exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files

openssl-uzi.tar.gz
Posted Apr 1, 2003
Authored by Harden

OpenSSL-uzi is a semi-automatic mass rooter which uses the openssl-too-open exploit against multiple hosts.

tags | exploit
SHA-256 | c4db574327d2f1321e4c513c1cfb48c989b9d277b4b1761749396a56543638f6
cpanel-VH.pl
Posted Feb 24, 2003
Authored by CaMaLeoN

Remote CGI exploit for Cpanel 5 in perl.

tags | exploit, remote, cgi, perl
SHA-256 | c864b0f0ff7784fee33ce3195ab44af772d87e433277a615d8f1501004dd408e
0203-exploits.tgz
Posted Apr 2, 2002
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for March, 2002.

tags | exploit
SHA-256 | 32475286918ca0aba5a1307b2df67c47c918182791f3ca69d42db7bd97b909e7
osshchan.tgz
Posted Mar 29, 2002
Authored by Morgan

OpenSSH 2.9p* channel_lookup() off by one exploit. Tested against SuSE Linux 7.2 and FreeBSD 4.5-STABLE with OpenSSH 2.9p1 and p2. Based on OpenSSH-2.9p2 source.

tags | exploit
systems | linux, freebsd, suse
SHA-256 | 22f4b5d77a8fba07b61ee6032eb4ea27d2d0c10191a7560bcd18f267581e391e
sp_quickill.zip
Posted Mar 25, 2002
Authored by Roelof Temmingh | Site sensepost.com

Sp_Quickkill scans internal networks for unpatched windows machines, IIS and SQL.

tags | exploit
systems | windows
SHA-256 | 78941018e6b74e5b871aa2d827e2f6b63074c8d472f41191cea1da645ff22ae5
Apache.Win32.txt
Posted Mar 22, 2002
Authored by Ory Segal

A vulnerability in the way the Windows versions of Apache parses batch files with cmd.exe allows remote users to execute commands on versions of Apache prior to 1.3.24 and 2.0.29-BETA. Exploit URL's included.

tags | exploit, remote
systems | windows
SHA-256 | 293d2a9d77d21cac81c421a084f317df315b0f00bb4b83525632187f46a03f22
DLA-18-03-2002.txt
Posted Mar 20, 2002
Authored by Gollum

Microsoft posted a security bulletin on this (ms99-040) way back in September 28, 1999; it is still exploitable if the html file is run from the users local disk and not from a webserver or file-share.

tags | exploit, local
SHA-256 | 8ffd9671f0b9be7cb6bdf03ca7f71dbd7b5e1f5919523c3959581dcf7e7832de
ucd-snmp.c
Posted Mar 14, 2002
Authored by Jove

UCD-snmp v4.2.1 and below remote root exploit for the long community string overflow on Linux/x86. Tested against Slackware 8.0, includes instructions for finding more offsets. Binds a shell to tcp port 10000.

tags | exploit, remote, overflow, shell, x86, root, tcp
systems | linux, slackware
SHA-256 | eb4a50c9c0dd410d730f1d07d223ab85c80cc864aeca71b53ef5631777dff41f
phpnukeEKO.txt
Posted Mar 14, 2002
Authored by Patryk K. | Site nyshock.hypermart.net

PHP Nuke 5.X path disclosure vulnerability through modules.php.

tags | exploit, php
SHA-256 | 449ce4c727ea19f1f0a054b166eb8e1f6d5390c8d988b1c57504ebfc6d2c717a
ptrace-dark.c
Posted Mar 13, 2002
Authored by Darknessx

Ptrace2.4 is a local root exploit for linux kernels prior to v2.4.9 and 2.2.20.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | e985a2a3cfca07b197336e769c86daa09d889ea8c80b3e00fc8291655c670ba1
php-nuke.5.5.css.txt
Posted Mar 13, 2002
Authored by Ravish | Site hackergurus.tk

PHP Nuke v5.5 has a cross site scripting vulnerability. Exploit information included.

tags | exploit, php, xss
SHA-256 | ea0a2f907d32e11a8d8ea2a9d231190a234851a4b50bf5f9b2a309b314e8c10a
hhp-qtip.c
Posted Mar 13, 2002
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Hhp-qtip.c is a local root exploit for /usr/bin/tip on BSDI 4.2. Requires access to tip, usually gid(dialer).

tags | exploit, local, root
SHA-256 | 68b298f994c8c477f0f7455e566dc8f16aa96901ae020b249e0593c73d2ca8d6
Xerver-2.10.txt
Posted Mar 8, 2002
Authored by Alex Hernandez

The Xerver Free Web Server v2.10 contains file disclosure and denial of service vulnerabilities. Platforms affected include Windows, Linux, BSD, Solaris, and Mac. Exploits included.

tags | exploit, web, denial of service, vulnerability
systems | linux, windows, solaris, bsd
SHA-256 | 38182b4e729c84958d0fc82d0597349a14e9eea6c1efb3b69df525ff368496eb
phpxpl.c
Posted Mar 7, 2002
Authored by Count August Anton Wilhelm Neithardt von Gneisenau

PHP 3.0.16/4.0.2 remote root format string overflow exploit for Linux/x86. Included shellcode adds a root shell on tcp port 1524 to inetd.conf.

tags | exploit, remote, overflow, shell, x86, root, php, tcp, shellcode
systems | linux
SHA-256 | bd2179b0230478789cc9cadd205ee72f2c69c586fee39b3401c11b80fc6d9a40
vwxploit.tar.gz
Posted Mar 6, 2002

Cygwin Windows port of the Interscan VirusWall 3.23/3.3 exploit. Ported by Luigi Grandini

tags | exploit
systems | windows
SHA-256 | 05f43fdbf94156c9c364d54d64758eb6a1fced90e548b15aaf5fea66d7058250
realown.tar.gz
Posted Mar 6, 2002

Cygwin port of the unix port of the real own realserver exploit. Ported by Luigi Grandini

tags | exploit
systems | unix
SHA-256 | 20abe8d21d2de932d57a058537ec620c0871a319d67ef7fdfe2ab4b895b10a0b
apache_php.tar.gz
Posted Mar 6, 2002

Cygwin Windows port of the Apache 1.3.x + php 4.0.6 proof of concept exploit for the multipart/form-data POST requests bug. This exploit crashes the daemon. Ported by Luigi Grandini

tags | exploit, php, proof of concept
systems | windows
SHA-256 | 9bd5efd995d4a0aa8e38f318ff15ec7976b46d451ed6ced284feb168e890c768
agate.tar.gz
Posted Mar 6, 2002
Authored by Luigi Grandini

Avirt Gateway 4.2 remote exploit ported to Windows with Cygwin.

tags | exploit, remote
systems | windows
SHA-256 | 4c988b03ba646bbf041cef1f9f6ed9edc921325d376b3df2494d4ace7440fed7
Colbalt-RAQ-v4.txt
Posted Mar 4, 2002
Authored by Alex Hernandez

Cobalt's RAQ 4 server has three remote vulnerabilities. The service.cgi script has a cross site scripting vulnerability because it incorrectly parses the incoming searches and includes HTML tags and Javascript in the result. A directory traversal vulnerability allows attackers to read restricted files or passwords and profiles the users. In addition, a very long URL string will crash the service. Exploits included.

tags | exploit, remote, cgi, javascript, vulnerability, xss
SHA-256 | 5ff610883de6c62b6e21a04a4afd2e050469e4e36cf69e6665831f6d3baaed70
apache_php.c
Posted Mar 4, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Apache 1.3.x + php 4.0.6 proof of concept exploit for the multipart/form-data POST requests bug. This exploit crashes the daemon.

tags | exploit, php, proof of concept
SHA-256 | 4897e0f6a9cd3079e9c2afb645eaaff987ec37ff48d79cea6eb16c6f1c26b858
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close