Section:  .. / 0303-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 40 of 40
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: mailex-gen.c
Description:
pgp4pine local exploit for version 1.76 (and possibly below) for the buffer overflow which allows specially crafted emails the ability to execute arbitrary code on the recipient box when the mail is opened.
Author:Eric AUGE
File Size:2778
Last Modified:Mar 13 03:53:36 2003
MD5 Checksum:76503e21270ebc034fdc743270bb6075

 ///  File Name: phpnuke60.2.txt
Description:
PHP Nuke 6.0 has vulnerabilities in the Forums and Private_Messages modules which allow attackers to save forum information and user data to a text file.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:3318
Last Modified:Mar 11 08:23:34 2003
MD5 Checksum:80c22a6eceb2e375d163e34b0c7ebe30

 ///  File Name: cpanel.exe
Description:
Remote CGI exploit written in Perl for Cpanel 5 Guestbook. Spawns a bash shell with the uid of the webserver. Windows version. Warning: Use this binary at your own risk.
Author:Spabam
Homepage:http://spabam.tk
File Size:960370
Last Modified:Mar 11 04:06:39 2003
MD5 Checksum:4f268fd0b9bbd2b1a18650f544f0492a

 ///  File Name: postnuke723.txt
Description:
Postnuke v0.723 has SQL injection and directory traversal vulnerabilities which allow an attacker to view directories and perform remote command execution.
Author:pokleyzz
Homepage:http://www.scan-associates.net
File Size:2039
Last Modified:Mar 11 03:45:36 2003
MD5 Checksum:284a2e4c39b826426f271806dc067b58

 ///  File Name: s0h_Win32hlp.c
Description:
Win32hlp exploit for the :LINK overflow that traps a .CNT file with arbitrary code that once downloaded will execute without a user being prompted for verification. Tested against Windows 2000 PRO/SERVER SP0/SP1/SP2.
Author:ThreaT
Homepage:http://s0h.cc/~threat/
File Size:7186
Last Modified:Mar 11 03:30:27 2003
MD5 Checksum:8f66b0353e98a096871afda6e17c2f63

 ///  File Name: DSR-unreal.c
Description:
Local exploit for Unreal IRC daemon 3.2.
Author:Rave
Homepage:http://www.dtors.net
File Size:1773
Last Modified:Mar 11 03:19:46 2003
MD5 Checksum:3944c76e3276bbbb584f20f211bc1545

 ///  File Name: DSR-toppler.pl
Description:
Local exploit to get gid of games for toppler.
Author:Kokanin
Homepage:http://www.dtors.net
File Size:592
Last Modified:Mar 11 03:17:28 2003
MD5 Checksum:cff54e7df97086e60b0a29f381d442d0

 ///  File Name: phpnuke60.txt
Description:
PHP Nuke 6.0 is vulnerable to multiple SQL injection attacks that will allow an attacker to access member lists, show users by user ID, show moderators, show administrators, privilege escalation, and more.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:14864
Last Modified:Mar 11 00:06:31 2003
MD5 Checksum:47e2a6def3c9208720bc85f64acb23dc

 ///  File Name: SCSA009.txt
Description:
Security Corporation Security Advisory [SCSA-009]: PHP ping, a utility that allows an end user to ping a remote machine, has a vulnerability which allows remote attackers to execute commands remotely and could lead to compromise of some, if not all, the operating system.
Author:Grégory Le Bras
Homepage:http://www.Security-Corp.org
File Size:3081
Last Modified:Mar 7 10:08:24 2003
MD5 Checksum:b5ba86dd6ce4774640f9e4b1a2721d49

 ///  File Name: fws160.txt
Description:
Forum Web Server v1.60 has multiple vulnerabilities including a directory traversal that can be used to get usernames and passwords for the server and a cross site scripting vulnerability during message replies.
Author:Dennis Rand
Homepage:http://www.Infowarfare.dk/
File Size:3727
Last Modified:Mar 7 09:59:47 2003
MD5 Checksum:f2d5d6463673b7a4caa5d34559f0ed13

 ///  File Name: 85deadelf.c
Description:
Exploit for the file(1) buffer overflow vulnerability found by iDEFENSE. When file is run upon this binary, a shell is bound to port 2003.
Author:CrZ
File Size:3589
Last Modified:Mar 7 08:17:08 2003
MD5 Checksum:a353c1302cbcbc300c36e3265e98f555

 ///  File Name: lhttpd00r.c
Description:
LHTTPd 0.1 remote buffer overflow exploit for the Win32 platform. This exploits a buffer overflow in GET request handling of HTTPd 0.1 for Microsoft Windows and binds a shell to the desired port.
Author:uid0x00
File Size:7969
Last Modified:Mar 4 06:14:10 2003
MD5 Checksum:91f2bbbde3b22b3d8b5d11536dccfa80

 ///  File Name: oC-localX.c
Description:
oC-localX.c is a XFree86 Version 4.2.x local root exploit which overflows the XLOCALEDIR environment variable. Tested against Slackware 8.1.
Author:Dcryptr, Tarranta
Homepage:http://crionized.net
File Size:5822
Last Modified:Mar 3 07:51:54 2003
MD5 Checksum:79b1d63117f04cf3bf5dc206a4169cdf

 ///  File Name: 0x333cya.tar.gz
Description:
0x333cya.tar.gz is a Mandrake 9.0 local root exploit which uses bugs in the printer-drivers package. Cya.c gets group sys privileges with a bug in /usr/bin/mtink, and anger.c uses the sys privileges to exploit a bug in /usr/bin/ml85p, spawning a root shell.
Author:Cowboy
Homepage:http://www.0x333.org
File Size:1682
Last Modified:Mar 3 07:10:12 2003
MD5 Checksum:c6654bda25cad0217945eee8922be483

 ///  File Name: ST-tcphump.c
Description:
ST-tcphump.c is a remote tcpdump ISAKMP denial of service exploit. Sends a packet on UDP port 500 which sends tcpdump into an infinite loop upon receipt of the specially crafted packet. Supports spoofed and non-spoofed packets.
Author:The Salvia Twist
Homepage:http://hack.batcave.net
File Size:6116
Last Modified:Mar 3 06:59:03 2003
MD5 Checksum:e3e6e05e044908ead42c57f538a48be8