exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

eIQ-LM-3.txt
Posted Jul 28, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.

tags | exploit, remote, overflow
advisories | CVE-2006-3838
SHA-256 | 2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984

Related Files

EXP_OmniHTTPd.BAT
Posted May 19, 2004
Authored by CoolICE

Remote exploit for OmniHTTPd versions 3.0a and below.

tags | exploit, remote
SHA-256 | 10a187c64b2c3812f3886a960408b6c725c3e5e4e0c7b49ebb7470c071cdf861
monit41.pl
Posted May 11, 2004
Authored by Shadowinteger

Remote exploit for Monit 4.1 that uses connect back shellcode. This exploit makes use of a buffer overrun when an overly long username is passed to the server.

tags | exploit, remote, overflow, shellcode
SHA-256 | 9115921f367182e04c2a327689c0ea998acdbb7ffeb7313c0e4390f4bba7e4da
sasserftpd.c
Posted May 11, 2004
Authored by mandragore

Remote exploit for the Sasser worm ftpd server that spawns on port 5554.Targets included for Windows XP and 2000. Note: To use this against Sasser.e, change the port to 1023.

tags | exploit, worm, remote
systems | windows
advisories | CVE-2003-0533
SHA-256 | fe6e7139ffe5455305da5e52b63eeb8d4a419766258966ceb2ef0016e7cbe63e
win_msrpc_lsass_ms04-11_Ex.c
Posted May 9, 2004
Authored by houseofdabus, froggy 3s

Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server. Ported to compile properly on Linux.

tags | exploit, remote, overflow
systems | linux, windows
SHA-256 | de64cd542848869101fd0295b16efedcc16a5d8fa502380d2df58defde723411
4nalb.pl
Posted May 5, 2004
Authored by adil

Remote exploit that makes use of a file inclusion vulnerability in 4nalbum module version 0.92. To use, you must change the retrieve URL to point to a script that binds a shell to port 1234 of the server.

tags | exploit, remote, shell, file inclusion
SHA-256 | 3a7ac4cceaeef914f10ea4087f7dad06d55ce85def6e4463349e310e545c3d38
xxchat-socks5.c
Posted May 4, 2004
Authored by vade79

X-Chat versions 2.0.8 through 1.8.0 remote exploit that makes use of a buffer overflow in the SOCKS-5 proxy code. Successful exploitation binds a shell to port 7979.

tags | exploit, remote, overflow, shell
SHA-256 | 2fee8170f90a051fd47c72f81150fec692e3bf4fac546c3cd394c69c90bc8001
04252004.ms04011lsass.c
Posted May 1, 2004
Authored by sbaa

Remote exploit for the Lsasrv.dll RPC buffer overflow. To make this exploit work remotely you have to use the sbaaNetapi.dll which modifies the DsRoleUpgradeDownlevelServer API.

tags | exploit, remote, overflow
SHA-256 | c155fee77b812701dd4efb98b8ad352943a5fa4ca64edab679c6ddefca7a2e45
HOD-ms04011-lsasrv-expl.c
Posted May 1, 2004
Authored by houseofdabus

Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server.

tags | exploit, remote, overflow
systems | windows
SHA-256 | b67594dc0860e55e0a2dbb1361ffe68073b8564d93f740595e75b36e19a82e49
hsftpexpl.tgz
Posted May 1, 2004
Authored by priestmaster | Site priestmaster.org

HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.

tags | exploit, remote
SHA-256 | 0f0b1134f526e9e119a43dac0a36550ab2c1495e9c627acdb6f4557b53503898
plem.tar.gz
Posted May 1, 2004
Authored by BlackAngels | Site blackangels.it

Perl Loadable Exploiting Module (PLEM) is an advanced module for Perl programming that provides a list of common functions for local and remote exploit coding.

tags | remote, local, perl
SHA-256 | 59990e1585e8a43db707953bdaf4a443fe2cfb007fbeb1b8f7770a1e56900e07
JetRoot_pl.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.

tags | exploit, remote, web, root
systems | linux, windows
SHA-256 | 2313f6c8c3680934ff278d70f97559a0358c9851c286921cd3a616b0ad3e2749
Exch.pl
Posted Apr 19, 2004
Authored by Securma Massine

Kinesphere Corporation Exchange POP3 e-mail gateway remote exploit that makes use of a buffer overflow.

tags | exploit, remote, overflow
SHA-256 | aa21d34e23c056c9250ad35d4abf58eeff4391ebca64ff0ac12966a256d74237
Phorum347SQL.pl
Posted Apr 18, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

Remote exploit that makes use of a SQL injection vulnerability in Phorum version 3.4.7.

tags | exploit, remote, sql injection
SHA-256 | 9f4cf79038884aae5dcd94f78963562f26d6d2bddc3d43b27874e515c90298cb
305monit.c
Posted Apr 12, 2004
Authored by Nilanjan De, Abhisek Datta | Site eos-india.net

Monit versions 4.2 and below remote exploit that makes use of a buffer overflow in the handling of basic authentication. Binds a shell to port 31337.

tags | exploit, remote, overflow, shell
SHA-256 | ba0446ecc2f07da2a2e4e121bf6475f2fd33ff6fdc434504fec164c267d88c3d
emule4x.pl
Posted Apr 11, 2004
Authored by Kingcope

eMule versions 0.42d and below remote exploit that makes use of the buffer overflow in the DecodeBase16() function. Tested against Windows XP SP1 and Windows 2000 SP4.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 3593a07b9342dcd9a1d5535855246fa52ec72837d95266e930d2d5157c286cdb
priv8lcd44.pl
Posted Apr 9, 2004
Authored by Adriano Lima | Site priv8security.com

Remote exploit that makes use of overflows in versions 0.4.4 and below of LCDproc's daemon.

tags | exploit, remote, overflow
SHA-256 | 88025a702af48e6df6a33abdefbf654f1a43d47098fb37126af799e9e62b42d0
vz-eSignal76.pl
Posted Mar 26, 2004
Authored by insect | Site viziblesoft.com

Remote exploit for eSignal versions 7.6 and 7.5 that downloads and executes a file.

tags | exploit, remote
SHA-256 | 4de8ee1d043050fc6b60d8d9e1cf57973ba65d5c71d9339504b1035fc27cfc36
xp_ws_ftp_server.zip
Posted Mar 23, 2004
Authored by Hugh Mann

Remote exploit for Ipswitch WS_FTP server version 4.0.2.EVAL that makes use of a buffer overflow in the STAT command.

tags | exploit, remote, overflow
SHA-256 | e993fa25947b8629ad5a12de268189a00ea40196ac545b8061e970e085a73b11
chromeboom.zip
Posted Mar 19, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote exploit that causes a server crash in Chrome versions 1.2.0.0 and below.

tags | exploit, remote
SHA-256 | dcf8df6f24acf38d664322e4c28369904c5ff6469a4572a3985c4476cc1af158
mdaemon-exploit.c
Posted Mar 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Remote exploit for MDaemon Mail Server versions 6.52 to 6.85 that makes use of a buffer overflow in its raw message handler. This exploit has only been tested on Windows XP Home and Pro Edition (Dutch) SP1.

tags | exploit, remote, overflow
systems | windows
SHA-256 | f2ad6f0382c6310f3658254e54ad15974683f2ce8e29ff239c7888bb1e7b02fd
unrfs-poc.zip
Posted Mar 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote exploit for the Unreal game engine for Windows, MacOS, and Linux that makes use of a format string bug. This proof-of-concept is a proxy server able to modify the Unreal packets in real-time allowing the insertion of %n into the class names sent by the client to the server causing the remote crash. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.

tags | exploit, remote
systems | linux, windows
SHA-256 | 87f327452ec46e6b01fe3b3812aa44923bf4c03bcf59360267ddca9d1b307e79
anubis-crasher.pl
Posted Mar 5, 2004
Authored by Ulf Harnhammar

Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.

tags | exploit, remote, overflow
SHA-256 | 6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
oseen_shoutcast.c
Posted Mar 4, 2004
Authored by jsk | Site oseen.org

SHOUTcast version 1.9.2 remote exploit with connect back code. Written for Slackware 8.1, 9.0, 9.1, and RedHat 7.2.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | 4871cfddef91c577c554b14dfdaf2472474b595033fe12ccb112b6a54d289e32
wftpd.c
Posted Mar 3, 2004
Authored by security team 0seen

Remote exploit for WFTPD server. Tested against WFTPD Pro server version 3.21.1.1 on Windows 2000 CN SP4.

tags | exploit, remote
systems | windows
SHA-256 | 36efa8521fe6d42fba082e0c14015fe3be98a3a0ad14ca3a9df03000a85bc69b
psoproxy-exploit.c
Posted Feb 25, 2004
Authored by Johnny Mast | Site rosiello.org

Remote exploit that makes use of a buffer overflow during GET requests in the PSOProxy server version 0.91. This version support the following operating systems: Windows XP Home Edtion SP1, Windows XP Pro Edtion SP1, Win2k Pro Edtion.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 62202900b3384ce959dde0cd62c292867091c117c07c81cfffbd72ae412dbd85
Page 4 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close