OpenSSL-uzi is a semi-automatic mass rooter which uses the openssl-too-open exploit against multiple hosts.
c4db574327d2f1321e4c513c1cfb48c989b9d277b4b1761749396a56543638f6
Remote CGI exploit for Cpanel 5 in perl.
c864b0f0ff7784fee33ce3195ab44af772d87e433277a615d8f1501004dd408e
Packet Storm new exploits for March, 2002.
32475286918ca0aba5a1307b2df67c47c918182791f3ca69d42db7bd97b909e7
OpenSSH 2.9p* channel_lookup() off by one exploit. Tested against SuSE Linux 7.2 and FreeBSD 4.5-STABLE with OpenSSH 2.9p1 and p2. Based on OpenSSH-2.9p2 source.
22f4b5d77a8fba07b61ee6032eb4ea27d2d0c10191a7560bcd18f267581e391e
Sp_Quickkill scans internal networks for unpatched windows machines, IIS and SQL.
78941018e6b74e5b871aa2d827e2f6b63074c8d472f41191cea1da645ff22ae5
A vulnerability in the way the Windows versions of Apache parses batch files with cmd.exe allows remote users to execute commands on versions of Apache prior to 1.3.24 and 2.0.29-BETA. Exploit URL's included.
293d2a9d77d21cac81c421a084f317df315b0f00bb4b83525632187f46a03f22
Microsoft posted a security bulletin on this (ms99-040) way back in September 28, 1999; it is still exploitable if the html file is run from the users local disk and not from a webserver or file-share.
8ffd9671f0b9be7cb6bdf03ca7f71dbd7b5e1f5919523c3959581dcf7e7832de
UCD-snmp v4.2.1 and below remote root exploit for the long community string overflow on Linux/x86. Tested against Slackware 8.0, includes instructions for finding more offsets. Binds a shell to tcp port 10000.
eb4a50c9c0dd410d730f1d07d223ab85c80cc864aeca71b53ef5631777dff41f
PHP Nuke 5.X path disclosure vulnerability through modules.php.
449ce4c727ea19f1f0a054b166eb8e1f6d5390c8d988b1c57504ebfc6d2c717a
Ptrace2.4 is a local root exploit for linux kernels prior to v2.4.9 and 2.2.20.
e985a2a3cfca07b197336e769c86daa09d889ea8c80b3e00fc8291655c670ba1
PHP Nuke v5.5 has a cross site scripting vulnerability. Exploit information included.
ea0a2f907d32e11a8d8ea2a9d231190a234851a4b50bf5f9b2a309b314e8c10a
Hhp-qtip.c is a local root exploit for /usr/bin/tip on BSDI 4.2. Requires access to tip, usually gid(dialer).
68b298f994c8c477f0f7455e566dc8f16aa96901ae020b249e0593c73d2ca8d6
The Xerver Free Web Server v2.10 contains file disclosure and denial of service vulnerabilities. Platforms affected include Windows, Linux, BSD, Solaris, and Mac. Exploits included.
38182b4e729c84958d0fc82d0597349a14e9eea6c1efb3b69df525ff368496eb
PHP 3.0.16/4.0.2 remote root format string overflow exploit for Linux/x86. Included shellcode adds a root shell on tcp port 1524 to inetd.conf.
bd2179b0230478789cc9cadd205ee72f2c69c586fee39b3401c11b80fc6d9a40
Cygwin Windows port of the Interscan VirusWall 3.23/3.3 exploit. Ported by Luigi Grandini
05f43fdbf94156c9c364d54d64758eb6a1fced90e548b15aaf5fea66d7058250
Cygwin port of the unix port of the real own realserver exploit. Ported by Luigi Grandini
20abe8d21d2de932d57a058537ec620c0871a319d67ef7fdfe2ab4b895b10a0b
Cygwin Windows port of the Apache 1.3.x + php 4.0.6 proof of concept exploit for the multipart/form-data POST requests bug. This exploit crashes the daemon. Ported by Luigi Grandini
9bd5efd995d4a0aa8e38f318ff15ec7976b46d451ed6ced284feb168e890c768
Avirt Gateway 4.2 remote exploit ported to Windows with Cygwin.
4c988b03ba646bbf041cef1f9f6ed9edc921325d376b3df2494d4ace7440fed7
Cobalt's RAQ 4 server has three remote vulnerabilities. The service.cgi script has a cross site scripting vulnerability because it incorrectly parses the incoming searches and includes HTML tags and Javascript in the result. A directory traversal vulnerability allows attackers to read restricted files or passwords and profiles the users. In addition, a very long URL string will crash the service. Exploits included.
5ff610883de6c62b6e21a04a4afd2e050469e4e36cf69e6665831f6d3baaed70
Apache 1.3.x + php 4.0.6 proof of concept exploit for the multipart/form-data POST requests bug. This exploit crashes the daemon.
4897e0f6a9cd3079e9c2afb645eaaff987ec37ff48d79cea6eb16c6f1c26b858