Massrooter takes advantage of remote vulnerabilities in bind, PHP, lpd, rpc, wuftpd, null httpd, telnet, mail, ssl, and ssh on multiple systems.
aa4d6ef52ab74fd1b0cee5680c3fafec1a1e47fb692804c03ada64947dc1bec2
Packet Storm new exploits for October, 2002.
c394dadef1e5d41a3a806d878e95cd451b3d7c885f67066e1d8aadbda88cdf8a
Sambar Webserver v5.1 for Windows Pbcgi.exe remote denial of service exploit in perl.
66c2dd9809de121cf5ccb3188e131dad071ac8d8f94954f84d64582b1286a59b
Oracle9iAS Web Cache Denial of Service exploit in perl, as described in Atstake advisory a102802-1.
b04f91f65d13ef5a37fc7fa56dcbc09b494c14e7d26b988206b52a9aaff32e39
Solarhell is a remote root exploit shell script which abuses the Solaris /bin/login bug by using telnet. Solaris 2.6, 2.7 and 2.8 (7.0 and 8.0) is vulnerable. More information available here.
0bd999736b1b87d0e121e3d654eb28498297c1ba12b8a8a19116dde32cbdb820
Solarwinds TFTP server v5.0.55 and below remote denial of service exploit in perl.
165893e2a72b6c7b01bf0b5e59020ebd0ef42cf6184037b8c607536b68ae7f46
Virgil CGI Scanner by Mark Ruef has a vulnerability where user input is trusted without being sanitized and is actually populating bash variables which end up getting executed. Simple exploit examples are included.
d904fe4eeff1617f799ad5d492b310acc2605145158faff2c8c8a7b7a546cdac
Microsoft Internet Explorer versions 5.5 and 6.0 are susceptible to 9 attacks involving object caching. When communicating between windows, security checks ensure that both pages are in the same security zone and on the same domain. These crucial security checks wrongly assume that certain methods and objects are only going to be called through their respective window. This assumption enables some cached methods and objects to provide interoperability between otherwise separated documents.
0d493f1ee4c0342068a311e12ade60a725672891b23957e14ce2b5cbe1e6e675
Two modified versions of the slapper worm exploit made more user-friendly with simple interaction to define what host and port will be hit with the exploit.
33f0ab9cc7a39a816dbc6dddc8b1952feeb6871f5ad68e60decab4626431eb7c
Zone-Labs ZoneAlarm Pro 3.1.291 and 3.0 remote denial of service exploit which consumes all available CPU via synflooding. To fix, update to the newest zonealarm and run windows update.
2329490bcac7c86570a101a2d3d6cdd834e3f075b8ff11c4b4122ece94d2393e
AN HTTPD v1.30 to 1.41c remote heap overflow exploit written in java for Japanese Windows 2000 Pro (SP2).
167ce9e82779b5e084ff82fd83009543c8acb427e75433946e1e8bb76aabd037
Sendmail 8.11.x linux/x86 local root exploit. Uses gdb to find offsets.
97fb231f9fda1d4ce349f63e8594a891166c284dcf5ab06cb3000406b26a36b9
Web602 webserver remote denial of service exploit which uses the com1 windows flaw.
ab81b2d5aae5a6c0ecbe18c0c13997194365a98f277de5ce0d0fa049a1a34322
Web602 (Czech version) directory tree exploit.
93003a050e2c15ef1e0f6c14a2e62b6ea615d4de687dec1239970cbb346096e7
PlanetDNS v1.14 remote buffer overflow exploit which sends 6K of data to port 80 of PlanetWeb.
f9b9023362601fc0dd91c3c2596c3a5dbacc94a522db51d9b2b684122fa16bb3
Apache Tomcat 3.3 and 4.0.4 for Windows NT and 2000 remote denial of service exploit. Uses device names like AUX, LPT1, CON, and PRN to crash the server.
94c4b0af4cbf43c74551511e4b7add50079f58d7cc12c2d49c1a688a33f492bf
Kitkat.pl exploits a directory traversal bug in webMathematica v1.0.0 and 1.0.0.1.
ed213517eb41ae2eb5c3e956b331ee03c620fe4a18d9b0c0ece669e049ae58c8
GetAd.c is a new Windows 2000 local exploit which gains Local System rights on Win2k SP1-3 be taking advantage of the NetDDE window of winlogon with a shatter attack. Binaries available here.
f0ac7e8f306dbf2ad785b46866e7bf6fd5024e87b5b16c1a26b0c959a95ae2df
Internet Explorer 5.5 SP2 and Internet Explorer 6 allow the oIFrameElement.Document reference to return a document with no security restrictions, allowing remote attackers to steal cookies from any site, gain access to content in sites (forging content), read local files and execute arbitrary programs on the client's machine. Exploit HTML included which reads the client's google.com cookie. IE6 SP1 is not affected. Four demonstration exploits are available here.
edee121c0f0aa5b69ff4f7f5dfedea6a19e4da0a66f54e210fe0ff60e1f71964
Remote denial of service exploit that can be used against systems running Apache Tomcat (versions prior to 4.1.10) combined with IIS.
043c0addeb744916f1adaf2509fab1aa991eccdb5964f7da4bfc631b11bcf742
This is an exploit for AnalogX Proxy 4.10 configurations running on Windows 2000 Pro (SP2). The exploit binds a shell to port 8008 TCP.
582fa891ee5a370435743a3a0e5deb03ce954647910647760adaee22d12feaf3
Mod_ssl off-by-one bug exploitation toolkit for OpenBSD. Creates a malicious .htaccess file which replaces the apache server process with an included HTTP server.
a346c7fbb1e47b293c3ddfa1d114907bec57437d480d6713700617dd05998c97
Remote exploit for the Eudora v5.x boundary buffer overflow. Works against Eudora v5.1 and 5.1.1 and is independent of Windows version.
90633dbef55dd736ab63d71a19ed60653fd9362cdb28994ff53c4c53cd5917ab
Windows Help Buffer Overflow proof of concept remote exploit in Visual Basic 6. Starts a cmd.exe shell on Microsoft Windows XP Kernel Version 5.1.2600.0. Includes source.
88652c46f902e3a45513ed5b3621c9a85303a6fc3186232bbef5b01d5a4f5559
Linux Traceroute v1.4a5 and below local root exploit which takes advantage of a malloc chunk vulnerability. Uses gdb to find offsets.
2b8d9dac84e0f7dd993e19acd912184417a595f94fb1481ffc67eaa6c492e43e