exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2003-07-14

exceed.c
Posted Jul 14, 2003
Authored by c0ntex

Hummingbird's Exceed X emulator mishandles fonts and is vulnerable to both remote and local denial of service attacks and may allow an attacker to remotely gain root privileges.

tags | exploit, remote, denial of service, local, root
SHA-256 | 4229f6700178e0c3f5a09ba9b35ac021fc622a1b8acd2e2bc7bda54b9d98eea6
cmd.asm
Posted Jul 14, 2003
Authored by Peter Winter-Smith

Simple shellcode that allows command execution on Microsoft Windows platforms.

tags | shellcode
systems | windows
SHA-256 | a5a6d5c1a064493d07a7279f0875d3e18e7199ccc79e6c56780408cd1ef3e18c
MDaemon.txt
Posted Jul 14, 2003
Authored by Dennis Rand | Site Infowarfare.dk

A buffer overflow has been discovered in the IMAP4rev1 MDaemon v6.7.9 and below that can allow malicious users to remotely crash this application and commit code execution with SYSTEM privileges.

tags | advisory, overflow, code execution
SHA-256 | abf6ce1c4d9bf7f8ca7fe731e42afda03ebc4f4ddfc1cbcedb749995121a265c
YahPoo.c
Posted Jul 14, 2003
Authored by Bob, dsr | Site dtors.net

Exploit for Yahoo Messenger, Yahoo Module that allows for remote command execution on a victim machine via bad URI handling. Requires the victim to view the html.

tags | exploit, remote
SHA-256 | de57f77d0570f6c0cef77345b9c3a45bdf07eb7947748433529550f3a4693e1a
DSR-upclient.pl
Posted Jul 14, 2003
Authored by dsr, inv | Site dtors.net

Local exploit for Upclient 5.0.b5 that spawns a shell with kmem privileges. Tested on FreeBSD 5.0.

tags | exploit, shell, local
systems | freebsd
SHA-256 | 12ad32e03b238b43ac52391150406436f569b35875fd12e93cbdce6c5c310419
shatterSEH.txt
Posted Jul 14, 2003
Authored by Brett Moore SA | Site security-assessment.com

Paper discussing more shatter attacks that are possible using SEH memory locations to escalate privileges in Windows. Related information available here.

tags | paper
systems | windows
SHA-256 | 08eeaae0ef4d604d10152e302c4788b1eb3339d71fd9c5a793d9b0e5a67d44e0
openssh-3.6.1p2-backdoor.patch.gz
Posted Jul 14, 2003
Authored by crash

OpenSSH 3.6.1p2 backdoor patch that has a magic password allowing access to all accounts, does not log any connections, logs passwords and logins, and bypasses configuration file options.

tags | patch
systems | unix
SHA-256 | b080fa6cc868df661d6a5f84927bd9d12568a47e84e38cf22695a72e5ee75f19
0x333openssh-3.6.1p2.tar.gz
Posted Jul 14, 2003
Authored by 0x333, nsn | Site 0x333.org

Backdoored version of OpenSSH 3.6.1p2 that has a magic password, logs logins and passwords to a specified file, and disables use of the default configuration file.

tags | encryption
SHA-256 | b8d706e7016863b7aae46d746b1f0f9ebfe89f5729e5b7e3f964a1ff7c5aa41f
0304-exploits.tgz
Posted Jul 14, 2003
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for April, 2003.

tags | exploit
SHA-256 | 31c9e6c9d8582f6aca72f21d5e0406005516f63c17fe7cad6b90dc9ccac51305
0201-exploits.tgz
Posted Jul 14, 2003
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for January, 2002.

tags | exploit
SHA-256 | c8876e01bb72729efd8c9bb8059af190059d1b349a108ff8047f1404d6b7c269
0301-exploits.tgz
Posted Jul 14, 2003
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for January, 2003.

tags | exploit
SHA-256 | 05e9bf140090db0cdb886afeb952996de9fc46088acb9fcee3c4fd94972e4c8d
0305-exploits.tgz
Posted Jul 14, 2003
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for May, 2003.

tags | exploit
SHA-256 | 3266d5d2ec89be98ae96388144950426ff1b73fbfc6af81a7f8f55b77fcfbbb5
llc-0.9.2.tar.gz
Posted Jul 14, 2003
Authored by Scarab

LLC v0.9.2 is a log cleaner for Linux.

tags | tool, rootkit
systems | linux, unix
SHA-256 | bd31dd99d9d4d55fa1aa06496921958c44bf0a1c8dcfe1f12eb4e6ef80fbcf36
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close