Section:  .. / 0310-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 42 of 42
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: ms2k3traversal.txt
Description:
Microsoft Windows Server 2003 allows a remote attacker to traverse directories and access arbitrary files via shell: references.
Author:Eiji James Yoshida
File Size:3816
Last Modified:Oct 9 07:47:37 2003
MD5 Checksum:4358258836ecf8434dba681ac39b3d17

 ///  File Name: openoffice110.txt
Description:
Illegalaccess.org Security Alert - Openoffice 1.1.0 is vulnerable to a denial of service attack when enabled and a TCP connection to the daemon gets fed a bunch of zeroes.
Author:Marc Schoenefeld
Homepage:http://www.illegalaccess.org
File Size:1153
Last Modified:Oct 9 07:26:24 2003
MD5 Checksum:6379b995196fde39663d7c7af9de8cd2

 ///  File Name: oracle_ownage.c
Description:
Local exploit for Oracle Release 2 Patch Set 3 Version 9.2.0.4.0 for Linux x86 that makes use of a buffer overflow to escalate user privileges via the oracle binary.
Author:c0ntex
File Size:6976
Last Modified:Oct 17 23:04:15 2003
MD5 Checksum:e67aa2d4ffbc82a005daedd92002cbf9

 ///  File Name: pfpoc.c
Description:
Remote root exploit for ProFTPd 1.2.7-1.2.8.
Author:netris
File Size:2659
Last Modified:Oct 14 05:55:13 2003
MD5 Checksum:da4e6897a3b2f1a99efc2ef3fd5b0837

 ///  File Name: php-nuke.6.5.php.txt
Description:
PHP-Nuke v6.5 and Spaiz-nuke v1.2 SQL injection exploit written in PHP. Adds an admin account.
Author:Blade
Homepage:http://www.fihezine.tsx.to
File Size:19194
Last Modified:Oct 30 19:12:23 2003
MD5 Checksum:075b3b2c3a8864197675515e90a3342d

 ///  File Name: php.advanced.poll.txt
Description:
PHP Advanced Poll v2.0.2 contains remotely exploitable PHP code injection, file include, and phpinfo vulnerabilities. Exploit URLs and vulnerable code snippets included. Patch and vulnerability details available here.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:5159
Last Modified:Oct 30 05:59:16 2003
MD5 Checksum:56e9fbaca901131a100472faa9d3f17b

 ///  File Name: php67.txt
Description:
PHP Nuke 6.7 is susceptible to allowing arbitrary file upload and execution via the file mailattach.php.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:1686
Last Modified:Oct 6 20:47:51 2003
MD5 Checksum:b5a09e84e738ddde438a2384f168814a

 ///  File Name: prockill.txt
Description:
Inside the PostThreadMessage API, any user of any security level can give a WM_QUIT message causing the process to terminate. Sample exploit code included.
Author:Brett Moore
Homepage:http://www.security-assessment.com
File Size:6073
Last Modified:Oct 2 18:54:32 2003
MD5 Checksum:c0fedf0d4109221190edc25b07a689d0

 ///  File Name: proftpdr00t.c
Description:
Remote root exploit for ProFTPd versions 1.2.7 - 1.2.9rc2 that breaks the chroot and uses brute force. Tested against SuSE 8.0/8.1 and RedHat 7.2/8.0.
Author:Haggis
File Size:20280
Last Modified:Oct 14 05:52:33 2003
MD5 Checksum:499e84e8c8590d9bb323ea7c761673f8

 ///  File Name: SA-20031006.txt
Description:
slocate package version 2.6 has a heap overflow that can be used to escalate privileges.
Author:Patrik Hornik
File Size:7504
Last Modified:Oct 15 05:52:24 2003
MD5 Checksum:00b366b2c5e22e03fdbb21c45a07520c

 ///  File Name: sh-httpd.txt
Description:
Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org
File Size:2645
Last Modified:Oct 30 06:59:24 2003
MD5 Checksum:0a6560a983f4d7c86c1eb4c1f8375ba8

 ///  File Name: taper.txt
Description:
The taper program in Redhat 7.3 contains a stack overflow. Note that taper is not setuid.
Author:Polygrithm
Homepage:http://geekz.nl
File Size:2503
Last Modified:Oct 30 07:15:06 2003
MD5 Checksum:22f491634bf9f13060313a42fd059611

 ///  File Name: telecondex.pl
Description:
Denial of service buffer overflow exploit for the TelCondex web server v2.12.30210 Build 3285 and below which overflows the HTTP referrer. Fix available here. Flaw discovered by Author:Blade
Homepage:http://www.fihezine.tsx.to
File Size:1793
Last Modified:Oct 30 19:08:04 2003
MD5 Checksum:20c79a1ea93315692bf563efa676c67d

 ///  File Name: winshadow.zip
Description:
OmniCon WinShadow version 2.0 exploit that makes use of a buffer overflow in the client handling of hostnames in host files.
Author:Peter Winter-Smith, Bahaa Naamneh
Homepage:http://www.elitehaven.net/
Related File:winshadow.txt target=ext
File Size:1604
Last Modified:Oct 1 23:06:19 2003
MD5 Checksum:8d3a1c77d7fbb35349c0e91686aa49dd

 ///  File Name: wmpphp.txt
Description:
Exploit that swaps the Windows Media Player with a message from Mindlock by making use of the Internet Explorer 6 XML bypass flaw.
Author:Mindwarper
Homepage:http://mindlock.bestweb.net
Related File:IE6XMLbypass.txt
File Size:1862
Last Modified:Oct 8 01:07:16 2003
MD5 Checksum:8f88cac317274919b012a79b8cac352d

 ///  File Name: x-ws_ftp.c
Description:
WS_FTP server <= v4.0.1 for Windows 2000 remote stack overflow exploit which binds a shell to a port. Requires a ftp account.
Author:Eyas
Homepage:http://www.xfocus.net
File Size:8918
Last Modified:Oct 30 19:28:30 2003
MD5 Checksum:d1c0de9f904bf4d9a6e68e991267a850

 ///  File Name: yax-phpnuke.sh
Description:
Php-nuke v6.6 and spaiz-nuke below v1.2beta remote exploit which allows you to take over the administrator account. In Spanish.
Author:Flux
File Size:4244
Last Modified:Oct 30 06:55:08 2003
MD5 Checksum:d0db271a1958e0baff9284c3401640c7