| [txt | archive] | ![]() |
[archive | gui] |
| -[[ 23 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| squash.c | dg-ux 4.0x - x86 | lpsched command line parsing buffer overflow | local | luciano rocha |
| ftpsed.pl | ftpd | proftpd dos vulnerability | dos | speedy |
| shelldbsd.c | openbsd | port binding shellcode (port 6969) | shellcode | noir |
| aspseek-xpl.pl | cgi | env buffer overflow | remote | teleh0r |
| -[[ 22 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| layers.c | sco unixware 5.0.5 | command line parsing buffer overflow | local | k2 |
| ikonboard | cgi | "show files" vulnerability | remote | martin j muench |
| manhole.c | debian 2.2 | command line format strings vulnerability | local | fish stiqz |
| overflows.txt | basic overflow tutorial | a guide to writing simple buffer-overflow exploits for x86 *nix | papers | fides |
| -[[ 21 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| s | cgi | "show files" vulnerability | remote | tack |
| kermit.c | hp-ux 11.00 | command line parsing buffer overflow | local | k2 |
| aspseek.c | cgi | env buffer overflow | remote | neilk |
| webspirs.pl | cgi | users can read any file | remote | crono |
| -[[ 20 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| pqx.c | cgi | post-query buffer overflow | remote | proton |
| joe28.c | freebsd 4.2 | tmp race condition | local | fides |
| bs-ssh.tar.gz | mandrake 7.2 | sshd crc32 remote root exploit | remote | mods by nemes||y |
| reverse-shell.c | openbsd | reverse portshell shellcode | shellcode | noir |
| -[[ 11 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| vv5.pl | iis | users can shutdown iis through propfind bug | dos | georgi guninski |
| n82x.c | named | bind 8.2.x tsig off-by-one stack overflow | remote | ix & lucysoft |
| execve_binsh.c | freebsd | 23 byte execve() of /bin/sh | shellcode | marcetam |
| -[[ 10 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| webspirs | cgi | users can read any file | remote | ukr-xblp |
| dc20exp.c | freebsd 3.5 | poor bounds checking performed | local | mray |
| commerce | cgi | users can read any file | remote | slipy |
|
added descriptions for
irix.
|
||||
| -[[ 7 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| pals | cgi | users can execute commands | remote | ukr-xblp |
| auktion | cgi | users can execute commands | remote | ukr-xblp |
| mini-sh.c | linux-x86 | execve() of /bin/sh | shellcode | raise |
| iis-shellcode.zip | win32 | iis shellcode | shellcode | f.v.leitner & o.kesim |
|
added descriptions for
hardware and hpux.
|
||||
| -[[ 6 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| store | cgi | remote users can read any file | remote | slipy |
| ntping.c | bsdi 4.1 | enviroment overflow | local | loophole |
| way-board | cgi | remote users can read any file | remote | ukr-xblp |
| ssh-crc.tar.gz | sshd | sshd crc32 remote root exploit | remote | blacksphere |
| -[[ 5 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| rts.c | linux-x86 | reverse telnet shellcode | shellcode | hts |
| gdc.c | bsdi 4.1 | -t arg overflow | local | loophole |
| p-smash.c | win98/95 | dos attack from icmp packet type 9 and code 0 | dos | paulo ribeiro |
| execve-binsh.c | freebsd | execve() of /bin/sh | shellcode | preedator |
| -[[ 4 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| ospf | bsdi 4.1 | enviroment overflow | local | loophole |
| prodbx.c | sco openserver 3.2 | arg overflow | local | the itch |
| sendtemp-exp.pl | cgi | users can view files | remote | tom parker |
| glibc-preload.csh | redhat 6.0 | glibc 2.1.3 ld_preload bug | local | shadow |
| -[[ 3 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| lsub.c | slackware 7.1/7.0 | imapd remote lsub vulnerability | remote | skylazart |
| xmail.c | slackware 7.1 | argument overflow | local | kengz |
| exklock.c | freebsd 4.2/3.5.1 | xklock arg overflow | local | dethy |
| elvwreck.c | freebsd 4.2/3.5.1 | elvrec stack overflow | local | dethy |
| -[[ 2 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| at.c | tru64 unix 4.0g | (/usr/bin/at) local root exploit | local | loophole |
| tsig.c | named | bind 8.2.x tsig off-by-one stack overflow | remote | [multiple] |
| ssh-brute.sh | sshd | brute force root's password without detection | remote | jose |
| sshd-xpl.tar.gz | sshd | sshd crc32 remote root exploit | remote | paul starzetz |
| -[[ 1 march ]]- | ||||
| [-name-] | [-platform/daemon-] | [-description-] | [-type-] | [-author-] |
| bugtraq.c | slackware 7.0 | bind 8.2.x tsig off-by-one stack overflow | remote | gneisenau |
| tsl_bind.c | named | bind 8.2.x tsig off-by-one stack overflow | remote | axur.org |
| linx86_bind.c | slackware 4.0 / redhat 6.2 | bind 8.2.x tsig off-by-one stack overflow | remote | lsd |
| solx86_bind.c | solaris 2.7 x86 | bind 8.2.x tsig off-by-one stack overflow | remote | lsd |
| [comments? gov-boi@hack.co.za] |
EOF
|
|||