what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files

0202-exploits.tgz
Posted Mar 4, 2002
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for February, 2002.

tags | exploit
SHA-256 | ed69a11111642e3b223c9b986d9533726b008bb1153321a113321f53f96bb6b4
snax.fixed.c
Posted Feb 27, 2002

UCD-snmp v4.2.1 and below remote root exploit which is independent of snmpwalk. Includes instructions on getting it working against any linux system by finding the return address with gdb. Originally by Jove.

tags | exploit, remote, root
systems | linux
SHA-256 | 71d2aae96d921716b391fd095a13ad6b823570eca8c2e8aca4dd041f6de7e910
sortelnetd.tgz
Posted Feb 26, 2002
Authored by Sorbo

Sortelnetd is a working telnetd 0.17 exploit (even remote if you are careful enough). alignment is critical. Includes a demo of how to find offsets and use against localhost.

tags | exploit, remote
SHA-256 | 6e643b30e9635a5e3b22d1113b59356de6894ddf8033ed508db6d01f8a7808f3
php.windows.txt
Posted Feb 22, 2002
Authored by Condor, CompuMe

PHP for Windows Arbitrary Uploaded File Execution - PHP version 4.0.4 and 4.1.1 for Windows allows attackers to run arbitrary php code on the server.

tags | exploit, arbitrary, php
systems | windows
SHA-256 | 4f19ac5dcb05f3745e076864142537fab80c6bdfa2cc745c76bb66411f064b35
Phusion-web.txt
Posted Feb 19, 2002
Authored by Alex Hernandez

The Phusion Webserver v1.0 for Windows 9x/NT/2000 contains three remote vulnerabilities which allow users to see and retrieve any file on the server. Exploit information included.

tags | exploit, remote, vulnerability
systems | windows
SHA-256 | 803f44e633274876ffbcfb29b2146327c1f1601a0dfad1a62a327fe9914c10b2
agate.c
Posted Feb 19, 2002
Authored by uid0x00

Avirt Gateway 4.2 remote exploit.

tags | exploit, remote
SHA-256 | c7c71b607fa45cf484a658d01ea6310238e1dd14cda3695bca1c9028168cf405
ettercap-0.6.3.txt
Posted Feb 19, 2002
Authored by FJ Serna | Site ngsec.com

Ettercap v0.6.3.1 and below advisory and remote root exploit against Linux. Due to improper use of the memcpy() function, anyone can crash ettercap and execute code as root user.

tags | exploit, remote, root
systems | linux
SHA-256 | 0707e613e12873f42925d43ba22b3e2a53a3329febbdea8c7110ba8cc31f4e41
morpheus.c
Posted Feb 12, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Morpheus request share files denial of service exploit.

tags | exploit, denial of service
SHA-256 | 91c20978fc47e509b6294dfef55aef106bca0c7b2e21ba8d86f9a9024fee5185
mircexploit-v591.c
Posted Feb 12, 2002
Authored by James Martin | Site uuuppz.com

Proof of concept exploit for the buffer overflow vulnerability that exists in the nick handling code of mIRC. This exploit works with mIRC version 5.91 which is the latest version that is affected by this vulnerability.

tags | exploit, overflow, proof of concept
SHA-256 | 957bf70f6116314b5806d74de9c7b2cd9e687d65688b24535d1ea8dcad75616d
snexploit
Posted Feb 12, 2002
Authored by Zillion | Site safemode.org

FreeBSD/Linux exploit for a buffer overflow in the snes9x Nintendo emulator. The linux shellcode works also on FreeBSD since snes9x runs on those systems with linux emulation.

tags | exploit, overflow, shellcode
systems | linux, freebsd
SHA-256 | db628cc64cef1685a7de38aff3d19885b177d6ead58e67ec5e2be496541d0bc2
lotus.domino.bypass.txt
Posted Feb 5, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Lotus Domino web server prior to v5.0.9 allows password protected features to be accessed without the password by sending a malformed URL.

tags | exploit, web
SHA-256 | 341aaccaace7b4578c0a8e33e943b60798194133ad005fdf50c6a57861cef67d
wwwthreads-5.5.txt
Posted Feb 2, 2002
Site hop.to

WWWThreads aka UBBThreads v5.5dev11 and below has a security hole in the upload system which allows remote users to upload php code which runs on the server. Fix available here.

tags | exploit, remote, php
SHA-256 | ca0b26ee8d002760055da92025a6c593fa195e329b83bc4b2741a4ec67e26d63
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Power Pages Misconfigurations Exposing Sensitive Data
Posted Nov 15, 2024

tags | headline, privacy, microsoft, data loss
Man Gets 5 Years For Laundering Crypto From Bitfinex Hack
Posted Nov 15, 2024

tags | headline, hacker, data loss, fraud, cryptography
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
Posted Nov 14, 2024

tags | headline, government, usa, canada, britain, australia, flaw, new zealand
CISA, FBI Confirm China Hacked Telecoms To Spy
Posted Nov 14, 2024

tags | headline, government, privacy, usa, phone, china, data loss, cyberwar, spyware, backdoor
Two Men Charged For Hacking US Tax Preparation Firms
Posted Nov 14, 2024

tags | headline, hacker, privacy, usa, fraud, identity theft
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
Posted Nov 14, 2024

tags | headline, hacker, fraud, phish, iran
Air National Guardsman Gets 15 Years For Leaking Docs On Discord
Posted Nov 13, 2024

tags | headline, government, usa, data loss, military
Citrix, Cisco, Fortinet Zero-Days Among 2023's Most Exploited Vulnerabilities
Posted Nov 13, 2024

tags | headline, hacker, flaw, cisco, zero day
Ivanti Patches 50 Vulnerabilities Across Several Products
Posted Nov 13, 2024

tags | headline, flaw, patch
Intel And AMD Have Released Many Advisories
Posted Nov 13, 2024

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close