File Name |
File Size |
Last Modified |
MD5 Checksum |
linx86_bind.c | 9329 | Nov 17 2002 06:18:16 | 3f51fe2cbc7c5d6d666808c7e189988c |
Bind 8.2 8.2.1 8.2.2 8.2.2-PX remote root exploit for Slackware 4.0 and Redhat 6.2. Exploits the infoleak bug to generate a DNS tsig exploit packet. The uses an assembly routine to bypass tightly configured firewall systems (with only 53 tcp/udp port open). Homepage: http://lsd-pl.net. |
sendmail.8.11.x.c | 10056 | Oct 2 2002 22:47:18 | 2208cdd278d3a6de2a4cb062738312da |
Sendmail 8.11.5 and below local root exploit. Tested against Red Hat 7.0 and 7.1, SuSE 7.2, and Slackware 8.0. By SD |
solx86_bind.c | 7302 | Oct 2 2002 19:54:23 | d53ed37d58ba609a3bd552ca9347b103 |
Bind v8.2, 8.2.1, 8.2.2, and 8.2.2-PX remote root exploit for Solaris 2.7 x86. Homepage: http://lsd-pl.net. By The Last Stage of Delerium |
bp_artsd.c | 1990 | Aug 1 2002 11:22:26 | 916f2ce88906e5d62424a4688a27f6f0 |
KDE 2/3 artsd 1.0.0 local root exploit proof of concept. Artsd is not suid - exploit written for practice. By Kokane |
0207-exploits.tgz | 831290 | Aug 1 2002 11:15:09 | e946a2e3f8758ad47c16b18cfa06296c |
Packet Storm new exploits for July, 2002. |
GOBBLES-own-super.c | 8395 | Jul 31 2002 00:12:05 | 96cba2ba3dc1b0c8a10b12658ce03648 |
Super, a sudo clone, v3.18 local root format string exploit. Homepage: http://www.bugtraq.org. By Gobbles |
opensslrv.txt | 20101 | Jul 31 2002 00:00:33 | 525656635d05597960825cb10ebae0fb |
OpenSSL v0.9.6d and below remote exploit. In Spanish and HTML. By Haxors Lab and Bastard Slacker |
xploit.phps | 33457 | Jul 30 2002 23:32:26 | 46452334aac570201d710e1e5be71100 |
PHP exploit lab v1.0 - Attempts to browse, read, execute, and mysqlread. Homepage: http://darkshells.ath.cx. By Dodo |
su.c | 2729 | Jul 30 2002 13:12:06 | cb72708fda78a3fe02884eca76a122cf |
/bin/su tru64 local root exploit. Works even with non-exec stack enabled. Homepage: http://www.snosoft.com. By Phased |
eat_gopher.pl | 17100 | Jul 30 2002 01:23:04 | 2a09eb0b9caf8054b336df4c417a2692 |
IE gopher buffer overflow exploit. Tested on W2k Korean and Wme Korean. Homepage: http://monkey.org/~mat/. By JW Oh |
imailexp.c | 8258 | Jul 30 2002 00:06:16 | 22ae348b69df28ff99a57f3426cc6dc5 |
IPSwitch IMail Server v7.11 remote system exploit. Overflows the GET parameter in the Web Messaging daemon in all IMail versions to date. There are over 49 million users of IMail worldwide. Patch available here. By 2c79cbe14ac7d0b8472d3f129fa1df55 |
DSR-php4.2x.c | 1786 | Jul 27 2002 03:31:17 | 58ecc56a105c84c16cacabb2d7b4ba2c |
PHP v4.2.0 and 4.2.1 with Apache 1.3.26 POST bug proof of concept exploit for x86. Produces a segmentation violation (signal 11). By Bob |
codeblue.txt | 13694 | Jul 23 2002 22:10:49 | 3445855247a194bb95a591505b9a0a8e |
Code Blue remote exploit for OpenBSD. Code blue is a code red scanner with several vulnerabilities. By Demi Sex God from Hell |
mmaxexp.c | 9947 | Jul 23 2002 21:35:58 | cf616b36eec096e8bad38f8ea2da7487 |
MailMax Standard/Professional popmax v4.8.2.5 and below remote exploit. Sends a long USER string to the pop3 daemon. Tested against Windows 2000 Professional/Server and Windows XP Professional. Patch available here. By 2c79cbe14ac7d0b8472d3f129fa1df55 |
tracerouteexp.tgz | 4087 | Jul 23 2002 20:16:14 | ec37176265c2d7ab43a56e64385140cc |
Nanog traceroute format string local root exploit. Homepage: http://www.minithins.net. By SpaceWalker |
gpm-ex.pl | 2421 | Jul 23 2002 20:04:04 | ab2062ec424cefab49197a8b0302e189 |
Gpm v1.19.6 and below local format string exploit in perl. Note that GPM is not suid. Tested on gpm-Linux 1.19.2. By Killah |
mercrexp.c | 10946 | Jul 18 2002 01:14:38 | b96fa01c77bd8705dbb5f1c4144d6dae |
Mercur mail server v4.2 remote exploit. The Mercur mail server's control service listens to tcp port 32000 and is vulnerable to a buffer overflow in the password field. Tested against Windows 2000 and XP pro. Sends a shell to port 3333. By 2c79cbe14ac7d0b8472d3f129fa1df55 |
nn-expl.pl | 4185 | Jul 12 2002 00:27:00 | cfa6fafc1e015c01220be42e3967e449 |
Remote format string exploit for the nn news reader v6.6.4 and below. The vulnerability resides in the code that handles NNTP server responses. Homepage: http://www.safemode.org. By zillion |
snmpXauto.c | 11621 | Jul 10 2002 21:33:40 | e49ce9de1f361fae3fa9280c9c2dbdbb |
SnmpXdmid auto rooter based on snmpXdmid exploit from http://lsd-pl.net. By Tracewar. |
0x4553artsd.c | 1680 | Jul 9 2002 23:51:32 | 28ee2d6d19ee868c1a758c0011617b4e |
Local buffer overflow exploit for KDE's artsd v2.x and 3.x. Homepage: http://www.0x4553.org. By Burn-x and 0x90 |
apache-chunk.c | 1614 | Jul 7 2002 23:44:40 | ca292a7c969c9fe595d0b5503fb7443c |
Apache remote DoS (1.3.x/2.0.x branches) based on the recent flaw met in chunked encoding. Homepage: http://www.dtors.net. By Bob |
kcms_sparc.c | 8640 | Jul 7 2002 23:13:29 | 230e21f0977e1a95ae6d4a4f6fb61b35 |
Kcms_configure -o -S command line local root buffer overflow for SPARC/solaris 8. More information available here. By Adam Slattery |
kf-1.2.txt | 1254 | Jul 7 2002 23:04:06 | 3c3b2ab77b22fab41d763a6e86b4cf30 |
The KF Web Server v1.0.2 shows file and directory content if %00 is appended to the URL. Patch available here. Homepage: http://www.securiteinfo.com. By Arnaud Jacques |
ieen030.zip | 744707 | Jul 7 2002 22:22:06 | 5e94f7b3c5390127c607d935b8aa1e59 |
IE'en remotely controls Internet Explorer using DCOM. Windows username and password required. This tool can capture data sent and received using Internet Explorer and more. Homepage: http://www.securityfriday.com/ToolDownload/IEen/ieen_doc.html. By Soap |
2fax.c | 2280 | Jul 7 2002 21:22:15 | 425a9a33690eba32fe3fcb42f4c778a6 |
2fax -bpcx option local exploit for Linux. Homepage: http://lbyte.void.ru. By crazy_einstein[at]yahoo.com |
safemode-adv-nn.txt | 1806 | Jul 6 2002 01:43:45 | 78ff1b9819b8ec20612941f3cc93c67d |
NN v6.6.3 and below remote format string exploit for FreeBSD. Malicious server owners can use this vulnerability to execute code on systems that are connected with affected clients. Fix available here. Homepage: http://www.safemode.org. By Zillion |
DLA-25-06-2002.txt | 6409 | Jul 4 2002 02:01:19 | c38f830b059323d85d83d5c54f9b6354 |
Digit-Labs Security Advisory DLA-25-06-2002 - Microsoft Internet Information Server 5.0 Administration Web Site redirect proof of concept exploit. Homepage: http://www.digit-labs.org. By Gollum |
argospill.sh | 4462 | Jul 4 2002 01:14:28 | 69ad0d9d9a31fcdbf4bd62ccbd76ccf2 |
Argosoft Mail Server v1.8.1.5 Plus/Pro Webmail reverse directory traversal exploit which allows an attacker to retrieve any file on the disk readable by the mail server. The freeware edition of Argosoft Mail Server is not vulnerable. Fix available here. Homepage: http://nfinity.yoll.net. By Team N.finity |
vncsunpci.c | 14694 | Jul 3 2002 22:51:57 | 04f239e954d52792e6cb6b953794d8bf |
SunPCi II v2.3 comes with a modified VNC which allows an attacker to discover the password if he can sniff the traffic between client and server. Decoding program tested on Linux and Solaris. Homepage: http://www.trust-factory.com. By Richard van den Berg |
sshutup-theo.tar.gz | 14816 | Jul 3 2002 01:04:58 | 3a6b522ce65322faa42f49ce3087e5fd |
OpenSSH v2.9.9 to 3.1 remote root exploit for the default install of Openbsd 3.x. This tarball is a set of patches for the OpenSSH v3.4p1 client. Takes advantage of a bug in the challenge response handling code. Homepage: http://www.immunitysec.com/GOBBLES/. By Gobbles Security |
domino.r4.txt | 2556 | Jul 3 2002 00:17:57 | dabd2b10dd9a90345ade3a6c91798408 |
Lotus Domino Web Server R4 on AIX (other platforms not tested) allows remote users to download files in the web root regardless of ECL's or permissions. Homepage: http://Digisec.org. By Andrew T |
omni-overflow.c | 5871 | Jul 3 2002 00:09:18 | 68b5a2924052cd620c6e448c51ef2e16 |
OmniHTTPd v2.09 remote denial of service buffer overflow exploit. Uses a big in the handling of long HTTP versions. By Nictuku |