exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from Telehor

First Active2000-07-24
Last Active2001-07-12
cfingerd-exploit.pl
Posted Jul 12, 2001
Authored by Telehor | Site digit-labs.org

Cfingerd v1.4.3 and below local root buffer overflow exploit in perl. Exploits <a href="http://www.securityfocus.com/archive/1/192844"this</a> vulnerability.

tags | exploit, web, overflow, local, root, perl
SHA-256 | 7b79ae13d85cacf1b8ce314ae39684e5ad6ef29d9488a23ca3c28dde72ba702f
hfaxd-fs-exploit.pl
Posted Apr 25, 2001
Authored by Telehor | Site teleh0r.cjb.net

Hylafax (/usr/libexec/fax/hfaxd) format string local root exploit. Tested on hylafax-4.0pl2-2.

tags | exploit, local, root
SHA-256 | 27326b522b9dab8a30cd201131238bab6559ce649d75129f48fd4a1556aa0ffe
crazywwwb-exploit.pl
Posted Apr 10, 2001
Authored by Telehor | Site teleh0r.cjb.net

Remote buffer overflow exploit for CrazyWWWBoard which executes arbitrary code with the privileges of the webserver. Tested against CrazyWWWBoard2000p4 for RedHat 6.0 and CrazyWWWBoard2000LEp5 for RedHat 6.1. This is NOT that same overflow as discovered by Jin Ho You, 01.30.2001.

tags | exploit, remote, overflow, arbitrary
systems | linux, redhat
SHA-256 | 19688fd775a7f4f0a92299bf49551ce8414d7d354001d363cad28d1e972b9062
ASPSeek-exploit.pl
Posted Mar 26, 2001
Authored by Telehor | Site teleh0r.cjb.net

Remote buffer overflow exploit for ASPSeek by SWSoft. Tested against Aspseek v1.0.3 running on Red Hat 6.2.

tags | exploit, remote, overflow
systems | linux, redhat
SHA-256 | 40271d0a0a1c672f23d3696e35a8917d11de100ed2ed1f211f17056c48582a15
seyon-exploit.pl
Posted Feb 2, 2001
Authored by Telehor | Site teleh0r.cjb.net

Seyon v2.1rev4b local exploit - Requires a valid display variable.

tags | exploit, local
SHA-256 | 05f961ae5eea578579a5554674f759ec21d2787c231c85db34475e46faa747ec
jazip-exploit.pl
Posted Feb 2, 2001
Authored by Telehor | Site teleh0r.cjb.net

Jazip v0.32-2 local root exploit - Takes advantage of a buffer overflow in the Xforms library.

tags | exploit, overflow, local, root
SHA-256 | 0bb3081442c2c8049ba97fcecf4791726f57f01f26e8e42e9099a1a2abaf460a
iis-unicode-exploit.pl
Posted Nov 9, 2000
Authored by Telehor | Site teleh0r.cjb.net

IIS Unicode remote exploit - Executes commands remotely on IIS 4.0 on NT and IIS 5.0 on Windows NT and 2000.

tags | exploit, remote
systems | windows
SHA-256 | fbc3b2aa102785a4757f4a193d95da46e9bee307e89c92a60281da7338e006dd
pollit-2.0-exploit.pl
Posted Nov 9, 2000
Authored by Telehor

Poll It v2.0 CGI exploit which binds a shell to tcp port 60179.

tags | exploit, shell, cgi, tcp
SHA-256 | ac9a11e96cfadd025d991a68aab80ce6e5c6b256ab9c91bac1ebb6ed4483fa53
utilmind-maillist-exploit.pl
Posted Oct 28, 2000
Authored by Telehor | Site teleh0r.cjb.net

Mailing List & News Version 1.7 remote exploit - takes advantage of insecure mail handling to spawn a shell on tcp port 60179.

tags | exploit, remote, shell, tcp
SHA-256 | 3a148d33c2f43170a5459c274e9265844c395aa32ff20393b2138faa0365ddd6
listmail-exploit.pl
Posted Oct 28, 2000
Authored by Telehor | Site teleh0r.cjb.net

Listmail v112 remote exploit which spawns a shell on tcp port 60179. Takes advantage of an insecure open call.

tags | exploit, remote, shell, tcp
SHA-256 | a2ac27c937b546ef9d313562c45140abe85c463a173244433131cd8154e5689a
formnow-exploit.pl
Posted Oct 28, 2000
Authored by Telehor | Site teleh0r.cjb.net

FormNow CGI script v1.0 remote exploit - Takes advantage of an insecure sendmail call to bind a shell to tcp port 60179.

tags | exploit, remote, shell, cgi, tcp
SHA-256 | 42bf2ffcf31c7fb94d3cd685478259c9560724e80bf63d3d45532dea4c785e1e
auction.weaver.pl
Posted Sep 6, 2000
Authored by Telehor | Site teleh0r.cjb.net

Auction Weaver 1.02 Lite remote proof of concept exploit. Spawns an xterm by exploiting an insecure open() call.

tags | exploit, remote, proof of concept
SHA-256 | 05490e9058e27b2b15a85eb91906bf90777cd620da83832f56681fe3570761b8
formmail-xploit.pl
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

Form Mail v1.0 (form.cgi) remote exploit - spawns an xterm from the victim computer.

tags | exploit, remote, cgi
SHA-256 | 0a106d313f4d701240d2c353c6d13d94bd56cd95675b225e91644c39bf674c86
clickrespond-xploit.pl
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

Click Responder v1.02 remote exploit - spawns an xterm from the victim computer.

tags | exploit, remote
SHA-256 | 641649b9d5e09cdbd6153ff158fd12a709fc05ea1502c9ebc1c2a9a2d2e706b7
bulkmail-xploit.pl
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

bulk.cgi is a Bulk Mailer CGI which has remote vulernabilities which allow an attacker to spawn an xterm.

tags | exploit, remote, cgi
SHA-256 | 8bef063aa4f8a6099294506a682482551cb6e76ed05df104f7d8cd504ab6d562
alienform2-xploit.pl
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

AlienForm2 remote cgi exploit - Spawns an xterm from target machine.

tags | exploit, remote, cgi
SHA-256 | 0f1c6a0e6f0f4c3ce24670e4260bc91a1fbb65613853982bf45a8ba4a3f01572
bnbform-xploit.pl
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

bnbform.cgi v4.0 and below remote exploit - reads any file on the system.

tags | exploit, remote, cgi
SHA-256 | f8545048ece8ca8481bfdc18a36d3918bf84ddc084afd0240f23a03690f02408
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close