exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files

7350854.c
Posted Feb 22, 2002
Authored by scut | Site team-teso.net

7350854 - x86/bsd telnetd remote root exploit which takes advantage of the AYT buffer overflow. Tested against BSDI BSD/OS 4.1, NetBSD 1.5, FreeBSD 3.1, FreeBSD 4.0-REL, FreeBSD 4.2-REL, FreeBSD 4.3-BETA, FreeBSD 4.3-STABLE, and FreeBSD 4.3-RELEASE.

tags | exploit, remote, overflow, x86, root
systems | netbsd, freebsd, bsd
SHA-256 | 042fbb8216e3f92fad1e57df03d06a841a1450db42a5c0124584533b112dc627
aimrape.tar.gz
Posted Oct 4, 2001
Authored by Tony Lambiris | Site sec.angrypacket.com

Aimrape is a remote denial of service exploit for AOL Instant Messenger (AIM) v4.7.2480 and below.

tags | exploit, remote, denial of service
SHA-256 | c17d8ee6398376f4d724d76f59aaa21ddccf273248b5f1d0ea64858425f4c21c
maj1944-xpl.pl
Posted Sep 28, 2001
Authored by Nemes||y

Majordomo v1.94.4 local exploit in perl. Binds a shell to port 1234 with uid=Majordomo.

tags | exploit, shell, local, perl
SHA-256 | 3a1bfea6bba3d9ea6fd7f66f9211de9ecce5dbe5b859d9ffa9613bbeeeb45ced
majordomo.1.94.4.txt
Posted Sep 19, 2001
Authored by Marco van Berkum | Site ws.obit.nl

Majordomo v1.94.4 contains vulnerabilities which allow local users to obtain a uid=majordomo shell.

tags | exploit, shell, local, vulnerability
SHA-256 | f73ece74f87e2fff78d541fca10443ea2833f826616305f86792de0c8030f123
oracle.9i.path.txt
Posted Sep 19, 2001
Authored by KK Mookhey

The Oracle 9i Application Server uses the Apache web server for HTTP service. However, if a request is made for a non-existent .jsp file, the complete path is shown.

tags | exploit, web
SHA-256 | 7664fb9699f9153f8a29bd25293535535a769474ec51aaf0571f6595ea53e20b
km.pl
Posted Sep 12, 2001
Authored by Paul Godfrey

Kazaa and Morpheus remote denial of service exploit in perl - Floods the server using non-rate limited shared folder connections.

tags | exploit, remote, denial of service, perl
SHA-256 | fad2ef1d6bd1b6f628e4df197195a0a3e50c0c953de697287632b21c00b8e1d3
rdC-cr2abuse.tgz
Posted Sep 11, 2001
Authored by venomous | Site rdcrew.com.ar

A code red mass fix/abuse tool.

tags | exploit
SHA-256 | 440b46e44ac239053727c665adfcf7a7c038fef3ee72cbc011b1cc58bba8decb
DoSadsl812.java
Posted Sep 11, 2001
Authored by Magnetic

Denial of service attack against a 3com ADSL 812 router in Java. Resets the router without any password, as described here.

tags | exploit, java, denial of service
SHA-256 | d2792e361535aff3141ac4bf948fa9e4f4c5ce5511f168232427b077a1eb4325
cso.c
Posted Sep 11, 2001
Authored by hhp, Ben Schultz | Site hhp-programming.net

Cso.c is a remote exploit for cgicso included with cgiemail 1.6. Tested on Slackware Linux 7.1 running Apache 1.3.20.

tags | exploit, remote
systems | linux, slackware
SHA-256 | 8d232fa0a2687a8c7dc294c61bb1c84b0a1be65bdeb8565fa7f6f9fa693a87cb
qpopper.pl
Posted Sep 3, 2001
Authored by Nemes||y

Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.

tags | exploit, remote, perl
systems | linux, redhat
SHA-256 | 552b77283bca7bfe71ead2e26048f4a7c53545e50aaf62baa7867718bbf668db
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close