exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2002-11-30

0x82wsmp3.c
Posted Nov 30, 2002
Authored by Xpl017Elz | Site x82.i21c.net

WSMP3 Remote root exploit for Linux which spawns a shell on tcp port 36864.

tags | exploit, remote, shell, root, tcp
systems | linux
MD5 | d511e3b41688c8eb1d3e2e07d7e128d4
hack.pl
Posted Nov 30, 2002
Authored by teso, Sebastian Krahmer | Site team-teso.net

Suidperl v5.00503 and others tmp race local root exploit.

tags | local, root
MD5 | 8041a1da62bd891ae9e65c3a2871a6c2
7350pippi.pl
Posted Nov 30, 2002
Authored by teso

7350pippi is a x86/Linux ipppd local root exploit.

tags | x86, local, root
systems | linux
MD5 | 0c635de06e7fd0738cf3c235e1b74c8c
7350lapsus.pl
Posted Nov 30, 2002
Authored by teso

7350lapsus is a lpr-3.0.48 Local root exploit. Requires root on a host counted in hosts.lpd and local account on lpd box. This is proof of concept, chown()ing /etc/passwd to a user named 'stealth'.

tags | local, root, proof of concept
MD5 | 85d373c856befc7da5b6d2727b6291af
rootprobe.sh
Posted Nov 30, 2002
Authored by Sebastian Krahmer | Site team-teso.net

Modprobe shell metacharacter expansion local root exploit for Red Hat 7.x and SuSE 7.x.

tags | exploit, shell, local, root
systems | linux, redhat, suse
MD5 | 28b219ae719f042d7c7ce6eac9ef28bd
ex_pfinger.c
Posted Nov 30, 2002
Authored by Dvdman

Pfinger v0.7.8 and below local root exploit. Tested on Red Hat 7.2 - 8.0, Debian 3.0, Slackware 8.0, FreeBSD-4.6 and OpenBSD-3.1.

tags | exploit, local, root
systems | linux, redhat, freebsd, slackware, openbsd, debian
MD5 | b0bba19c112e81b8775fde89fcc0dc1a
mdklinuxconf.c
Posted Nov 30, 2002
Authored by Pokleyzz

Mandrake 8.2 linuxconf local root exploit.

tags | exploit, local, root
systems | linux, mandrake
MD5 | e617b71655e152bbee80aa2767e49ca1
scalpel.c
Posted Nov 30, 2002
Authored by Sebastian Krahmer | Site team-teso.net

Local apache/PHP root exploit via libmm (apache-user -> root) temp race exploit. Spawns a root shell from the apache user.

tags | exploit, shell, local, root, php
MD5 | dcffeb448888592287ff24ca6be0c617
imap4.c
Posted Nov 30, 2002

Redhat 7.0 remote buffer overflow exploit for IMAP4rev1 prior to v10.234.

tags | exploit, remote, overflow
systems | linux, redhat
MD5 | 3dd9c868ec269c63686555a75456a4a3
traceroute-exploit.c
Posted Nov 30, 2002
Authored by Carl Livitt

Nanog traceroute v6.0 to 6.1.1 local root stack overflow exploit. Tested on SuSE 7.1, 7.2, 7.3 & 8.0, and should work on 7.0 and 6.x.

tags | exploit, overflow, local, root
systems | linux, suse
MD5 | fd1b29e427bd7740cdb7f11217170d38
banshee-3.0.tar.gz
Posted Nov 30, 2002
Authored by phish | Site blakhat.co.uk

Banshee is a fast lightweight mass scanner. Banshee can integrate with other tools like queso or xprobe to extend functionality. Features include port/rpc scanning, easily search-able logging, banner grabbing and more.

tags | tool, scanner
systems | unix
MD5 | 872693c51c896850d10c5f37ecfc3b5e
CS-2002-04
Posted Nov 30, 2002
Site cert.org

CERT Quarterly Summary CS-2002-04 - Popular vulnerabilities being exploited by attackers these days include an Apache/mod_ssl worm, OpenSSL bugs, Trojan horse sendmail, libpcap, and tcpdump, multiple BIND bugs, and a heap overflow in Microsoft MDAC.

tags | worm, overflow, trojan, vulnerability
MD5 | b577896ae5b0e164f58fb07ec0cc609e
CA-2002-34.xfs
Posted Nov 30, 2002
Site cert.org

CERT Advisory CA-2002-34 - The Solaris X Window Font Service (XFS) daemon (fs.auto) on Solaris 2.5.1 - 9 contains a remotely exploitable user nobody buffer overflow on Sparc and X86. More information available here.

tags | overflow, x86
systems | solaris
MD5 | e6268b7f2e6e9e048615738ffeb05c49
pjam3.rar
Posted Nov 30, 2002
Authored by Cys

Pjam3 is an effective UDP packet flooder for windows. 50 times faster than pjam2, up to 50mb/s.

tags | denial of service, udp
systems | windows
MD5 | d13396ea19099b3642cfa7a2f49662e5
ms02-066
Posted Nov 30, 2002
Site microsoft.com

Microsoft Security Advisory MS02-066 - Six new vulnerabilities were discovered in IE 5.01, 5.5 and 6.0 including a three bugs that allow remote attackers to view any file on the system or run executables, a PNG buffer overrun, information disclosure, read temp files with cookie info.

tags | remote, overflow, vulnerability, info disclosure
MD5 | 70dcd68a4c3da75be7889b9317b4f921
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    3 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close