exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 34 RSS Feed

Files

SLA-16.MasterIndex.txt
Posted Oct 11, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-16 - Synnergy Labs has found a flaw within Master Index for Linux/UNIX that allows a user to successfully traverse the filesystem on a remote host, allowing arbitary files/folders to be read. Exploit URL included. Fix available here.

tags | exploit, remote
systems | linux, unix
SHA-256 | a23909da35478f6a2095d6d342fb63d5f4accfbcc2879f4add37f28616e828c3

Related Files

Linux x86 TCP Reverse Shell
Posted Jul 27, 2017
Authored by wetw0rk

97 bytes small Linux/x86 reverse tcp shell shellcode with no NULLs.

tags | shell, x86, tcp, shellcode
systems | linux
SHA-256 | 6801867647c5ecbb5ecf15fe7b1a8a49fcccea11b3d22d816db0d2b742be766c
chmod 777 Slash Shellcode
Posted Jan 26, 2013
Authored by srm

21 bytes small chmod 777 / shellcode.

tags | shellcode
SHA-256 | f084a88e9abaa409f286d6479e022b0cdd812c3a196ea7f9be00c6b654820eb5
Slang Media Group Shell Upload
Posted Oct 30, 2011
Authored by indoushka

Slang Media Group suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 61c1d727c518f81b93a815a9c97f5692be7d46ebae32f7f1f5ce839f9a7092aa
Slaed CMS Code Execution
Posted Sep 12, 2011
Authored by brain[pillow]

Slaed CMS suffers from remote code execution vulnerabilities. OpenSlaed version 1.2 and Slaed CMS versions 4.x and below are affected.

tags | exploit, remote, vulnerability, code execution
SHA-256 | 60fed3b05ec97637ccc2352accc1d71142b4a7d67845e30cdb90cdd1fc5dd758
SLADS CMS SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

SLADS CMS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1181a6378cdbd8c699f00da9336a6ab7e0f7615782e38c9172c9bed29e568158
SLAAC Attacks On Microsoft Windows
Posted Apr 5, 2011
Site resources.infosecinstitute.com

InfoSec Institute security researcher Alec Waters has just released a new article on SLAAC Attacks. The basic premise is to use the default network configuration found on all Windows 7 (as well as Server 2008, Vista) installations to intercept and hijack all network traffic without any user knowledge or interaction.

tags | advisory
systems | windows
SHA-256 | e1c03a921b59cbcd99bb1635a0ef48f9cb08480612e4b545e77fedf777b7cdab
Slaed CMS 4 RFI / Shell Upload
Posted Feb 28, 2010
Authored by indoushka

Slaed CMS version 4 suffers from remote file inclusion, shell upload, and other vulnerabilities.

tags | exploit, remote, shell, vulnerability, code execution, file inclusion
SHA-256 | b03842dce48333f95f84a3e7c4c7b03388ea883b39749a1a5fa6bf4a7193bfba
SLAED CMS 2.0 XSS / Backup
Posted Jan 4, 2010
Authored by indoushka

The Arabic version of SLAED CMS version 2.0 suffers from cross site scripting and backup related vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 1b5f266412210a6fc519b330f13ee674bea02e443a4009a2cd0dd7a50e2cf3ff
Slayer 2.4 Buffer Overflow
Posted May 27, 2009
Authored by SuNHouSe2

Slayer version 2.4 skin related universal buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 92e18cc23172a6658e6dd445b347a9a5b8f3bb6c5b839e03fcded7e09781b775
slackfire-0.65.d-noarch-1.tgz
Posted Sep 22, 2008
Authored by Mikhail Zotov | Site slackfire.berlios.de

SlackFire is an firewall script implemented with iptables. It is completely configurable via a CLI, as all configuration is performed via configuration files. It supports all kinds of packet forwarding, including NAT, NAT with port redirection, and forwarding to machines with routable IP addresses. The configuration files are heavily commented, and messages in the log file are as informative as possible.

tags | tool, firewall
systems | linux
SHA-256 | def2a24655e984a0d8d8a6ef179909ed8a952ecef095fa1f7042b15b22f55fac
slaed-lfi.txt
Posted Jan 24, 2008
Authored by The_HuliGun

SLAED CMS version 2.5 Lite suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | af400b87370b956274750ff712748b1b64e9a1745e6ac4676cce456d143ac66a
slaed-rfi.txt
Posted Apr 2, 2007
Authored by Hasadya Raed

SLAED_CMS_2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 8bdf179637bfe3e3e2e646fecba4d7f699db347129c7603f7692d635f1d98211
SLAB500.txt
Posted Mar 22, 2006
Authored by Justin_T

Due to insufficient sanity checking, SLAB500 suffers from arbitrary file read and full path disclosure vulnerabilities.

tags | advisory, arbitrary, vulnerability
SHA-256 | c8283285aefa40bf1a23e474f42d3e425a89f332c06952c023e0683e1409899d
slad2-1.0.tar.gz
Posted Jan 15, 2006
Authored by lgrunwald | Site dn-systems.org

System Local Audit Daemon can run standalone or managed by systems like IBM-Tivoli, HP-OpenView, or Nessus to perform local security checks. It runs on the target hosts and enables them to call security tools like John the Ripper, Tiger, Tripwire, or a virus scanner via a unified XML interface. It is part of the BOSS Project.

tags | local, virus
systems | unix
SHA-256 | 49144aaa097f8d0f0c2697e4989e92d751c5a10db6c89eff5cf883382c58ab22
slammer
Posted Aug 26, 2002

Slammer binary for SunOS. If rpcinfo says they

tags | bbs
systems | solaris
SHA-256 | d909a3b96414ea3e1013739c0c1be9d8717edc805a06aff0e3e518cbbc5ac09c
slang.zip
Posted Aug 26, 2002

BBS Slang

tags | bbs
SHA-256 | 0116ece81e0ccddf09b966f728482c729498f303a94c5f32195f2fec777ccb38
slackware.init.txt
Posted Jul 18, 2001
Authored by Josh

Slackware 8.0 local root exploit - Creates a suid shell when "modprobe lp" is run from the startup scripts.

tags | exploit, shell, local, root
systems | linux, slackware
SHA-256 | b8b095012e691aba701cd6577f74f4427437ebc53c5be9b4cc9758dc3d3cfeeb
slackware.man.c
Posted Jul 18, 2001
Authored by Zen-Parse, Josh, Lockdown

Slackware 8.0 and below ships with /var/man/cat* chmodded 1777, making it vulnerable to symlink attacks. This exploit creates a suid shell with the UID of the user running man.

tags | exploit, shell
systems | linux, slackware
SHA-256 | 0fb25cf68a4fba71eceef2ca23db4efbe592af7e1416b2d13051e5e4b6990a46
slackware.pine.txt
Posted Nov 14, 2000
Site slackware.com

Slackware Security Advisory - Pine 4.21 and below contains remote vulnerabilities. Upgrade to at least Pine 4.30.

tags | remote, vulnerability
systems | linux, slackware
SHA-256 | 9b969c6ac82ffea290161611e9b42207e6f66a62f417de73c296ad690c63b908
SLA-17.Anaconda.txt
Posted Oct 15, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-17 - A flaw in Linux/UNIX Anaconda Foundation Directory, a yahoo style search engine based on the Open Directory Project allows remote users to traverse the webservers filesystem, allowing arbitary files to be read by appending a trailing NULL byte in URL encoded format. Exploit URL included.

tags | exploit, remote
systems | linux, unix
SHA-256 | 114471e6a48ade395cf5dd9910cfbb9ebc5b97960e372c164656001a5ddd2840
SLA-15-PHPix.txt
Posted Oct 10, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

PHPix, a Web-based photo album viewer written in PHP has a vulnerability which allows remote users to traverse directories and read any file on the server. Exploit URL included. Fix available here.

tags | exploit, remote, web, php
SHA-256 | e4419820f11faed3b78317f5462ba2159447f498e8b203f34e98a29ecac583bc
slackware.wuftpd.txt
Posted Oct 6, 2000
Site slackware.com

Slackware Security Advisory - Wu-ftpd version 2.6.0 has a remote root hole in it. Upgrade to version 2.6.1.

tags | remote, root
systems | linux, slackware
SHA-256 | f4c05db6315d143fbaaf2f0b26c1d45ca2251c59d6c6289431c39597f229591c
tco.txt
Posted Sep 22, 2000
Authored by synnergy, Dethy | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-14 - The BSD/Linux telnet client has a stack overflow which is not usually a security problem, except in the case of a restricted shell environment which allows users to set environment variables and run telnet. Perl proof of concept exploit included.

tags | exploit, overflow, shell, perl, proof of concept
systems | linux, bsd
SHA-256 | edc44b44131a6f19bee4f950cce7723477469f167ee3406d25923487214db406
slackware.xchat.txt
Posted Sep 20, 2000
Site slackware.com

Slackware Security Advisory - Xchat has an input validation bug which allows remote command execution.

tags | remote
systems | linux, slackware
SHA-256 | 30dc8aac1f0ccab4ffb1e0ba8491d2439abe3a70956951c5f2cf47f52ecaed0e
slackUp.tar.gz
Posted Jun 29, 2000
Site xfactor.itec.yorku.ca

slackUp is a Slackware auto-upgrade utility. It will download upgrades to the programs you currently have installed on your system from the slackware-current tree. No user interaction required. Just type the command, go for a coffee break, and after a reboot, your system should be upgraded. Until the Slackware team comes up with an official auto-upgrade utility, slackUp will hopefully help fill in for it. This will make your slackware system much more secure.

systems | linux, slackware
SHA-256 | 3f286e777b0746bd01c925bbb30f98d7dd8404f6427d0f54a2afb4d7fa31bba1
Page 1 of 2
Back12Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close