exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 34 RSS Feed

Files

tsl_bind.c
Posted Apr 5, 2010
Authored by Gustavo Scotti, Thiago Zaninotti | Site axur.org

Bind prior to 8.2.3-REL remote root exploit - Includes instructions for finding the offset on linux. Tested against Redhat 6.1 8.2.2-P5 and Slackware. NOTE: This exploit is backdoored to also connect to 151.196.71.160 and dump information regarding the user running the exploit. User beware.

tags | exploit, remote, root
systems | linux, redhat, slackware
SHA-256 | e5d79c60f4264849e22015211b28b4291acc39f85fa920c4f0d83f91c7a2da44
0102-exploits.tgz
Posted Apr 10, 2001
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for February, 2001.

tags | exploit
SHA-256 | aca4bbcb1ac4d019878073f52314a8555fe60d3ef9f3ad76451bcd3c344d65e3
SQLExec.zip
Posted Mar 7, 2001
Authored by Egemen Tas

SQLExec v1.1 is a remote exploit for Microsoft SQL server which executes remote commands as Administrator over tcp port 1433. Requires a database sa login / password. Includes binary and source written in Visual C++ 6.0 for Windows NT/2K/9X. Note: Many AV software erroriously reports this as a trojan.

tags | exploit, remote, trojan, tcp
systems | windows
SHA-256 | e4c558f7cf992d51fa7ea68ff9978d2e8170b3783d47c6fedf307416778b0521
hhp-gdc_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | 59ac3f8c25947407d2c2124b1b923963380381d66406ef270bdd57b3c00baae5
hhp-ospf_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | b3df13e1c7b793947794b12771072086104e86b8f0f39f8f17d3b3f017cad2b0
man-cgi.txt
Posted Feb 26, 2001
Authored by Krfinisterre

Man-cgi v1.3 and v2.0 contains remote vulnerabilities which allow any file on the web server to be viewed, and some implementations allow remote command execution due to lack of filtering of hex encoded characters. Exploit URL's included.

tags | exploit, remote, web, cgi, vulnerability
SHA-256 | bde148ba24eeeaed3cbb01ed7b0992252003c4928d9ca6fd786ddf9a3fc401df
imapd_exploit.c
Posted Feb 24, 2001
Authored by Felipe Cerqueira

A remotely exploitable stack overflow has been discovered in Imapd v12.264 and below in the handling of the lsub command. Since an account is required, mail only users will be able to get shell access. Tested against Slackware 7.0, 7.1, Redhat 6.2, and Conectiva Linux 6.0. Fix available here.

tags | exploit, overflow, shell
systems | linux, redhat, slackware
SHA-256 | 2410c7335840d45d8cc28af5b2e3ca6d01c8dd7c5959b1f0099e67233e56f150
sshdexpl.diff.gz
Posted Feb 22, 2001
Authored by Paul Starzetz

Patches for Openssh-2.1.1 to exploit the SSH1 crc32 remote vulnerability.

tags | exploit, remote
SHA-256 | 4d5482a1c11fa6938554ffda52292aaf2894fd00793cdfbc28a33a512f6e94dd
ssh1.crc32.txt
Posted Feb 22, 2001
Authored by Paul Starzetz

This article discusses the recently discovered security hole in the crc32 attack detector as found in common ssh packages like OpenSSH and derivatives using the ssh-1 protocol. It is possible to exploit the crc32 hole to gain remote access to accounts without providing any password or to change login-uid if a valid account on the remote machine exists. Includes an exploit in the form of a set of patches to Openssh-2.1.1.

tags | exploit, remote, protocol
SHA-256 | cd27d3d0419edb7ada37aee549f85877335a9048bec6e6842b8c7614a5947806
cobull.c
Posted Feb 21, 2001
Authored by Sagi | Site idiotbox.co.il

Merant Micro Focus Cobol 4.1 local root exploit - Writes to /var/mfaslmf/nolicense.

tags | exploit, local, root
SHA-256 | b3e6feb09ab94e71a3134d21b92fbc379b90d55ded65c2e679fcd15a4ef25b91
exklock.c
Posted Feb 21, 2001
Authored by synnergy, Dethy | Site synnergy.net

FreeBSD X key lock (xklock) v2.7.1 and below local root exploit - Tested on FreeBSD ports collection v3.5.1 and v4.2.

tags | exploit, local, root
systems | freebsd
SHA-256 | c4dd124149e7e5bf8e081992f5222838ea736a6a2d2fb554c015d78b41490b57
ultimate-bb.txt
Posted Feb 16, 2001
Authored by Unregistered

The Ultimate Bulletin Board System allows remote users to get the username and pass of anyone that is a registered user of a ubb forum that has html enabled and uses cookies to store the username and passwords of the users.

tags | exploit, remote
SHA-256 | 9d5082efd21f409b5ad3daca83e818ef19b075ca500641904a82ae2d168d2cb3
RFP2101.txt
Posted Feb 14, 2001
Authored by rain forest puppy | Site wiretrip.net

RFP2101 - SQL hacking user logins in PHP-Nuke web portal. PHP-Nuke v4.3 contains authentication weaknesses in the SQL code which allows you to impersonate other users and retrieve their password hashes.

tags | exploit, web, php
SHA-256 | cc5049f1f163f63deea98dbb2a421e75f15ed91bb1c34e3487646b61d0d36b8d
sc.txt
Posted Feb 14, 2001
Authored by Echo8

Vulnerabilities in Sun Clustering v2.x - Leaks sensitive information to local and remote users and has tempfile bugs. Includes proof of concept exploits.

tags | exploit, remote, local, vulnerability, proof of concept
SHA-256 | dbeee965b3c61658c3bfd723ca3b21434d825f52fb5c0fbb7d1c989dca5d5abd
scx-sa-14.txt
Posted Feb 14, 2001
Authored by Root-dude | Site securax.org

Securax Security Advisory #14 - Symantec pcAnywhere 9.0 contains a remote denial of service vulnerability. Includes perl exploit.

tags | exploit, remote, denial of service, perl
SHA-256 | f3aabfbdc4849e9d23de5fa5090f05eb0635dac8a1a39400e0f58a1b0dcc758a
urdls.c
Posted Feb 14, 2001
Authored by vade79, realhalo | Site realhalo.org

Urdls.c is an unreadable directory lister for listing files in directories on the local machine without having permission to do so. Guesses all possible alphanumeric filenames and uses stat() to check for existence.

tags | exploit, local
SHA-256 | 29bcbbdb8adad6126d66e865af9c6707e7c5b9e2bfeb2bf05da25629f38551de
dc20exp.c
Posted Feb 14, 2001
Authored by Mray

Dc20ctrl local exploit for FreeBSD - exploits a call to getenv() in session.c giving a gid=dialer shell.

tags | exploit, shell, local
systems | freebsd
SHA-256 | 66bd4c24f5f56a75a4d1f6950e5eda0d35c0338ec42daeabfc61f4b912e0f790
Netscape.Publisher.ACL.txt
Posted Feb 12, 2001
Site netscape.com

Netscape Enterprise Server 3.5.1 (Publisher) has a problem with the default ACL settings that could allow an intruder to view/download "non-public" files in the web root.

tags | exploit, web, root
SHA-256 | 7a62731a05028e001f32f9d4c8e75d4140a036bb3958b1acba24163c1b5f6704
Infobot-0.44.5.3.txt
Posted Feb 12, 2001
Authored by Samy Kamkar | Site pdump.org

Infobot v0.44.5.3 and below contains vulnerabilities which allow remote users to execute commands due to an insecure open call.

tags | exploit, remote, vulnerability
SHA-256 | 9e668c912d9b544d8575c377bcbc9d85a1e5518c52ad1d6000d9621425787cad
p-smash.c
Posted Feb 12, 2001
Authored by Paulo Ribeiro

P-smash.c is an exploit that uses 50 percent of the CPU on windows 98 machines and causes windows 95 machines to slow down by sending ICMP type 9 code 0 packets.

tags | exploit
systems | windows
SHA-256 | ea8fd6e6dba3e554137d2f69ab652d216dcf5e70d827859208049f7e32a99736
bind8x.c
Posted Feb 10, 2001
Authored by Ix, Lucysoft

Bind prior to 8.2.3-REL remote root exploit - exploits the named INFOLEAK and TSIG bug. Includes shellcode for Linux. Slightly broken.

tags | exploit, remote, root, shellcode
systems | linux
SHA-256 | 034cca5e2df8deb3c0e4e7f8e10041e5a69ac9dbe3534447eecc3a643245711b
bugtraq.c
Posted Feb 6, 2001
Authored by Count Neithardt von Gneisenau

Bugtraq.c is an exploit for the Bind tsig bug which has been crippled somewhat. Tested against Slackware 7.0.

tags | exploit
systems | linux, slackware
SHA-256 | 76a57df25b9052d61775586136f76374287faa9aa43d5da33294c2b0e828877f
defcom.easycom.txt
Posted Feb 2, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-06 - The Easycom/Safecom print server from I-Data International contains multiple vulnerabilities that allow a malicious user to bring down the print server. Execution of arbitrary code is also possible. Tested against Easycom/Safecom, firmware v404.590.

tags | exploit, arbitrary, vulnerability
SHA-256 | d22d8ee0925169a7a2b0a8f0219d7d8ba6ec919d7f13cb955973d4c2a20942ee
frel-1.0.beta.tgz
Posted Feb 2, 2001

Frel-1.0 is a modified version of fragrouter, used to evade NIDS. The frag proxy can run on the same machine as the attacker. It can also run in partial takeover mode, so that the fragmented attack stream seems to be coming from another active machine on the same physical subnet. The neighbor machine runs normally except for the ports being used by attacker. Mods by Lorgor

tags | exploit
SHA-256 | 3ce2bd68b9e2c26ebb95e921e451a302f1fc2d38d553446e801d9ffa8b41bcb3
defcom.netscape-fasttrack.txt
Posted Feb 2, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-05 - Netscape Fasttrack Server 4.1 for Windows NT 4.0 has problems with its caching module. The problem can result in remote users consuming all the server memory and causing the server to perform very sluggishly.

tags | exploit, remote
systems | windows
SHA-256 | ca08e2925071628845b708a73a9352fb7f6254f780bc277635749cdf7755c9bc
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close