exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 90 RSS Feed

Files Date: 2003-03-01 to 2003-03-31

aH1.zip
Posted Mar 11, 2003
Authored by r-22 | Site manshadow.org

aH scans for open NetBIOS shares on a system and reports them to the user in an easy to use copy and paste format utilizing the net command. C++ source code and binary included.

SHA-256 | 6b6ec6734f6ea1fae45a630818c442c80c7db1c4bf275d75159dcff75fed94de
cpanel.exe
Posted Mar 11, 2003
Authored by SPAX | Site spabam.tk

Remote CGI exploit written in Perl for Cpanel 5 Guestbook. Spawns a bash shell with the uid of the webserver. Windows version. Warning: Use this binary at your own risk.

tags | exploit, remote, shell, cgi, perl, bash
systems | windows
SHA-256 | 6b94af34f927331d86b03d701534fcd53fc85dcaded9fca70821ecfdfa6e7123
postnuke723.txt
Posted Mar 11, 2003
Authored by Pokleyzz | Site scan-associates.net

Postnuke v0.723 has SQL injection and directory traversal vulnerabilities which allow an attacker to view directories and perform remote command execution.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | c7174c9efaf63c50640a797daaf52e208c587ea7527c490209c5b8d8130f87bc
s0h_Win32hlp.c
Posted Mar 11, 2003
Authored by ThreaT | Site s0h.cc

Win32hlp exploit for the :LINK overflow that traps a .CNT file with arbitrary code that once downloaded will execute without a user being prompted for verification. Tested against Windows 2000 PRO/SERVER SP0/SP1/SP2.

tags | exploit, overflow, arbitrary
systems | windows
SHA-256 | 4a9d7740766726256679babfae4710b20451e06922ced940aa5e2331fab55f08
DSR-unreal.c
Posted Mar 11, 2003
Authored by Rave | Site dtors.net

Local exploit for Unreal IRC daemon 3.2.

tags | exploit, local
SHA-256 | e50479b8ae3686d516f7edd3b95bdd081d79cb14541fca5c08905c7229d76008
DSR-toppler.pl
Posted Mar 11, 2003
Authored by Knud Erik Hojgaard | Site dtors.net

Local exploit to get gid of games for toppler.

tags | exploit, local
SHA-256 | dafe4a741510221ea6c66764660c6cb121ba22750610c8274faa4a3558e27179
JempiScodes-0.4r1.tgz
Posted Mar 11, 2003
Authored by Matias Sedalo | Site shellcode.com.ar

Polymorphic Shellcode Generator - In Spanish. This tool was written to mask the final function of shellcode in exploits. Tested on Linux, FreeBSD, OpenBSD, and NetBSD.

tags | shellcode
systems | linux, netbsd, freebsd, openbsd
SHA-256 | 8791ddbd0def68d52be402a2277d183d94f283e1ed7ac8aa7b826d5f00110219
cryptelf.c
Posted Mar 11, 2003
Authored by Slacko

A simple ELF binary encryption tool for Linux that encrypts the .text part of an ELF file with the password being given as an argument.

tags | encryption
systems | linux
SHA-256 | 1777c3839840816aef4069dcfdb183463ba353c5bb7c384b9bbfea62bcde1611
iss.sendmail.txt
Posted Mar 10, 2003
Site xforce.iss.net

ISS Security Advisory - A remote root vulnerability has been discovered in Sendmail v5.79 to 8.12.7 in the crackaddr() function which is used to parse headers. This vulnerability is especially dangerous because the exploit can be delivered within an email message and the attacker doesn't need any specific knowledge of the target to launch a successful attack.

tags | advisory, remote, root
SHA-256 | a777b9ea2ee630fe2497afce3a91ff81fed5df586e37de4d937c084f3d483e7f
Internet Security Systems Security Brief March 3, 2003
Posted Mar 10, 2003
Site xforce.iss.net

ISS X-Force has discovered a remotely exploitable buffer overflow condition in Snort. Snort is an open source intrusion detection system. A buffer overflow flaw exists in Snort RPC preprocessing code that is vulnerable to attack.

tags | remote, arbitrary, root
SHA-256 | bc99632cf2915e3fd09192db51188d45a561de0df9f9c62671d14df80a1747b9
RHSA-2003:039-06.im
Posted Mar 10, 2003
Site redhat.com

Red Hat Security Advisory RHSA-2003:039-06 - The Internet Message (IM) Package that comes with Red Hat Linux has a vulnerability in the way two IM utilities create temporary files. Anticipating the names used to create files and directories stored in /tmp, it may be possible for a local attacker to corrupt or modify data as another user. Vulnerable versions include 7.0, 7.1, 7.2, 7.3, and 8.0.

tags | local
systems | linux, redhat
SHA-256 | f250f8b7b71beb5e702504e96b737e52c22d1cfc94d031287d32f452c11d8287
phpnuke60.txt
Posted Mar 10, 2003
Authored by Frog Man | Site phpsecure.info

PHP Nuke 6.0 is vulnerable to multiple SQL injection attacks that will allow an attacker to access member lists, show users by user ID, show moderators, show administrators, privilege escalation, and more.

tags | exploit, php, sql injection
SHA-256 | fe41573d8793ef04be219cd767b52d76999813cb7aff1ed34330fd4dc79bbdee
SCSA009.txt
Posted Mar 7, 2003
Authored by Gregory Le Bras | Site Security-Corp.org

Security Corporation Security Advisory [SCSA-009]: PHP ping, a utility that allows an end user to ping a remote machine, has a vulnerability which allows remote attackers to execute commands remotely and could lead to compromise of some, if not all, the operating system.

tags | exploit, remote, php
SHA-256 | 031b912addcb3c18b62ac88374185cd3296050827930d08e79d32eef7c10ea8c
fws160.txt
Posted Mar 7, 2003
Authored by Dennis Rand | Site Infowarfare.dk

Forum Web Server v1.60 has multiple vulnerabilities including a directory traversal that can be used to get usernames and passwords for the server and a cross site scripting vulnerability during message replies.

tags | exploit, web, vulnerability, xss
SHA-256 | c66b4e90a5ebfd225573a6e8e31055827254f3feadb7378c9169997431bc15e7
play-wav.c
Posted Mar 7, 2003
Authored by eSDee | Site netric.org

Linux x86 shellcode that plays /tmp/wav.

tags | x86, shellcode
systems | linux
SHA-256 | fb85d75711fadc267300b543395f49fba747f72fadfbbf8a0d7b72ba000d8dfd
flush.c
Posted Mar 7, 2003
Authored by eSDee | Site netric.org

Linux x86 shell code that flushes iptables.

tags | shell, x86, shellcode
systems | linux
SHA-256 | f41d98b684a98ae4ddb6475aa4b3d8dcdc3580000bb8b4a4687c7e68ac12e4f8
bsd_forking_bind.c
Posted Mar 7, 2003
Authored by eSDee | Site netric.org

BSD x86 194 byte forking portbind shellcode.

tags | x86, shellcode
systems | bsd
SHA-256 | 679460791b82bc71cc358ebb7838a48a15a4b36b0568f604d4ecd681342df6cc
linux_forking_bind.c
Posted Mar 7, 2003
Authored by eSDee | Site netric.org

Linux x86 200 byte forking portbind shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 8596f6bc924b6a977ba4454ed405e1eae9f64cab5c9f56b54386872551a9c83e
bsd-connect-back.c
Posted Mar 7, 2003
Authored by eSDee | Site netric.org

BSD x86 124 byte connect back shellcode.

tags | x86, shellcode
systems | bsd
SHA-256 | 5c802bdef5259c9a4b2a1f2cce119173bc88d78f7568286a371993d88972fcd1
connect-back.c
Posted Mar 7, 2003
Authored by eSDee | Site netric.org

Linux x86 131 byte connect back shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 2f7b6f86b4a4d840961d8bbb4ba116066ddd329e45325fc389c858403fdb8850
85deadelf.c
Posted Mar 7, 2003
Authored by Crazy Einstein

Exploit for the file(1) buffer overflow vulnerability found by iDEFENSE. When file is run upon this binary, a shell is bound to port 2003.

tags | exploit, overflow, shell
SHA-256 | 3cd39a300697230bb93932f5c217630f5baeee36b12e0e1b50ced39e0099e3be
iDEFENSE Security Advisory 2003-03-04.t
Posted Mar 7, 2003
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 03.04.03 - file(1) contains a buffer overflow vulnerability that can be leveraged by an attacker to execute arbitrary code under the privileges of another user.

tags | advisory, overflow, arbitrary
SHA-256 | b0bc52c03d39e07f508e5f796b1f47a96576b5962cd0d7585205e0f561787ed7
Mr-Lynd0v1.2.c
Posted Mar 7, 2003
Authored by click

Mr-Lynd0 is a log cleaner and an instrument to hide user or to change user and host. cleans ip user and host in log files /var/log/ and hides yourself in a linux box editing wtmp and utmp. Version 1.2 released with bugfixes.

tags | tool, rootkit
systems | linux, unix
SHA-256 | e21cfc158bbcfbd10d0c81401e527a555d73d32e71dd8746414c960227f7d356
RHSA-2003:042-07.squirrelmail
Posted Mar 7, 2003

Red Hat Security Advisory RHSA-2003:042-07 - SquirrelMail, a PHP based webmail package, has two cross-site scripting vulnerabilities. Version 1.2.10 and earlier are affected.

tags | php, vulnerability, xss
systems | linux, redhat
SHA-256 | 5290697c046ca7ec78baf41ebf073cb373b331b0808fdeae53d39737fe3ca223
shopfactory.txt
Posted Mar 7, 2003
Authored by Maarten Hartsuijker

Shopfactory e-commerce application, which is used by over 40,000 Internet sites, allows alteration of order details. Data relational to end user input is stored in cookies, including the price of the items someone may be buying, which in turn allows them to alter the prices they pay. Versions affected: 5.8 and below.

tags | advisory
SHA-256 | 25afdbad685f47b8762bafb6307e4c2348efc20108303d1e37397ab66181e0ac
Page 3 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close