exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files from Xpl017Elz

First Active2002-11-17
Last Active2008-04-08
x2_fc6f7f8.tar.gz
Posted Apr 8, 2008
Authored by Xpl017Elz | Site x82.inetcop.org

Apache Tomcat Connector jk2-2.0.2 (mod_jk2) remote overflow exploit that is Fedora Core 6, 7, 8 (exec-shield) based.

tags | exploit, remote, overflow
systems | linux, fedora
SHA-256 | f2c20a72c6f0f767b7cdf1730e379fb20df15b7edd5262273f907b7c946ee96f
0x82-apache-mod_jk.c
Posted Jul 10, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

Apache Tomcat Connector mod_jk version 1.2.19 remote buffer overflow exploit for Fedora Core 5,6 (exec-shield).

tags | exploit, remote, overflow
systems | linux, fedora
SHA-256 | 24366bcf5fd939402e2136ae4afaf302d0e97d8a5f9ab0e2664a94791726f33e
0x82-x1_fc6.c
Posted May 15, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

Fedora Core 6 (exec-shield) based Webdesproxy version 0.0.1 remote root exploit.

tags | exploit, remote, root
systems | linux, fedora
SHA-256 | a597e3eae30fff3e173ea50fa5b8d93a0a45a5fcfe86ce236cd50280358629bf
3proxy-overflow.txt
Posted May 3, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

3proxy version 0.5.3g proxy.c logurl() remote buffer overflow exploit. Uses the reverse connect-back method.

tags | exploit, remote, overflow
SHA-256 | cb5338af3ab1feac826130b57cdbd6d1550d917686e22c285708f4158c9003f2
fenice-overflow.txt
Posted May 3, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

Fenice OMS server version 1.10 remote root buffer overflow exploit.

tags | exploit, remote, overflow, root
SHA-256 | ccb2a8ac8990e9209800f79b19078b6c4c6acc738a98dd5da1d2b538125e0ad6
0x82-gnu-imap4d_search_fc6_ex.c
Posted Apr 24, 2007
Authored by Xpl017Elz | Site inetcop.org

Fedora Core 6 (exec-shield) based GNU imap4d mailutils-0.6 search remote format string exploit.

tags | exploit, remote
systems | linux, fedora
SHA-256 | 446e3e6b76cd0a02db343848337da632eee1d94487876ba6ba92fdc125f114b8
execshield.tgz
Posted Apr 19, 2007
Authored by Xpl017Elz | Site inetcop.org

Whitepaper titled 'Advanced Exploitation In Exec-Shield: Fedora Core Case Study". This is an excellent paper and is in both PDF and text formats. Please check it out.

tags | exploit
systems | linux, fedora
SHA-256 | a8e5761dc6549e813b9928348cdf9f0062dfebc993c77dfa6cf7367eb33624af
pr0ftpd_modctrls.tgz
Posted Apr 17, 2007
Authored by Xpl017Elz | Site inetcop.org

ProFTPD versions 1.3.0 and 1.3.0a local overflow exploit.

tags | exploit, overflow, local
SHA-256 | f226fa4b69a0b38b89856b6fdf13dd0cae57a2c097428ced1cb703ee6948d130
Trustix Secure Linux Security Advisory 2006.0
Posted Mar 13, 2006
Authored by Xpl017Elz | Site inetcop.org

Zeroboard version 4.1 pl 7 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 20123c6d7f762c448059ec975caa8110a197efcb19b9185c00bafe7b945a6bf4
hauri.txt
Posted Feb 25, 2006
Authored by Xpl017Elz | Site inetcop.org

Global Hauri Virobot is susceptible to an authentication bypass flaw.

tags | advisory
SHA-256 | 3b3ac939a77acd88b3bd2b1eb448a9cedf10c16a6c06e1f6d4abbb794893e7b3
Trustix Secure Linux Security Advisory 2005.0
Posted Jun 16, 2005
Authored by Xpl017Elz | Site x82.inetcop.org

Snmppd is susceptible to a format string vulnerability.

tags | advisory
SHA-256 | bc5427491a4a901c393b53732a6504c2225b684ae85279588d94c9d19012c901
snmppd_dos.txt
Posted May 7, 2005
Authored by Xpl017Elz | Site slava.local.nsys.by

Snmppd format string vulnerability. Snmppd (used by / with Nagios) may contain a format-string vulnerability in unsafe syslog() calls.

tags | advisory
SHA-256 | 530283249b60e4f090b7e6f5b2df86eca244287192c133b0dfe453b3eb4a9996
0x82-meOw_linuxer_forever.c
Posted Apr 18, 2005
Authored by Xpl017Elz | Site x82.inetcop.org

GLD 1.4 remote overflow format string exploit that binds a shell to port 36864.

tags | exploit, remote, overflow, shell
SHA-256 | e774ca4a0e106e9ad6a28c0eed3738f3657b001846638e469f61c6091406c537
Trustix Secure Linux Security Advisory 2005.0
Posted Apr 18, 2005
Authored by Xpl017Elz | Site inetcop.net

INetCop Security Advisory #2005-0x82-026 - Multiple buffer overflows and a format string vulnerability live in GLD versions 1.4 and below.

tags | advisory, overflow
SHA-256 | 0955f8c245cdfd1d563ec36ffcd71eee970764667738d4bcc713e86608db5aa0
sh-httpd.txt
Posted Oct 30, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.

tags | exploit, remote, cgi
SHA-256 | a0ae3eee45856fba670f376c41e9f3a32c4c4558388732713876b66cc0eabf20
0x82-WOOoouHappy_new.c
Posted Aug 11, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.

tags | exploit, remote, root
SHA-256 | 76fa131537012b1004aff58978340769dc77495dcc3679e28c335c7909cd545f
wu262.zip
Posted Aug 6, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here. Win32 version included that requires cygwin1.dll.

tags | exploit, remote, root
systems | windows
SHA-256 | 526db9e57fd9d03098a4ca647fd59e6961d4ccc10042d2d8bef0f4ec2b9e6426
0x82-wu262.c
Posted Aug 5, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.

tags | exploit, remote, root
SHA-256 | ee456ce67583efada4d02d4662672efba77c520fe854673004cf4f185d954ed0
0x82-dcomrpc_usemgret.c
Posted Aug 5, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

New version of the DCOM remote exploit that uses a magic return address.

tags | exploit, remote
SHA-256 | e5c92fea127afc1160f63d29acf4ebb26561218ac01cee7a18d6b64cba4c894f
INetCop.GNATS.txt
Posted Jun 22, 2003
Authored by Xpl017Elz | Site inetcop.org

INetCop Security Advisory #2003-0x82-018 - The GNU bug tracking system GNATS has two bugs that exist in the pr-edit (Problem report editor) program. There is a heap based overflow when a user uses the -d option to input a directory name under version 3.2 There is an environment variable overflow vulnerability in version 3.113.x that will also yield root privileges.

tags | advisory, overflow, root
SHA-256 | ec98715198eb39ad65760e2d10ba0f2596b85ed8ee3d03b7491e1cdb626cea06
0x82-GNATS_sux.c
Posted Jun 22, 2003
Authored by Xpl017Elz | Site inetcop.org

Local root exploit against GNATS v3.113.x that makes use of a heap based environment variable overflow vulnerability. Related advisory found here. Tested against RedHat Linux versions 6-9.

tags | exploit, overflow, local, root
systems | linux, redhat
SHA-256 | 538bd4423fdd435464a897aab663f0238af584df2870e50af3413af3511a2c1e
0x82-GNATS_own.c
Posted Jun 22, 2003
Authored by Xpl017Elz | Site inetcop.org

Local root exploit against GNATS v3.2 that makes use of the heap overflow found in the -d switch. Related advisory found here. Tested against RedHat Linux versions 6-9.

tags | exploit, overflow, local, root
systems | linux, redhat
SHA-256 | f5b477f0da8c0952aa1d3d05cdefb6691ea408d719dd83bb53879868bfcc2873
bufferpaper.txt
Posted Jun 11, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

This paper goes into great detail describing how to utilize format string attacks with limited buffer space.

tags | paper
SHA-256 | 26e76a849776b6bb6aed421c8c8e7c19ea279402faae685b8acaa53a90afbbd9
b-WsMP3dvuln.txt
Posted May 23, 2003
Authored by Xpl017Elz | Site inetcop.org

INetCop Security Advisory #2003-0x82-017.b - New versions of WsMP3d are not patched against an old remote heap corruption overflow vulnerability. Remote exploit and advisory included.

tags | exploit, remote, overflow
SHA-256 | bea05768421c2354342197437d34277cb5984897a68518e4181beeb625f26463
a-WsMPdvuln.txt
Posted May 23, 2003
Authored by Xpl017Elz | Site inetcop.org

INetCop Security Advisory #2003-0x82-017.a - WsMP3d, a web server that streams MP3s much like shoutcast but is GPL, suffers from a directory traversal vulnerability that not only allows viewing of files outside of the webroot, but allows for remote command execution as well.

tags | exploit, remote, web
SHA-256 | bc72d07b2004ab7e987341e534050ec07ea4699fd37effc980c5656ccf6a0bd6
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close