Bind 8.2 8.2.1 8.2.2 8.2.2-PX remote root exploit for Slackware 4.0 and Redhat 6.2. Exploits the infoleak bug to generate a DNS tsig exploit packet. The uses an assembly routine to bypass tightly configured firewall systems (with only 53 tcp/udp port open).
07e26538f419d09ee9e0fc5519733ba25fb27bc9ccf20586e861c82bcc2d9146
Sendmail 8.11.5 and below local root exploit. Tested against Red Hat 7.0 and 7.1, SuSE 7.2, and Slackware 8.0.
91760643cbea23f0d407bfbe6adb92fff440f2e21775e64c29e8d836351f91b9
Bind v8.2, 8.2.1, 8.2.2, and 8.2.2-PX remote root exploit for Solaris 2.7 x86.
ae23adfe8e413cf29b90daaa2aa3fa68779d3affba2a40e82e14dc7e57560754
KDE 2/3 artsd 1.0.0 local root exploit proof of concept. Artsd is not suid - exploit written for practice.
63ef555eeac80b7d7bbeafa9a3ab3f506a639c7134188c6267fce0f2f4d197db
Packet Storm new exploits for July, 2002.
d8eec74c4a639b0dfe04e9dca80d7c5f56c303ee564a8c41a2c7e6be00a63c10
OpenSSL v0.9.6d and below remote exploit. In Spanish and HTML.
c34b8fba056f5bcd3a787b5a7169313629bd6aefd0786a4f6dd8dcd59e681114
PHP exploit lab v1.0 - Attempts to browse, read, execute, and mysqlread.
1246fe064866a0ec61ae145cf847039bbc1ff2f2a60977d2c4104bfae6cf3569
/bin/su tru64 local root exploit. Works even with non-exec stack enabled.
7191ae0c7ab446286470772096239fc512f0f6319ed88e297d994f5cdcdd45ea
IE gopher buffer overflow exploit. Tested on W2k Korean and Wme Korean.
85e52c61271025804b7c1b580740ed4678d9ae456002868ea97d71c273e26b37
IPSwitch IMail Server v7.11 remote system exploit. Overflows the GET parameter in the Web Messaging daemon in all IMail versions to date. There are over 49 million users of IMail worldwide. Patch available here.
35c821776d9bb0af1fc4b049f211ca07fb58ac7eecd2c428058fac0629803de5
PHP v4.2.0 and 4.2.1 with Apache 1.3.26 POST bug proof of concept exploit for x86. Produces a segmentation violation (signal 11).
e1e66701c77072a167c7aa5778b3d30cc69da1019bee73ce24e76872d8212be9
Code Blue remote exploit for OpenBSD. Code blue is a code red scanner with several vulnerabilities.
cff16d5936946288cd9899071ceab6d62a74a4b57a019d0ed58b1845d5195c7d
MailMax Standard/Professional popmax v4.8.2.5 and below remote exploit. Sends a long USER string to the pop3 daemon. Tested against Windows 2000 Professional/Server and Windows XP Professional. Patch available here.
6463001871555a4dde5d4631306b9a8eea057ffea8d2462e5fd5a2f22fe762f5
Nanog traceroute format string local root exploit.
5fec0e1d8861a9656e800d1b688a2f580c667ee63c38b1e84d84cffb102fe6ab
Gpm v1.19.6 and below local format string exploit in perl. Note that GPM is not suid. Tested on gpm-Linux 1.19.2.
1bfffab9cf16fd0d2d417966737317ebe681c08d8af6f04757392603ec7972fe
Mercur mail server v4.2 remote exploit. The Mercur mail server's control service listens to tcp port 32000 and is vulnerable to a buffer overflow in the password field. Tested against Windows 2000 and XP pro. Sends a shell to port 3333.
5d47b93de6b6b5e44524436f14aa61eeae568221c556a2a9290570d4db621bef
Remote format string exploit for the nn news reader v6.6.4 and below. The vulnerability resides in the code that handles NNTP server responses.
bd02d3ca74768f8d26a7e158028072e79242e1adb157d1507c85bafb371c854e
SnmpXdmid auto rooter based on snmpXdmid exploit from http://lsd-pl.net.
94ebe956f7f5a101e3099ef94b7ebd458085d3ce2490d32e37966d74a51c61e6
Local buffer overflow exploit for KDE's artsd v2.x and 3.x.
c4ee9b2be56eb009a8530167e522b3e52eb220e1569d1a0b77a0f7358526114c
Apache remote DoS (1.3.x/2.0.x branches) based on the recent flaw met in chunked encoding.
cec28b70971878ff54768796e2494d2f8f48cedd275ac84b1261c0bfa5ecdbd3
Kcms_configure -o -S command line local root buffer overflow for SPARC/solaris 8. More information available here.
78bc78b679916c2da141474802dd02ab271715c5e4e3edc5e7bc694f77031ccc
The KF Web Server v1.0.2 shows file and directory content if %00 is appended to the URL. Patch available here.
57f627a9f7b88cd3cc183123645d6f6df32860f6e50530dad88c452563699256
IE'en remotely controls Internet Explorer using DCOM. Windows username and password required. This tool can capture data sent and received using Internet Explorer and more.
9ef911b4b08a0221e78596c8ed1e45ef18ad4ebfd6e83362e9bc571939b71cad
2fax -bpcx option local exploit for Linux.
ebae72f5d4e6a1ffe3acb022e81f8c0f51e05a3a4c47eaa2b903e3d2c92066ef
NN v6.6.3 and below remote format string exploit for FreeBSD. Malicious server owners can use this vulnerability to execute code on systems that are connected with affected clients. Fix available here.
196d39f26cc27f3b7ab41de171afbed92adacc402a4519d9444770b26a2bf244