exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

eIQ-LM-3.txt
Posted Jul 28, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.

tags | exploit, remote, overflow
advisories | CVE-2006-3838
SHA-256 | 2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984

Related Files

savant31remote.txt
Posted Feb 2, 2005
Authored by Mati Aharoni, Tal Zeltzer

Remote exploit for a buffer overflow vulnerability Savant Web Server 3.1 that allows for remote code execution by sending a malformed HTTP request.

tags | exploit, remote, web, overflow, code execution
SHA-256 | 879bb95f484a5ae79c71b373fa76693e14558c6f822ed39c731fc778c00110ad
gbook.tgz
Posted Jan 25, 2005
Authored by Robert Molnar

MPM Guestbook Pro remote exploit that performs arbitrary command execution and local file upload.

tags | exploit, remote, arbitrary, local, file upload
SHA-256 | 8fa4ecc8f4bf22735a4a28510742a044cea289c4ca55a8b239f9e934bbb92f54
pmc.pl.txt
Posted Dec 31, 2004
Authored by sysbug

Remote exploit for phpMyChat 0.14.5 that adds an administrative account.

tags | exploit, remote
SHA-256 | 7411ee8518fab68a41d30bfd0f3a94f3fa20cc9fdda22d29b84c18d9b0cd26c4
e107.pl.txt
Posted Dec 31, 2004
Authored by sysbug

e107 remote exploit that makes use of an unsanitized include().

tags | exploit, remote
SHA-256 | cd5aada48bdc5a139e6392fe6b608c74e14b107752b6f4d4ebbbaf991a51b73a
kreedexec.zip
Posted Dec 12, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote exploit for Kreed versions 1.05 and below that suffer from format string error, denial of service, and server freeze flaws.

tags | exploit, remote, denial of service
SHA-256 | 2c1ad57a838694f28a0578b571f486e9794175f13eab0b0421ad03831649f766
ex_MERCURY2.c
Posted Dec 12, 2004
Authored by John H. | Site secnetops.com

Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server. Second version loaded with 14 types of attacks.

tags | exploit, remote, overflow, imap
SHA-256 | 710886be64bb7fff70903561833230b2e7ba604b91496598106c7e46d700926f
ex_MERCURY.c
Posted Dec 11, 2004
Authored by John H.

Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.

tags | exploit, remote, overflow, imap
SHA-256 | 1992e2ec6ee91bec2e209f5d8942e15e93e225cd81bc0a56fc5540e11094d323
IPSWSFTP-exploit.c
Posted Dec 11, 2004
Authored by NoPh0BiA

Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.

tags | exploit, remote, shell
SHA-256 | 0e9f16d2eb219cb6649d8a93058aceadd447cca259e088bba13b7e2bcf6a5f46
phpnews.txt
Posted Dec 11, 2004
Authored by ruggine

Simple remote exploit for the SQL injection vulnerability discovered in PHPNews.

tags | exploit, remote, sql injection
SHA-256 | c5de8860494ec9c6c1f6fd843c7a558b1fee55f076ab1a36f0363084f66befb4
b4b0-phpbb.tgz
Posted Nov 24, 2004
Authored by evilrabbi

PhpBB v1.0.0 - 2.0.10 remote exploit which takes advantage of a bug in admin_cash.php. Opens a back door on a tcp port.

tags | exploit, remote, php, tcp
SHA-256 | 759e1b3c1fd320dbe0d222403ebfadaef07dc4d09e204984eb5cd514f21054bc
mailtraq-update.txt
Posted Nov 24, 2004
Authored by Travis Schack

Mailtraq Version 2.6.1.1677 remote exploit which allows SYSTEM level access while using the Mailtraq administration console. Requires a Mailtraq admin account.

tags | exploit, remote
SHA-256 | 9363a24390dc5f166823eede37366696be7abfad27c632dc5627567f22951267
IPSwitch-IMail-8.13-DELETE.pl
Posted Nov 20, 2004
Authored by Mati Aharoni, Zatlander | Site whitehat.co.il

Remote exploit for the IPSwitch-IMail 8.13 stack overflow in the DELETE command. Successful exploitation binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 34486ab358c7f8793e3c20cec33de6a9c6baf7c1e07b04a872a23d2c482b2059
InternetExploiter.html.gz
Posted Nov 4, 2004
Authored by SkyLined

InternetExploiter.html is a remote exploit for the IE IFRAME html tag buffer overflow vulnerability which binds a shell to tcp port 28876. Tested against IE 6.0 on Win XP SP1 and IE 6.0 on Win2k.

tags | exploit, remote, overflow, shell, tcp
systems | windows
SHA-256 | 0ecca01eb05bab171b33265b3ea3ac3e0cd2cac3fc0ae02350d422d833d55e3f
ability.c
Posted Oct 27, 2004
Authored by muts

Ability FTP server 2.34 FTP STOR buffer overflow remote exploit that spawns a shell on port 4444 upon successful exploitation.

tags | exploit, remote, overflow, shell
SHA-256 | 39dfb200bb55c2fb0fffdc3697970f7ee2ba3f62c21c2adfd4d3a5f4996de5a8
zinfexploit.c
Posted Oct 1, 2004
Authored by Delikon, Luigi Auriemma | Site delikon.de

Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.

tags | exploit, remote
systems | windows
SHA-256 | e80d2409b6e269d59edd99db2b19a5529b757d7eb1f822c75d015ee3aba48dbb
JpegOfDeathAll.c
Posted Sep 29, 2004
Authored by M4Z3R

GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes. This even-moreso enhanced version also has the ability add a user to the administrative group and can perform a file download.

tags | exploit, remote
advisories | CVE-2004-0200
SHA-256 | 20c93c78772b0990144751c09236f2b8c235714fcc01bac6f35dc0c88f2dc37a
JpegOfDeath.c
Posted Sep 29, 2004
Authored by John Bissell A.K.A. HighT1mes

GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes.

tags | exploit, remote
advisories | CVE-2004-0200
SHA-256 | d8355ee0ee39e0020db08761e80e8dc97cb432c9a970c1cd4a0d88cdb50b417c
neb-private.c
Posted Sep 9, 2004
Authored by haker haker

Private version of the remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Support for Red Hat 7.1, 7.2, 7.3, SuSE 8.0, Debian, Slackware 8.0, 9.0.0, 9.1.0.

tags | exploit, remote, overflow
systems | linux, redhat, suse, slackware, debian
SHA-256 | 0288e222e92a3ec340ab792060fffc178ba5bce0ce2bdd19260c5dc60893692b
dlinkdown.c
Posted Aug 31, 2004
Authored by anonymous

Remote exploit that will change an IP address for the D-Link DCS-900 IP camera, due to the fact that it listens for a 62976/udp broadcast packet telling it what IP address to use without any authentication.

tags | exploit, remote, udp
SHA-256 | 80731a57a2cea9ecb8dd3acadf07b2de5a77b44a1815266951ba9d93b953b1aa
neb-citadel.c
Posted Aug 31, 2004
Authored by haker haker

Remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Successful exploitation adds an account in /etc/passwd.

tags | exploit, remote, overflow
SHA-256 | 49c652bb47321274ba36227f601c86fc98a4cb2b83fcc5e9942bc5c64a9773ad
TSSA-2004-012.txt
Posted Jun 29, 2004
Site http.tinysofa.org

A remote exploit has been discovered in the Apache 2.0.49 HTTP server which allows an attacker to cause the server to allocate increasing amounts of memory until system memory is exhausted or until process limits are reached.

tags | advisory, remote, web
SHA-256 | d52c9414d2197f648b3d31a6f01f66b36cd2811cf96502d02d2519eb5d7614b1
rlprd.py.exploit
Posted Jun 25, 2004
Authored by Andrew Griffiths | Site felinemenace.org

Remote exploit that makes use of a format string vulnerability in rlpr version 2.x.

tags | exploit, remote
SHA-256 | 671d9ed33356c2438a4c4a70a5e1e61d2e6b9186125af05bd345ee60f4144974
priv8ibserver.pl
Posted Jun 9, 2004
Authored by Priv8 Security Research | Site Priv8security.com

Remote exploit for Borland Interbase 7.1 SP2 and below that spawns a shell under the uid running the database. Targets included for Linux Interbase 7.1 SP 2 and Linux Interbase 6.01 InterBaseSS_LI-V6.0-1.i386.rpm.

tags | exploit, remote, shell
systems | linux
SHA-256 | 5d817a11e46cbba76ba13cffc204517f20ed0ba8ab02ea224660d23758ad1bc5
subexp.c
Posted Jun 7, 2004
Authored by Gyan Chawdhary

Subversion 1.0.2 remote exploit that makes use of a stack overflow in the svn_time_from_cstring() function. Binds a shell to port 36864. Tested against RedHat 8.0 Psyche build.

tags | exploit, remote, overflow, shell
systems | linux, redhat
SHA-256 | d02b1feccebffc24878e8b25042a2f7c26807f4574998ffb926f8c0216c55f63
metaexpl.tgz
Posted May 26, 2004
Authored by priestmaster | Site priestmaster.org

Metamail remote exploit that makes use of a buffer overflow and upon successful exploitation, binds a listening socket to UDP/13330 awaiting shellcode. Affected versions: 2.2 through 2.7.

tags | exploit, remote, overflow, udp, shellcode
advisories | CVE-2004-0104, CVE-2004-0105
SHA-256 | 4b90ebafdf1d434a218d36dfbf9b51ff8ab8e7a904b5b69a39f31b140b267ee8
Page 3 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close