Section:  .. / 0306-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 42 of 42
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: mame_exp.c
Description:
Xmame local root exploit for Redhat 7.0 and 7.2 which overflows the --lang switch in /usr/local/bin/xmame.x11.
Author:Gabriel A. Maggiotti
Homepage:http://qb0x.net
File Size:2069
Last Modified:Jun 21 15:40:03 2003
MD5 Checksum:a03ebd641b686886d66250196364a7f8

 ///  File Name: mencari_asal_usul.pl
Description:
Proof of concept exploit for mnoGoSearch 3.2.10 that spawns a shell as the webserver user id by overflowing the tmplt variable.
Author:pokleyzz, s0cket370
Homepage:http://www.scan-associates.net
Related File:mnogosearch.txt
File Size:4000
Last Modified:Jun 11 06:54:20 2003
MD5 Checksum:ff1626622aef6a8e88152d7dc2cd1db5

 ///  File Name: mencari_sebuah_nama.pl
Description:
Proof of concept exploit for mnoGoSearch 3.1.20 that performs remote command execution as the webserver user id.
Author:pokleyzz
Homepage:http://www.scan-associates.net
Related File:mnogosearch.txt
File Size:4882
Last Modified:Jun 11 06:50:01 2003
MD5 Checksum:3ea57b0506231feae8a55fbfd3b65820

 ///  File Name: mwmxploit.c
Description:
Remote format string exploit for Magic Winmail Server version 2.3. Sending a format string in the USER field during the authentication process, a remote attacker can cause the server to execute arbitrary code.
Author:ThreaT
File Size:6764
Last Modified:Jun 11 08:45:15 2003
MD5 Checksum:bc4b3a125db454c2cc7c1c8d94b2de65

 ///  File Name: myserver-0.4.1.txt
Description:
MyServer 0.4.1 is vulnerable to a denial of service when a GET request with 20 forward slashes gets sent to the server.
Author:deadbeat
File Size:2936
Last Modified:Jun 24 07:03:53 2003
MD5 Checksum:f3ff412cbcda773136f7d61cd680630d

 ///  File Name: p_kon.c
Description:
Local root exploit for kon version 0.3.9b-16 that makes use of a buffer overflow discovered in the -Coding switch.
Author:pi3
Homepage:http://www.pi3.int.pl
File Size:2885
Last Modified:Aug 11 18:38:59 2003
MD5 Checksum:29737b73e64d572edabe7d3929c0b632

 ///  File Name: phpbb_sql.pl
Description:
Remote exploit that makes use of a SQL injection vulnerability that exists in the /viewtopic.php file in phpBB.
Author:Rick Patel
File Size:3941
Last Modified:Jun 22 01:18:11 2003
MD5 Checksum:c235a27445cb8f4acf96b74bf8858576

 ///  File Name: pi3_dos.c
Description:
Denial of service exploit for the Pi3 web server version 2.0.2 that makes use of a malformed GET request.
Author:pi3
Homepage:http://www.pi3.int.pl
File Size:2185
Last Modified:Aug 11 18:37:03 2003
MD5 Checksum:090c3dacc1722382b8016be5acff2d16

 ///  File Name: pMachine.txt
Description:
Pmachine version 2.2.1 has a fault Include() routine that allows a remote attacker to supply a malicious URL that in turn can be a script that the webserver will then execute.
Author:Frog Man
Homepage:http://www.frog-man.org/tutos/pMachineFree2.2.1.txt
File Size:2956
Last Modified:Jun 17 06:00:56 2003
MD5 Checksum:2bb7d7139009e054217b2ecd4df0a457

 ///  File Name: secuniaFTP.txt
Description:
Secunia Security Advisory - The FTPServer/X FTP Server Control and COM Object v1.00.045 and v1.00.046 are vulnerable to buffer overflow that results in a denial of service and potentially can enable a remote attacker to gain access to the machine.
Author:Carsten H. Eiram
Homepage:http://www.secunia.com/secunia_security_advisories/
File Size:6935
Last Modified:Jun 29 23:42:46 2003
MD5 Checksum:941f08cf9a416bbeab1599ebbeadaa93

 ///  File Name: SRT2003-06-13-1009.txt
Description:
Secure Network Operations, Inc. Advisory SRT2003-06-13-1009: Progress Database dbagent make the use of several helper .dll and .so binaries. When looking for shared object files _dbagent looks at the argument passed to the command line option "-installdir". No verification is performed upon the object that is located thus local non super users can make themselves root.
Author:Strategic Reconnaissance Team
Homepage:http://www.secnetops.com
File Size:3041
Last Modified:Jun 14 20:35:03 2003
MD5 Checksum:75ffd907a4b009b8fbeca23d568ea778

 ///  File Name: STG-Jeus-Eng.txt
Description:
STG Security Advisory - Java Enterprise User Solution, or JEUS, has a cross site scripting vulnerability issue when invoking non-existent URLs.
Author:Jeremy Bae
Homepage:http://www.stgsecurity.com/
File Size:2664
Last Modified:Jun 22 00:57:20 2003
MD5 Checksum:34f259109c7e976a423209c1b4b69594

 ///  File Name: suiddmp.c
Description:
Local root exploit that makes use of a race condition vulnerability found in the Linux execve() system call that affects the 2.4 kernel tree.
Author:IhaQueR
File Size:2707
Last Modified:Jun 28 21:12:28 2003
MD5 Checksum:4f95beb18386eb443765c00154f4bc3f

 ///  File Name: THCsql.zip
Description:
THCsql exploits the vulnerability in MSSQL OpenDataSource function found by David Litchfield in June of 2002. Tested on Windows 2000 Server SP2 with SQLservers SP0 and SP2.
Author:Johnny Cyberpunk
Homepage:http://www.thc.org
File Size:15013
Last Modified:Jun 4 04:32:34 2003
MD5 Checksum:06f81199da422c87a084529cf2127583

 ///  File Name: x_diagrpt_aix5l_4x.sh
Description:
Local root exploit for the diagrpt command on AIX 5.x and 4.x.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:1211
Last Modified:Jun 11 05:56:49 2003
MD5 Checksum:5d36c3adbc1f71fc8566484e1108ddee

 ///  File Name: x_errpt_aix5.pl
Description:
Local root exploit for the errpt command on AIX5L.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:1040
Last Modified:Jun 11 05:54:40 2003
MD5 Checksum:0dc05e7224556cd69e3248a91adcbbce

 ///  File Name: x_lsmcode_aix4x.pl
Description:
Local root exploit for the command lsmcode on AIX 4.3.3.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:1398
Last Modified:Jun 11 05:52:57 2003
MD5 Checksum:f0c9c81406cc272571d2840964f00ef5