Exploit the possiblities
Showing 1 - 25 of 71 RSS Feed

Files

Solaris_x86_mail_exploit.txt
Posted Nov 22, 2001

Working Solaris x86 /usr/bin/mail exploit

tags | exploit, x86
systems | solaris
MD5 | ffaa045c2d7832322410f14958a800f8
Linux_mini-sql_bof.txt
Posted Oct 4, 1999

Linux exploit for w3-auth authentication module from mini-sql package.

tags | exploit, overflow, sql injection
systems | linux
MD5 | 74cc966b418fb3576616833eb2a638c0
IE5_vuln.txt
Posted Oct 4, 1999

IE 5.0 vulnerability allows reading local and remote text files using "download behavior".

tags | exploit, remote, local
MD5 | 890e1b91d2a3b6a5968f7f48230da7e1
AIX_ftpd_bof_exploit.txt
Posted Oct 4, 1999

Remote buffer overflow in ftpd under AIX 4.3.2 running on an RS6000.

tags | exploit, remote, overflow
systems | aix
MD5 | 9a64e32bcd7c7a3593cd2b7259b03e86
Abaddon.zip
Posted Oct 2, 1999
Authored by Cheitan

Apparently this program will give you any privileges you like under NT, any service pack. We haven't tested it yet, but it looks interesting. The instructions state: simply run Abaddon.exe, and answer the two questions that are asked (You can change them or leave them on default), then press OK. We highly recommend you add yourself to the Administrators group while your at it, but of course, it's your choice =). You'll become what you chose to be the next time an Administrator logs in. Dont worry, you'll be warned of what you became =).

tags | exploit
MD5 | b19b0faf52fc2e535b3e5b0d5eb99586
unsetenv.txt
Posted Sep 28, 1999

The unsetenv function in glibc 2.1.1 suffers from a problem whereby when running through the environment variables, if the name of the variable being unset is present twice consecutively, the second is not destroyed.

tags | exploit
MD5 | 4529909a635f9bbdcfe84047c2098958
suse6.2pbpg.txt
Posted Sep 28, 1999

On SuSE 6.2, /usr/bin/pb and /usr/bin/pg, suid root by default allow any user to read any file on the system.

tags | exploit, root
systems | linux, suse
MD5 | 5a682377f2bf004596a748a2c5d3105f
unix_virus.c
Posted Sep 28, 1999

A fully functional unix virus that will infect your manpages when started

tags | exploit, virus
systems | unix
MD5 | 8fca1fcb3b8cf397db15d8aadcf2e50c
SuSE_overflow_exploit.txt
Posted Sep 28, 1999

/usr/bin/sccw contains a bug allowing a local root compromise through an overflow in handling $HOME. For Linux x86 tested on SuSE 6.2.

tags | exploit, overflow, x86, local, root
systems | linux, suse
MD5 | 999bc34265cbc09cdc5da047ad04f596
SuSE_root_exploit.txt
Posted Sep 28, 1999

nlservd/rnavc local root exploit for Linux x86 tested on SuSE 6.2. Exploits Arkiea's Knox backup package.

tags | exploit, x86, local, root
systems | linux, suse
MD5 | da1961ba54069b5f3dc255102cf03207
ssh_exploit.txt
Posted Sep 28, 1999

SSH 1.2.27 vulnerable to a denial of service attack

tags | exploit, denial of service
MD5 | 8d1ce7f8432b61de4cd7763bf36870fa
SSH.1.2.27.DOS.txt
Posted Sep 28, 1999

SSH has the option of setting up "authentication sockets", used to pass authentication keys securely. When this is used, a socket is created on both client and server machines; the socket created on the server uses an often easy to guess filename (based on the PID)...

tags | exploit
MD5 | f4df5c33dc23f4302cf81588e4119461
solaris_root_exploit.txt
Posted Sep 28, 1999

Local root exploit for Solaris 2.6 through ps and way it handles $LD_PROFILE.

tags | exploit, local, root
systems | solaris
MD5 | 551bfa3074f8ea348922b7243658515b
sco_local_exploit.txt
Posted Sep 28, 1999

SCO 5.0.x exploits for scosession and scoterm allowing bin/root respectively.

tags | exploit, root
MD5 | dcf8a826a71aba3ecbec4c6ff0b9dc9c
SDI.exploit4.proftpd.txt
Posted Sep 28, 1999

root exploit for the ProFTPD log_xfer() buffer overflow.

tags | exploit, overflow, root
MD5 | 36f58bf2b4ae6702077144913e7681e6
lynx.2.8.2.extern.txt
Posted Sep 28, 1999

When lynx calls external programs for protocols (e.g. telnet), the location is passed unchecked. This can be used to activate commandline parameters.

tags | exploit, protocol
MD5 | e9217106bf08e25490b55400cb9cc511
proftpd.1.2.0pre6.txt
Posted Sep 28, 1999

proftpd 1.2.0pre6 patch

tags | exploit
MD5 | e5752061e304350e18d367df213e5a45
linux_GNOME_exploit.txt
Posted Sep 28, 1999

Virtually any program using the GNOME libraries is vulnerable to a buffer overflow attack!

tags | exploit, overflow
MD5 | b341b08aa8cd1e699d97a687d0bc5680
FreeBSD_DoS.txt
Posted Sep 28, 1999

FreeBSD vfs_cache.c in version 3.0 and later is vulnerable to a denial of service attack as there is no way to purge entries from the cache.

tags | exploit, denial of service
systems | freebsd
MD5 | efbed8d79521edc435cf513437519d0a
FreeBSD-SA-99.05.fts.txt
Posted Sep 28, 1999

fts library routine vulnerability. Local users could gain root access.

tags | exploit, local, root
MD5 | 137a3049f82cc851bef5a508afed5acb
dtaction.digital.unix.vuln.txt
Posted Sep 28, 1999

The dtaction vulnerability in CDE can be exploited for local root compromise on Digital Unix systems. Also verified for Solaris 7, 2.6, 2.5.1.

tags | exploit, local, root
systems | unix, solaris
MD5 | ffae3a2b0d4246543b89f881eeb7b563
cfingerd_bof.txt
Posted Sep 28, 1999

cfingerd version 1.4.2 is vulnerable to local buffer overflow attack through not checking the gecos field properly. Exploit for FreeBSD provided.

tags | exploit, overflow, local
systems | freebsd
MD5 | 3f5e0845aec6aff5529c64192892331d
amd.patch
Posted Sep 28, 1999

Patch for amd. Prevent remote users from executing arbitrary code as root in the amd daemon context.

tags | exploit, remote, arbitrary, root
MD5 | db89c88a0310e15336340d4ccb2d909e
ActiveX_bof.txt
Posted Sep 28, 1999

Several ActiveX buffer overruns

tags | exploit, overflow, activex
MD5 | 831c1325432033e88757cf86eddabe71
kbd.c
Posted Sep 25, 1999

Linux loadable kernel module backdoor for 2.0.X. kbd is a nice little backdoor that allows root access by modifing the SYS_creat and SYS_getuid system calls. Usage after insmod is fairly strait forward: 1. login as a normal user 2. host:~$ touch foobar 3. login again under the *same* username 4. the second login session will be given root privileges 5. Remember to repeat this procedure everytime you plan on using the backdoor. To keep this covert, the special uid resets after root is given out, this prevents the legitimate owner of the account from receiving a suspicious root shell when he/she logs in.

tags | exploit, shell, kernel, root
systems | linux
MD5 | 5391235593edac1a1ec2d0ad1c0452e4
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Ajit Pai Screws Entire Internet, Repeals Net Neutrality
Posted Nov 21, 2017

tags | headline, government, usa, fraud
Germany Urges Parents To Destroy Snooping Smartwatches
Posted Nov 20, 2017

tags | headline, privacy, germany
Drone Maker Makes Hacking Accusations
Posted Nov 20, 2017

tags | headline, hacker, flaw
DNS Resolver 9.9.9.9 Will Check Requests Against IBM Threat Database
Posted Nov 20, 2017

tags | headline, malware, dns
F5 DROWNing, Not Waving, In Crypto Fail
Posted Nov 20, 2017

tags | headline, flaw, cryptography
Cap'n Crunch Booted From Conferences Due To Sexual Misconduct Claims
Posted Nov 18, 2017

tags | headline, hacker, phone, conference
3 More Android Malware Families Invade Google Play Store
Posted Nov 18, 2017

tags | headline, malware, phone, google
Shamed TLS/SSL Cert Authority StartCom To Shut Up Shop
Posted Nov 18, 2017

tags | headline, privacy, data loss, flaw, cryptography
Massive US Military Social Media Spying Archive Left Wide Open In AWS S3 Buckets
Posted Nov 18, 2017

tags | headline, government, privacy, usa, amazon, data loss, flaw, spyware, social
NYPD Cops Need A Warrant To Snoop On Your Phone
Posted Nov 17, 2017

tags | headline, government, privacy, usa, phone
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close