exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 73 RSS Feed

Files

varitas.solaris.txt
Posted Nov 22, 2001
Authored by Echo8

Veritas Volume Manager 3.0.x for Solaris contains a security hole which can, under specific circumstances, allow local users to gain root access. Exploit description included.

tags | exploit, local, root
systems | solaris
SHA-256 | fd2319ff0e16f1c6e713fa56b2101950213939c45121c340cc789350ca38aee3
bobek.c
Posted Dec 6, 2000
Authored by Venglin | Site b0f.freebsd.lublin.pl

Bobek.c is a Wu-Ftpd 2.6.0 remote root exploit (updated 05/08/2000). Bug is in the SITE EXEC command, an account is not required as anonymous access is enough. Tested against Redhat 6.2, FreeBSD 3.4-STABLE, and FreeBSD 5.0-CURRENT.

tags | exploit, remote, root
systems | linux, redhat, freebsd
SHA-256 | 271153fe402f54217a98ff64ba5860d7b6059482b6a0d067654ec98d32bd7b48
ex_winproxy.c
Posted Nov 14, 2000
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

Shadow Penguin Security Advsory #37 - WinProxy 2.0.0/2.0.1 (now known as Black Jumbo dog) contains many remotely exploitable buffer overflows. Exploit for the POP3 service included, tested on Japanese Windows98.

tags | exploit, overflow
SHA-256 | 78e8de82cf9348d47c5825f12d48e94baa226fdb5c9e134cadcd9e5e315b39a4
proxy.dos
Posted Aug 2, 2000
Authored by Sectorx | Site xorteam.cjb.net

Many HTTP proxies are vulnerable to a denial of service attack because they do not timeout connections to a remote host, causing the proxy to run out of available sockets and start refusing connections. Tested against Delegate 6.1.13. Exploit code included.

tags | exploit, remote, web, denial of service
SHA-256 | a9552173fc6e379e7810ac0699fb84188c3ccbf628f94952e2b66c5ae4c71603
0006-exploits.tgz
Posted Jul 13, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for June, 2000.

tags | exploit
SHA-256 | b9beb14bb1630d1c47ede46f314307cec981f00cfcfcef042e7f7f4cfe6940ce
wuXploit.tgz
Posted Jul 1, 2000
Authored by WC

Wu-Ftpd 2.4.2, 2.5, and 2.6 are commonly misconfigured on linux to allow users which only have a valid FTP account to execute code. This code takes advantage of this configuration, mentioned in SUID Advisory #1 to execute a backdoor on the remote host.

tags | exploit, remote
systems | linux
SHA-256 | 9219f3dc8c4357646bf46266ad5c55bda0e603191ef80f27186b4ccf5fb83945
smallhttp.py
Posted Jun 30, 2000
Authored by Prizm

Small HTTP Server v. 1.212 remote dos attack written in python. See USSR Advisory #47

tags | exploit, remote, web, python
SHA-256 | 11c239d025641221ada67a8d32f1ccac084f73043f688e12cde0d50bb4474059
dragonftp.py
Posted Jun 30, 2000
Authored by Prizm

Dragon Server(ftp) v1.00 and 2.00 remote dos exploit written in python.

tags | exploit, remote, python
SHA-256 | 161f1c0a962d27fd9ff4d56e9ddfef936d703b88db55129895e32136299af0d8
ie5.force-feed.txt
Posted Jun 29, 2000
Site malware.com

Microsoft Internet Explorer 5 and accompanying mail and news clients on win95, win98 and win2000 enjoy a unique status in that they choose to ignore user input. This document will show you how to manually force a file onto the target computer despite all prompts and warnings. Demonstration available here.

tags | exploit
systems | windows
SHA-256 | 7ee1f183e67576845d5933f7a7c1c7ed4d66b3108afe965dc0696834b71ac633
wingate.py
Posted Jun 29, 2000
Authored by Prizm

Wingate.py is a dos exploit for Qbik wingate 3.0. Connects to tcp port 2080 and sends 2000 characters, causing all wingate services to crash. Origional bug found by eEye.

tags | exploit, tcp
SHA-256 | afd3c1b45990cec90d6d28919ea835f444a7fef236f733a9dc69806fde9832f3
ie5-access2000.txt
Posted Jun 29, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #14 - Internet Explorer 5.01 and Access 2000 allow executing programs when viewing a web page or HTML email message. This allows taking full control over user's computer. Access 2000 allows executing VBA code which has access to system resources and in particular executing files. Includes exploit code which silently opens and executes VBA code from Access 2000. Demonstration available here.

tags | exploit, web
SHA-256 | fe568442ae8f90da9486762f3cbbcbf6148ba69298f95dfc55f9dce550ddbebf
ie5-excel-powerpoint.txt
Posted Jun 29, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #13 - Internet Explorer 5.01, Excel 2000 and PowerPoint allow executing programs when viewing a web page or HTML email message via insecure ActiveX controls. This allows taking full control over user's computer. Demonstration available here.

tags | exploit, web, activex
SHA-256 | f41e05939819ebcc5e580519c20fa7f242ed21f010334bb9e1e5c4204510a020
imbof102.txt
Posted Jun 29, 2000
Authored by Blue Panda | Site bluepanda.box.sk

iMesh 1.02 builds 116 and 177 for Windows are vulnerable to a buffer overflow that can be exploited to execute arbitrary code. Once iMesh connects to a server, it begins listening on a TCP port (varies). An attacker can connect to this port and cause an overflow which will overwrite EIP, effectively redirecting the flow of execution.

tags | exploit, overflow, arbitrary, tcp
systems | windows
SHA-256 | 7e6502a1050bf172ba5bec4d156f3a8bc7a2d4a1cece70a84fffcb07c167cf9c
sawmill-5.0.21.txt
Posted Jun 29, 2000
Authored by Larry W. Cashdollar | Site vapid.betteros.org

Sawmill 5.0.21 is a site log statistics package for UNIX, Windows and MacOS which has remote vulnerabilities. Any file on the system can be read, and password is stored with a weak hash algorithm and can be decrypted using the included C program. This is dangerous because the previous security hole will allow you to read the hash and decrypt the admin password.

tags | exploit, remote, vulnerability
systems | windows, unix
SHA-256 | 2c2c58f021857e688f36ad471178bf0306d758fc5829abf90f77a22c58174057
isc-dhcpd.exploit.txt
Posted Jun 27, 2000
Authored by Todd T. Fries

The ISC dhcp client contains a remote root hole. If the DHCP server gives out addresses containing backticks, shell commands can be run on the clients.

tags | exploit, remote, shell, root
SHA-256 | eef34ca1565e47d927a25f800efe9a7431b1dbae5b0b5733ac6817b7b74dc94f
leafchat.dos
Posted Jun 27, 2000
Authored by Wizdumb | Site mdma.za.net

Java source to remotely crash LeafChat clients.

tags | exploit, java
SHA-256 | 111817cbf650dae4d8d9a1dcd33e4c66c71ecc474ea139cbb49939ee45e73755
glftpd.privpath.txt
Posted Jun 27, 2000
Authored by Raymond Dijkxhoorn

Glftpd 1.18 through 1.21b8 has a serious problem with the privpath directives. Users with accounts can access directories on the site which they should not have access to.

tags | exploit
SHA-256 | 447c8a95b7dd4d4d1f722081716ea2532f24a35d179abdb468144e471fc765c9
netscape.netware.txt
Posted Jun 27, 2000
Authored by Vigilante | Site vigilante.com

Netscape Enterprise Server for Netware 5.0 and Netware 5.1 contain remote vulnerbailities. By issuing a malformed URL it is possible to cause a denial of service situation and/or execute arbitrary code on the server with the privileges of the web server.

tags | exploit, remote, web, denial of service, arbitrary
SHA-256 | 87b98315b06d4cb218a9eb746cb54ba814c7a256db807a3dd35fbfaddd3befa1
xfwm_bof.c
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xfwm buffer overflow exploit for Linux / x86. This will give you a euid=0 shell if /usr/X11R6/bin/xfwm is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
SHA-256 | 43eac56faef522e18d373dc452cee020f39fd7369f6f0bda40e910c89734352f
xwhois_bof.c
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xwhois buffer overflow, for Linux x86. This will give you a euid=0 shell if /usr/X11R6/bin/xwhois is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
SHA-256 | cd3e6d87b5d6caa673ead4be3dac43675e7efaff01e57544d0ab5add0bd7a2fc
exim.c
Posted Jun 26, 2000

exim local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 6c2ff838baf8851b374d45600a8b07c39ab9e3e947db5aeab59f0b03a3e099d8
iisdos.c
Posted Jun 26, 2000
Authored by WC

iisdos.c is a dos attack against Microsoft Windows 2000.0 running IIS.

tags | exploit
systems | windows
SHA-256 | 3a5391689ea601a5d266aaa724384ad438a4b0e2bd5af92c61ad494be825bb70
prlnx.sh
Posted Jun 26, 2000
Authored by Wojciech Purczynski

Sendmail & procmail & kernel less than 2.2.15 local root exploit.

tags | exploit, kernel, local, root
SHA-256 | 4296222d1bf1930105daa59e2a5114c9af90add47c2081575d64f3a6d4215ae3
smlnx.sh
Posted Jun 26, 2000
Authored by Wojciech Purczynski

Linux kernel 2.2.X (X<=15) & sendmail less than or equal to 8.10.1 local root exploit shell script.

tags | exploit, shell, kernel, local, root
systems | linux
SHA-256 | 3b67ba848976793933d8e5cb6e27c246ec4bf7b79874530a6a791c5581d9d695
2dopewars_exploits.txt
Posted Jun 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Dopewars 1.47-current has two local security holes. Dopewars is SGID games. Remote buffer overflows also exist.

tags | exploit, remote, overflow, local
SHA-256 | 0f42ff1b37e66d07b86bb87e247d94963fa74c6ecd4315816a593792519e5108
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close