what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files

Putty Beta 0.67 DLL Hijacking
Posted Jul 1, 2016
Authored by Sachin Wagh

Putty version Beta 0.67 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2016-6167
SHA-256 | d37787462e07856730caa0a55900c211e74f847320655af0ae9140840680050f

Related Files

PuTTY ssh_agent_channel_data Integer Overflow
Posted Jun 8, 2017
Authored by Tim Kosse

PuTTY versions prior to 0.68 suffer from an ssh_agent_channel_data integer overflow heap corruption vulnerability.

tags | exploit, overflow
advisories | CVE-2017-6542
SHA-256 | 01e34d1eeb4771600c59ed6fed2a9ba72439204dcc18f929f87585e682764827
Putty 0.67 Cleartext Password Storage
Posted Nov 20, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Putty version 0.67 suffers from a cleartext password storage vulnerability.

tags | exploit
SHA-256 | a4b558cb058d373d64fd9a962f8e99c45d1bc763e1fd110e0f9da5a1fe8e8b50
Putty 0.66 DLL Hijacking
Posted Mar 2, 2016
Authored by Stefan Kanthak

Putty version 0.66 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 6ecc050cc5542e802afc59207ebcccd15ab0c528cfed7516506202381da1151d
Putty 0.64 Denial Of Service
Posted Jun 15, 2015
Authored by 3unnym00n

Putty version 0.64 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 652c615b9065b861d6a2decdaf69220e6037de132a76a0adf1f2e4980881b8f2
PuttyRider DLL Injection
Posted Dec 10, 2014
Authored by Adrian Furtuna

PuttyRider is a tool for performing dll injection of Putty and allows an attacker to inject Linux commands.

tags | tool
systems | linux, windows
SHA-256 | bb2aff4d5efeedd4fc7a1ff7409ce816d924a12199aff5cc690c5f3162c74011
PuTTY 0.62 Heap Overflow
Posted Aug 6, 2013
Authored by Gergely Eberhardt

PuTTY versions 0.62 and below suffer from an SSH handshake heap overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2013-4852
SHA-256 | e29077b43031296e74b1211a81e961e5d6dfe9cf8695d7e7b120536e82fc21a0
Putty 0.60 Denial Of Service
Posted Dec 25, 2011
Authored by Level

Putty version 0.60 null pointer denial of service exploit.

tags | exploit, denial of service
SHA-256 | c0e5d6fed8a39f92e5fe93389c056c8233af29be9277250b0220f8dccc1f7f2e
PuTTY 0.60 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

PuTTY version 0.60 DLL hijacking exploit.

tags | exploit
SHA-256 | 0bf025dd1119e3646f5ccf42df4b502bca4bf9d0449fea49cf34ebe8e59c4f4f
PuTTy.exe <= v0.53 Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a buffer overflow in the PuTTY SSH client that is triggered through a validation error in SSH.c.

tags | exploit, overflow
advisories | CVE-2002-1359
SHA-256 | 3d08e7e926040b742d0f0b1cf93d564f5b332381a4aafc299a4a7cf7242db491
PuttyHijackV1.0.rar
Posted Aug 1, 2008
Authored by Brett Moore | Site insomniasec.com

PuttyHijack is a proof of concept tool that injects a dll into the Putty process to hijack an existing, or soon to be created, connection. This can be useful during penetration tests when a windows box that has been compromised is used to SSH/Telnet into other servers. The injected DLL installs some hooks and creates a socket for a callback connection that is then used for input/output redirection. It does not kill the current connection, and will cleanly uninject if the socket or process is stopped.

tags | exploit, proof of concept
systems | windows
SHA-256 | 76638a2bf29bf449a398893790d01602a562f5a3b12f15a2683f50a4e6412ef4
putty056.txt
Posted Oct 28, 2004

PuTTY 0.56 fixes a serious security hole which can allow a server to execute code of its choice on a PuTTY client connecting to it.

tags | advisory
SHA-256 | 6665e8ecfa2ead715a3f5e65e4d4b2a25432c9051dca08b0ede08eb93fe32630
putty-advisory.txt
Posted Aug 5, 2004
Authored by Daniel De Luca, Laura Nunez, Carlos Sarraute | Site coresecurity.com

Putty client versions below 0.55 suffer from a flaw that allow for arbitrary code execution.

tags | advisory, arbitrary, code execution
SHA-256 | 856165b9a1019d82da170dc548b0101ac9b2f7a3ed57d807f51a58edcb9bc56c
puttypower.cpp
Posted May 15, 2003
Authored by Hi_Tech_Assassin

Putty v0.52 and below remote exploit which poses as an ssh daemon and will bind cmd.exe on port 31337 of the victim sshing inbound. Tested against Windows XP and 98SE.

tags | exploit, remote
systems | windows
SHA-256 | eafb21d90b54269b8a8b5aba1dbea160f82668e29aadfa66c25daf5443e53fc9
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close