exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 38 of 38 RSS Feed

Files from Xpl017Elz

First Active2002-11-17
Last Active2008-04-08
0x82-Local.Qp0ppa55d.c
Posted Apr 30, 2003
Authored by Xpl017Elz | Site inetcop.org

Local root exploit for Qpopper v4.0.x poppassd that utilizes the ability to set the smbpasswd path.

tags | exploit, local, root
SHA-256 | ce5f5d341e016678062e1b6bd29ac00f6270e383375a46773cf0166a0247087f
qpoppassd.txt
Posted Apr 30, 2003
Authored by Xpl017Elz | Site inetcop.org

INetCop Security Advisory #2003-0x82-016 - Qpopper v4.0.x poppassd, the utility that allows users to change their mail passwords, is setuid root and allows for a definable path to smbpasswd. In doing so, a local attacker can easily escalate to root privileges.

tags | advisory, local, root
SHA-256 | 20cb7ad78ee34a4462fc2669a4d2d11d3fe2de2037bd5095118d7d9b3abee361
0x82-Remote.54AAb4.xpl.c
Posted Apr 18, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

FreeBSD and OpenBSD remote Samba v2.2.x call_trans2open i386 buffer overflow exploit. Tested against OpenBSD 3.0 and FreeBSD 4.6.2-RELEASE with Samba v2.2.x. Includes support for target brute forcing. Information about the vulnerability is available here.

tags | exploit, remote, overflow
systems | freebsd, openbsd
SHA-256 | f677c9d6fb78104c365cb38722fea0540f263fc2adf56d38ded0fbb35c2f2573
0x82-Remote.XxxxBSD_passlogd.xpl.c
Posted Apr 10, 2003
Authored by Xpl017Elz | Site inetcop.org

Remote exploit for the buffer overrun found in passlogd on FreeBSD and OpenBSD. Tested against OpenBSD 3.0 and FreeBSD 4.6.2.

tags | exploit, remote, overflow
systems | freebsd, openbsd
SHA-256 | 2d99af360fcfbd0f1ef67c210707772b3603b3c56e48592f450d174014eaef3f
0x82-Remote.passlogd_sniff.xpl.c
Posted Apr 3, 2003
Authored by Xpl017Elz | Site inetcop.org

Remote exploit for the buffer overrun found in passlogd. Target list includes four flavors of Linux with more to come.

tags | exploit, remote, overflow
systems | linux
SHA-256 | 37b269945b84e22d48de5f5d785c67d39f7bf09b5346f96a621bc6647022fc26
passlogd.txt
Posted Apr 3, 2003
Authored by Xpl017Elz | Site inetcop.org

A buffer overrun exists in passlogd, the passive syslog capture daemon, in the parse.c code.

tags | exploit, overflow
SHA-256 | 187f1c045d7ee8745a0af71546b8d5dde0458959b31d7fdf3347f791fc3439c7
outblaze.txt
Posted Mar 17, 2003
Authored by Xpl017Elz

Outblaze web based email is vulnerable to user cookie spoofing that will allow an attacker to retrieve a user's password.

tags | exploit, web, spoof
SHA-256 | 27cb8401290217c09af3cc57b0eac1a72004aee543b0d3820828ddb0cc9e207b
kebi.txt
Posted Mar 17, 2003
Authored by Xpl017Elz

INetCop Security Advisory #2002-0x82-013 - The Kebi Academy 2001 Web Solution suffers from a basic directory traversal vulnerability which may allow remote attackers to execute code on the server.

tags | exploit, remote, web
SHA-256 | 852fd7f68269e8865c32455952d42b80d4eef0257eeec6af4e85f898aa68088d
0x82wsmp3.c
Posted Nov 30, 2002
Authored by Xpl017Elz | Site x82.i21c.net

WSMP3 Remote root exploit for Linux which spawns a shell on tcp port 36864.

tags | exploit, remote, shell, root, tcp
systems | linux
SHA-256 | 57112fc81196d3600ccb7974526081a3e031497f7e9f23ee4acbb08d4f5269db
zeroobug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-004 - Various buffer overflow vulnerabilities exist in Zeroo HTTP Server v1.5. Remote linux exploit included to gain root privileges.

tags | exploit, remote, web, overflow, root, vulnerability
systems | linux
SHA-256 | a3c4fb3627efc81e628826beed19110486973e4f8ac5a7bd42bc897ce5b93c6a
libhttpdbug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-003 - LibHTTPD, a utility that can be used to add basic web server capabilities to an application or embedded device, is vulnerable to a buffer overflow which allows remote attackers to gain root access to the system.

tags | exploit, remote, web, overflow, root
SHA-256 | 42b98d2d9176568731b8e14b52d0f6712290e40350893e64b5996c712275747a
lightwebug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-002 - A buffer overflow in Light HTTPd version 1.0 allows for remote attackers to grab a shell or perform related activities as the webserver uid.

tags | exploit, remote, overflow, shell
SHA-256 | 4394e54d71505d1fce1d0784dbc84067ece93adfb1a1d1cad4e863b4f87b14c9
Tinywebug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-001 - A directory traversal vulnerability has been found in Tiny HTTPd 1.0. Basic exploitation is documented.

SHA-256 | a49d55847f0e0b697cc4797e61934daffcf7b2aaf646fca37369ef068a3705ce
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close