone, google
Xen Project Patches Intel's Lazy FPU Flaw
Posted Jun 15, 2018

tags | headline, flaw, patch, intel
Quantum Cryptography Demo Shows No Need For New Infrastructure
Posted Jun 15, 2018

tags | headline, science, cryptography
Ether Doesn't Fall Under SEC Rules
Posted Jun 15, 2018

tags | headline, government, bank, usa, cryptography
Decades-Old PGP Bug Allowed Hackers To Spoof Just About Anyone's Signature
Posted Jun 15, 2018

tags | headline, flaw, cryptography
LuckyMouse Threat Group Attacks Government Websites
Posted Jun 14, 2018

tags | headline, hacker, government, malware, china
US Senators Get Digging To Find Out The Truth About FCC DDoS Attack
Posted Jun 14, 2018

tags | headline, government, usa, denial of service, fraud
Backdoored Images Downloaded 5 Million Times Finally Removed From Docker Hub
Posted Jun 14, 2018

tags | headline, hacker, fraud, backdoor
Apple To Patch Flaw FBI Has Been Using To Hack iPhones
Posted Jun 14, 2018

tags | headline, government, privacy, usa, phone, flaw, patch, apple, fbi
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By