what you don't know can hurt you
Showing 1 - 13 of 13 RSS Feed

Files

Putty Beta 0.67 DLL Hijacking
Posted Jul 1, 2016
Authored by Sachin Wagh

Putty version Beta 0.67 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2016-6167
MD5 | 0025991c724b53b62c07e5f231a94e4e

Related Files

PuTTY ssh_agent_channel_data Integer Overflow
Posted Jun 8, 2017
Authored by Tim Kosse

PuTTY versions prior to 0.68 suffer from an ssh_agent_channel_data integer overflow heap corruption vulnerability.

tags | exploit, overflow
advisories | CVE-2017-6542
MD5 | f8c6fafa56469fea00ed681d01e21b33
Putty 0.67 Cleartext Password Storage
Posted Nov 20, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Putty version 0.67 suffers from a cleartext password storage vulnerability.

tags | exploit
MD5 | 3ef307b21a6fc467cf09f4f4bd2be17b
Putty 0.66 DLL Hijacking
Posted Mar 2, 2016
Authored by Stefan Kanthak

Putty version 0.66 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
MD5 | 692cab11caddc43f284b30f19c017f42
Putty 0.64 Denial Of Service
Posted Jun 15, 2015
Authored by 3unnym00n

Putty version 0.64 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 44cbca6958caef71709317b6247f4687
PuttyRider DLL Injection
Posted Dec 10, 2014
Authored by Adrian Furtuna

PuttyRider is a tool for performing dll injection of Putty and allows an attacker to inject Linux commands.

tags | tool
systems | linux, windows
MD5 | 6fbc12f018da7a4933bc2aab95d19a58
PuTTY 0.62 Heap Overflow
Posted Aug 6, 2013
Authored by Gergely Eberhardt

PuTTY versions 0.62 and below suffer from an SSH handshake heap overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2013-4852
MD5 | c841cb43581bedebf7bc74034e1b9a52
Putty 0.60 Denial Of Service
Posted Dec 25, 2011
Authored by Level

Putty version 0.60 null pointer denial of service exploit.

tags | exploit, denial of service
MD5 | 3271b87d227673d7a62251ddb754096f
PuTTY 0.60 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

PuTTY version 0.60 DLL hijacking exploit.

tags | exploit
MD5 | 71bc7ed3b3420f3a61daacadca111795
PuTTy.exe <= v0.53 Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a buffer overflow in the PuTTY SSH client that is triggered through a validation error in SSH.c.

tags | exploit, overflow
advisories | CVE-2002-1359
MD5 | 65ee1cd53af36dfa1d31dcd33abf4058
PuttyHijackV1.0.rar
Posted Aug 1, 2008
Authored by Brett Moore | Site insomniasec.com

PuttyHijack is a proof of concept tool that injects a dll into the Putty process to hijack an existing, or soon to be created, connection. This can be useful during penetration tests when a windows box that has been compromised is used to SSH/Telnet into other servers. The injected DLL installs some hooks and creates a socket for a callback connection that is then used for input/output redirection. It does not kill the current connection, and will cleanly uninject if the socket or process is stopped.

tags | exploit, proof of concept
systems | windows
MD5 | 03b47e35a515d93ba711dea00d84ba5d
putty056.txt
Posted Oct 28, 2004

PuTTY 0.56 fixes a serious security hole which can allow a server to execute code of its choice on a PuTTY client connecting to it.

tags | advisory
MD5 | 90fc3823961fadf8492205f905db3eb3
putty-advisory.txt
Posted Aug 5, 2004
Authored by Daniel De Luca, Laura Nunez, Carlos Sarraute | Site coresecurity.com

Putty client versions below 0.55 suffer from a flaw that allow for arbitrary code execution.

tags | advisory, arbitrary, code execution
MD5 | 031610ab69b910612eebb07fdf17a6bf
puttypower.cpp
Posted May 15, 2003
Authored by Hi_Tech_Assassin

Putty v0.52 and below remote exploit which poses as an ssh daemon and will bind cmd.exe on port 31337 of the victim sshing inbound. Tested against Windows XP and 98SE.

tags | exploit, remote
systems | windows, xp
MD5 | 2206764e00e116039f1aa555975291d6
Page 1 of 1
Back1Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close