Section:  .. / 0310-exploits  /

Page 1 of 2
<< 1 2 >> Files 1 - 25 of 42
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0310-exploits.tgz
Description:
Packet Storm new exploits for October, 2003.
File Size:91652
Last Modified:Dec 10 03:25:00 2003
MD5 Checksum:63cd13d549e08c661624ae5de22a9818

 ///  File Name: x-ws_ftp.c
Description:
WS_FTP server <= v4.0.1 for Windows 2000 remote stack overflow exploit which binds a shell to a port. Requires a ftp account.
Author:Eyas
Homepage:http://www.xfocus.net
File Size:8918
Last Modified:Oct 30 19:28:30 2003
MD5 Checksum:d1c0de9f904bf4d9a6e68e991267a850

 ///  File Name: php-nuke.6.5.php.txt
Description:
PHP-Nuke v6.5 and Spaiz-nuke v1.2 SQL injection exploit written in PHP. Adds an admin account.
Author:Blade
Homepage:http://www.fihezine.tsx.to
File Size:19194
Last Modified:Oct 30 19:12:23 2003
MD5 Checksum:075b3b2c3a8864197675515e90a3342d

 ///  File Name: telecondex.pl
Description:
Denial of service buffer overflow exploit for the TelCondex web server v2.12.30210 Build 3285 and below which overflows the HTTP referrer. Fix available here. Flaw discovered by Author:Blade
Homepage:http://www.fihezine.tsx.to
File Size:1793
Last Modified:Oct 30 19:08:04 2003
MD5 Checksum:20c79a1ea93315692bf563efa676c67d

 ///  File Name: ls_ftp.pl
Description:
Denial of service exploit in ls, which is exploited remotely via wu-ftpd v2.6.2. In perl.
Author:Druid
File Size:701
Last Modified:Oct 30 07:17:45 2003
MD5 Checksum:d172d1ad48e70d1f43bf8781bae6f7f1

 ///  File Name: taper.txt
Description:
The taper program in Redhat 7.3 contains a stack overflow. Note that taper is not setuid.
Author:Polygrithm
Homepage:http://geekz.nl
File Size:2503
Last Modified:Oct 30 07:15:06 2003
MD5 Checksum:22f491634bf9f13060313a42fd059611

 ///  File Name: sh-httpd.txt
Description:
Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org
File Size:2645
Last Modified:Oct 30 06:59:24 2003
MD5 Checksum:0a6560a983f4d7c86c1eb4c1f8375ba8

 ///  File Name: yax-phpnuke.sh
Description:
Php-nuke v6.6 and spaiz-nuke below v1.2beta remote exploit which allows you to take over the administrator account. In Spanish.
Author:Flux
File Size:4244
Last Modified:Oct 30 06:55:08 2003
MD5 Checksum:d0db271a1958e0baff9284c3401640c7

 ///  File Name: FlexWATCH.txt
Description:
The FlexWATCH surveillance camera server is used by many banks and "secure" places and contains remotely exploitable vulnerabilities which allow remote attackers to view camera footage, add users, remove users, change the configuration, disable camera surveillance, and more.
Author:Slaizer
File Size:7284
Last Modified:Oct 30 06:31:17 2003
MD5 Checksum:656d2fad064108c3fe3c98b3b6f97e4f

 ///  File Name: php.advanced.poll.txt
Description:
PHP Advanced Poll v2.0.2 contains remotely exploitable PHP code injection, file include, and phpinfo vulnerabilities. Exploit URLs and vulnerable code snippets included. Patch and vulnerability details available here.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:5159
Last Modified:Oct 30 05:59:16 2003
MD5 Checksum:56e9fbaca901131a100472faa9d3f17b

 ///  File Name: ld.so.exp.c
Description:
Solaris runtime linker (ld.so.1) local root buffer overflow exploit. Bug discovered by Jouko Pynnonen.
Author:Osker178
File Size:12219
Last Modified:Oct 30 05:21:23 2003
MD5 Checksum:159fa40468397e901231ffb0c7a34c8f

 ///  File Name: iweb.traversal.txt
Description:
Directory traversal attacks against the iWeb mini http server. Exploit URLs included. Vendor URL here.
Author:Chris
Homepage:http://www.cr-secure.net
File Size:1145
Last Modified:Oct 30 05:12:34 2003
MD5 Checksum:dcaefe6f98304668838e20ca5cbcf763

 ///  File Name: byebye.pl
Description:
Xchat script which uses the DCC SEND overflow to kill mIRC clients v6.11 and below.
Author:Josh Medley
Homepage:http://www.liquidcode.org
File Size:675
Last Modified:Oct 30 05:10:00 2003
MD5 Checksum:1040b28d55d687b066bab53964c3f2e5

 ///  File Name: ms03-046.pl
Description:
Exploit for ms03-046 - Microsoft Exchange Server 5.5 and Exchange 2000 buffer overflow, in perl. Denial of service only.
Author:HD Moore
Homepage:http://www.metasploit.com
File Size:5499
Last Modified:Oct 30 05:08:34 2003
MD5 Checksum:17479c516711b178d64dbfcb23ff116f

 ///  File Name: cpCommerce.exp.txt
Description:
cpCommerce v0.5f and below contains an input validation error in _functions.php which allows remote arbitrary code execution. Exploit URL included. Fix available here. Additional information available here.
Author:Astharot
Homepage:http://www.zone-h.org
File Size:1627
Last Modified:Oct 30 05:01:13 2003
MD5 Checksum:fc3d68bc4d70e84ecab8477883ba365d

 ///  File Name: asl_plz.txt
Description:
Information and packet capture of Mirc v6.11 and below DCC SEND buffer overflow exploit which crashes the client.
Author:Omi Da
File Size:2358
Last Modified:Oct 27 21:06:44 2003
MD5 Checksum:a84a0c6eae3a016419e6195491cd79b4

 ///  File Name: iwconfig.c
Description:
Iwconfig local proof of concept exploit - Causes a seg fault. Note that iwconfig is not suid.
Author:NrAziz
File Size:1128
Last Modified:Oct 21 04:37:11 2003
MD5 Checksum:eccf7607942949f8ecfed824257cd7ac

 ///  File Name: deskpro.sql.txt
Description:
DeskPRO v1.1.0 and below do not adequately filter user provided data, allowing a remote attacker to insert malicious SQL statements into existing ones. Allows attackers to login to the system as an administrator without knowing the password.
Author:Aviram Jenik
Homepage:http://www.securiteam.com/unixfocus/6R0052K8KM.html
File Size:1780
Last Modified:Oct 21 03:59:29 2003
MD5 Checksum:6c7179a6ec73486ce67c6556b01c6725

 ///  File Name: gEEk-fuck-khaled.c
Description:
mIRC v6.1 and below remote exploit which takes advantage of the bug described in mirc61.txt. Creates a HTML file which overflows the irc:// URI handling, spawning a local cmd.exe window. The exploit works even if mIRC is not started - The HTML can be in a HTML email or on a web page. Tested against Windows XP build 2600.xpclient.010817-1148.
Author:Blasty
Homepage:http://www.geekz.nl
File Size:3506
Last Modified:Oct 21 03:11:05 2003
MD5 Checksum:bdc38dfedffb7977637c36ede12ea4e8

 ///  File Name: ms03-043.c
Description:
Remote denial of service exploit for the Microsoft Messenger service buffer overflow described in ms03-043 which causes the target machine to reboot. Includes the ability to send the packet from a spoofed source address and requires the remote netbios name. Tested against Windows 2000 SP4.
Author:LSD, ported to Linux and *bsd by VeNoMouS
File Size:5930
Last Modified:Oct 21 02:55:57 2003
MD5 Checksum:75bde2a7d5758f67ec04524fa6b11be9

 ///  File Name: oracle_ownage.c
Description:
Local exploit for Oracle Release 2 Patch Set 3 Version 9.2.0.4.0 for Linux x86 that makes use of a buffer overflow to escalate user privileges via the oracle binary.
Author:c0ntex
File Size:6976
Last Modified:Oct 17 23:04:15 2003
MD5 Checksum:e67aa2d4ffbc82a005daedd92002cbf9

 ///  File Name: linksysDoS.txt
Description:
The Linksys EtherFast Cable/DSL Firewall Router BEFSX41 (Firmware 1.44.3) is susceptible to a denial of service attack when a long string is sent to the Log_Page_Num parameter of the Group.cgi script.
Homepage:http://www.DigitalPranksters.com
File Size:2301
Last Modified:Oct 16 08:08:22 2003
MD5 Checksum:1e142d2d4429f36d6bdbd08409720df8

 ///  File Name: gaimexploit.txt
Description:
Simple notes on how to exploit GAIM via the festival plugin that was written quite poorly.
Author:error
File Size:1689
Last Modified:Oct 16 07:59:43 2003
MD5 Checksum:bf092631c2e47257ae9f6aa6be652dda

 ///  File Name: SA-20031006.txt
Description:
slocate package version 2.6 has a heap overflow that can be used to escalate privileges.
Author:Patrik Hornik
File Size:7504
Last Modified:Oct 15 05:52:24 2003
MD5 Checksum:00b366b2c5e22e03fdbb21c45a07520c

 ///  File Name: pfpoc.c
Description:
Remote root exploit for ProFTPd 1.2.7-1.2.8.
Author:netris
File Size:2659
Last Modified:Oct 14 05:55:13 2003
MD5 Checksum:da4e6897a3b2f1a99efc2ef3fd5b0837