what you don't know can hurt you
Showing 1 - 25 of 38 RSS Feed

Files from Xpl017Elz

First Active2002-11-17
Last Active2008-04-08
x2_fc6f7f8.tar.gz
Posted Apr 8, 2008
Authored by Xpl017Elz | Site x82.inetcop.org

Apache Tomcat Connector jk2-2.0.2 (mod_jk2) remote overflow exploit that is Fedora Core 6, 7, 8 (exec-shield) based.

tags | exploit, remote, overflow
systems | linux, fedora
MD5 | 42513b4843afdb23595cd7a871eeca6f
0x82-apache-mod_jk.c
Posted Jul 10, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

Apache Tomcat Connector mod_jk version 1.2.19 remote buffer overflow exploit for Fedora Core 5,6 (exec-shield).

tags | exploit, remote, overflow
systems | linux, fedora
MD5 | 7237019e79ecd2b7a54187bb77cd1af4
0x82-x1_fc6.c
Posted May 15, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

Fedora Core 6 (exec-shield) based Webdesproxy version 0.0.1 remote root exploit.

tags | exploit, remote, root
systems | linux, fedora
MD5 | 9f1800894ead4793a02e0a1bfcaa650f
3proxy-overflow.txt
Posted May 3, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

3proxy version 0.5.3g proxy.c logurl() remote buffer overflow exploit. Uses the reverse connect-back method.

tags | exploit, remote, overflow
MD5 | 88c2dd6160b7a6b3c9f6f8697c7219f6
fenice-overflow.txt
Posted May 3, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

Fenice OMS server version 1.10 remote root buffer overflow exploit.

tags | exploit, remote, overflow, root
MD5 | 5332710197aa081c6d97686d14b3152d
0x82-gnu-imap4d_search_fc6_ex.c
Posted Apr 24, 2007
Authored by Xpl017Elz | Site inetcop.org

Fedora Core 6 (exec-shield) based GNU imap4d mailutils-0.6 search remote format string exploit.

tags | exploit, remote
systems | linux, fedora
MD5 | b2617db887c9dcb1ffd81f8123dd5738
execshield.tgz
Posted Apr 19, 2007
Authored by Xpl017Elz | Site inetcop.org

Whitepaper titled 'Advanced Exploitation In Exec-Shield: Fedora Core Case Study". This is an excellent paper and is in both PDF and text formats. Please check it out.

tags | exploit
systems | linux, fedora
MD5 | 73c2ca5aeeb6801b9799fe7003203043
pr0ftpd_modctrls.tgz
Posted Apr 17, 2007
Authored by Xpl017Elz | Site inetcop.org

ProFTPD versions 1.3.0 and 1.3.0a local overflow exploit.

tags | exploit, overflow, local
MD5 | e1ddb5fd4879cb1644845b2170583de2
Trustix Secure Linux Security Advisory 2006.0
Posted Mar 13, 2006
Authored by Xpl017Elz | Site inetcop.org

Zeroboard version 4.1 pl 7 is susceptible to cross site scripting attacks.

tags | advisory, xss
MD5 | 840c2676bc4c48b8f8274afe64263bb9
hauri.txt
Posted Feb 25, 2006
Authored by Xpl017Elz | Site inetcop.org

Global Hauri Virobot is susceptible to an authentication bypass flaw.

tags | advisory
MD5 | 0639d51c4366de335eddf6cc2e229776
Trustix Secure Linux Security Advisory 2005.0
Posted Jun 16, 2005
Authored by Xpl017Elz | Site x82.inetcop.org

Snmppd is susceptible to a format string vulnerability.

tags | advisory
MD5 | 02c8e09228f0fb818c6d1a9f32266bd7
snmppd_dos.txt
Posted May 7, 2005
Authored by Xpl017Elz | Site slava.local.nsys.by

Snmppd format string vulnerability. Snmppd (used by / with Nagios) may contain a format-string vulnerability in unsafe syslog() calls.

tags | advisory
MD5 | 37deecb480480697a0e9cc7a9aaf3096
0x82-meOw_linuxer_forever.c
Posted Apr 18, 2005
Authored by Xpl017Elz | Site x82.inetcop.org

GLD 1.4 remote overflow format string exploit that binds a shell to port 36864.

tags | exploit, remote, overflow, shell
MD5 | e55ef2d56dc9463377fb00e6f3cac699
Trustix Secure Linux Security Advisory 2005.0
Posted Apr 18, 2005
Authored by Xpl017Elz | Site inetcop.net

INetCop Security Advisory #2005-0x82-026 - Multiple buffer overflows and a format string vulnerability live in GLD versions 1.4 and below.

tags | advisory, overflow
MD5 | cca612224a7d03de78d7b9f49fe96634
sh-httpd.txt
Posted Oct 30, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.

tags | exploit, remote, cgi
MD5 | 0a6560a983f4d7c86c1eb4c1f8375ba8
0x82-WOOoouHappy_new.c
Posted Aug 11, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.

tags | exploit, remote, root
MD5 | e32262b59b2c437a042a9c44f585e779
wu262.zip
Posted Aug 6, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here. Win32 version included that requires cygwin1.dll.

tags | exploit, remote, root
systems | windows
MD5 | d51a154c43964e9060e022535d454572
0x82-wu262.c
Posted Aug 5, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.

tags | exploit, remote, root
MD5 | ba62e7c09104708dc6d95e0c0e6ccbea
0x82-dcomrpc_usemgret.c
Posted Aug 5, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

New version of the DCOM remote exploit that uses a magic return address.

tags | exploit, remote
MD5 | 3c971c900f29a65fc93e7c0dd596382e
INetCop.GNATS.txt
Posted Jun 22, 2003
Authored by Xpl017Elz | Site inetcop.org

INetCop Security Advisory #2003-0x82-018 - The GNU bug tracking system GNATS has two bugs that exist in the pr-edit (Problem report editor) program. There is a heap based overflow when a user uses the -d option to input a directory name under version 3.2 There is an environment variable overflow vulnerability in version 3.113.x that will also yield root privileges.

tags | advisory, overflow, root
MD5 | ebc815caa9bbe255fc983c4395f2428d
0x82-GNATS_sux.c
Posted Jun 22, 2003
Authored by Xpl017Elz | Site inetcop.org

Local root exploit against GNATS v3.113.x that makes use of a heap based environment variable overflow vulnerability. Related advisory found here. Tested against RedHat Linux versions 6-9.

tags | exploit, overflow, local, root
systems | linux, redhat
MD5 | c433613d79f8fd6493b48c10d8b30e3f
0x82-GNATS_own.c
Posted Jun 22, 2003
Authored by Xpl017Elz | Site inetcop.org

Local root exploit against GNATS v3.2 that makes use of the heap overflow found in the -d switch. Related advisory found here. Tested against RedHat Linux versions 6-9.

tags | exploit, overflow, local, root
systems | linux, redhat
MD5 | 39b4e56f07ade73a703b6eada24cb533
bufferpaper.txt
Posted Jun 11, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

This paper goes into great detail describing how to utilize format string attacks with limited buffer space.

tags | paper
MD5 | c533bdbebb1fc4a96cf43dbff879cdc5
b-WsMP3dvuln.txt
Posted May 23, 2003
Authored by Xpl017Elz | Site inetcop.org

INetCop Security Advisory #2003-0x82-017.b - New versions of WsMP3d are not patched against an old remote heap corruption overflow vulnerability. Remote exploit and advisory included.

tags | exploit, remote, overflow
MD5 | fee1e5ee6009d22f0754405163419c14
a-WsMPdvuln.txt
Posted May 23, 2003
Authored by Xpl017Elz | Site inetcop.org

INetCop Security Advisory #2003-0x82-017.a - WsMP3d, a web server that streams MP3s much like shoutcast but is GPL, suffers from a directory traversal vulnerability that not only allows viewing of files outside of the webroot, but allows for remote command execution as well.

tags | exploit, remote, web
MD5 | 1ff2d86a592f92c1751dc263dab6ada1
Page 1 of 2
Back12Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    17 Files
  • 23
    Mar 23rd
    1 Files
  • 24
    Mar 24th
    1 Files
  • 25
    Mar 25th
    16 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close