Section:  .. / 0412-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 74
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: raptor_libdthelp.c
Description:
Local root exploit for a buffer overflow in CDE libDtHelp library that allows local users to execute arbitrary code via a modified DTHELPUSERSEARCHPATH environment variable and the Help feature. Works against Solaris/SPARC 7/8/9.
Author:Marco Ivaldi
Homepage:http://www.0xdeadbeef.info
File Size:5275
Related CVE(s):CAN-2003-0834
Last Modified:Dec 31 21:34:25 2004
MD5 Checksum:f20ed4f52c6e15b57ab4429efee295fd

 ///  File Name: raptor_ldpreload.c
Description:
Local root exploit for a stack-based buffer overflow in the runtime linker, ld.so.1, on Solaris 2.6 through 9 that allows local users to gain root privileges via a long LD_PRELOAD environment variable.
Author:Marco Ivaldi
Homepage:http://www.0xdeadbeef.info/
File Size:8202
Related CVE(s):CAN-2003-0609
Last Modified:Dec 31 21:31:47 2004
MD5 Checksum:2bec716e5744a67019345db15bc0bc0d

 ///  File Name: raptor_chown.c
Description:
Local exploit for a flaw in Linux kernel that allows for group ownership change and possible system compromise. Tested against Linux kernel versions 2.4.x through 2.4.27-rc3 and 2.6.x through 2.6.7-rc3.
Author:Marco Ivaldi
Homepage:http://www.0xdeadbeef.info/
File Size:2346
Related CVE(s):CAN-2004-0497
Last Modified:Dec 31 21:29:25 2004
MD5 Checksum:43f4d86223937cea4b9e4e7256c1428c

 ///  File Name: pmc.pl.txt
Description:
Remote exploit for phpMyChat 0.14.5 that adds an administrative account.
Author:sysbug
File Size:3412
Last Modified:Dec 31 20:55:58 2004
MD5 Checksum:76d239aa6079f00c2b41ce5ca9007afb

 ///  File Name: e107.pl.txt
Description:
e107 remote exploit that makes use of an unsanitized include().
Author:sysbug
File Size:5505
Last Modified:Dec 31 20:53:57 2004
MD5 Checksum:85b58f0938dbca16f27c00f26bbca6eb

 ///  File Name: angelDust.c
Description:
Snort 2.2.10 and below remote denial of service exploit that makes use of a flaw discovered by Marcin Zgorecki.
Author:Antimatt3r
File Size:2898
Last Modified:Dec 31 20:50:49 2004
MD5 Checksum:4bdcecd0e6e2dfbb74530258e04a2d4f

 ///  File Name: php-openlog.txt
Description:
Proof of concept exploit for the PHP openlog() vulnerability inherent in PHP 4.3.x. Tested against Win2k SP4 and PHP 4.3.5 on Apache 2.0.49.
Author:The Warlock
Homepage:http://go.to/biohazardhq
File Size:5413
Last Modified:Dec 31 20:46:58 2004
MD5 Checksum:4a46b51bf6d846cb40d8756cf4d49de6

 ///  File Name: 2bgalSQL.txt
Description:
2Bgal 2.5.1 is susceptible to a SQL injection vulnerability. Exploitation provided.
Author:Romain Le Guen
Homepage:http://coding.romainl.com
File Size:1561
Last Modified:Dec 31 20:26:09 2004
MD5 Checksum:0612a1c5b2aca659adf176fcfd889d65

 ///  File Name: hijack_apache-0.1a.tar.gz
Description:
A year after the flaw's discovery, this tool has been released to hijack HTTP connections under Apache and Apache2 with mod_php.
Author:EmirAga
Homepage:http://projects.emiraga.com/
File Size:244758
Last Modified:Dec 31 20:05:30 2004
MD5 Checksum:8ee6c5e434322cab0a08624aa930a887

 ///  File Name: cuteftpexpl.c
Description:
CuteFTP Professional version 6.0 local denial of service exploit that makes use of a flaw in the client.
Author:priestmaster
Homepage:http://www.priestmaster.org
Related File:cuteftp60.txt
File Size:4535
Last Modified:Dec 31 19:58:32 2004
MD5 Checksum:0b67c5da6899c42ae95b2fb1f3707b6a

 ///  File Name: eboard40.txt
Description:
e_Board version 4.0 is susceptible to a directory traversal attack.
Author:White_E
Homepage:http://nogimmick.org/
File Size:875
Last Modified:Dec 31 19:27:25 2004
MD5 Checksum:5287f4e4751603f171090e2ceac7eaea

 ///  File Name: ibod_bof.c
Description:
IBOD 1.5.0 and below local proof of concept buffer overflow exploit.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:1696
Last Modified:Dec 31 19:24:27 2004
MD5 Checksum:fbd27c4895e287d344b946fd54d9ae56

 ///  File Name: exploitphpbb.zip
Description:
Perl script exploit extracted from the phpBB worm. This code attempts to deface htmls found on a target machine and attempts to use google to find more machines to attack.
File Size:8704
Last Modified:Dec 31 10:56:02 2004
MD5 Checksum:0bebd43e2dea960bfe8e66831ea79d75

 ///  File Name: lsmcode.txt
Description:
Local root command execution exploit for lsmcode on AIX 5.1 to 5.3.
File Size:214
Last Modified:Dec 30 22:28:28 2004
MD5 Checksum:fcffe0184ed7b96001e095490c14c38c

 ///  File Name: paginit.c
Description:
Local stack overflow exploit for /usr/bin/paginit on AIX versions 5.3/5.2/5.1.
Author:cees-bart
File Size:1550
Last Modified:Dec 30 22:26:58 2004
MD5 Checksum:0bf35a7346b171510b2b1029835a75f3

 ///  File Name: ultrix_dxterm_4.5_exploit.c
Description:
Ultrix 4.5/MIPS dxterm local root exploit.
Author:ztion
File Size:1990
Last Modified:Dec 30 11:16:36 2004
MD5 Checksum:3a2b768b8b6ae7f1e1c85e2551a8e6fe

 ///  File Name: kayako.txt
Description:
Kayako eSupport version 2.x suffers from cross site scripting and SQL injection flaws. Detailed exploitation given.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2477
Last Modified:Dec 30 11:14:52 2004
MD5 Checksum:7c4bc89d826913a9cb09043cb0ecea11

 ///  File Name: cscopesym.c
Description:
Local symlink exploit for cscope versions 15.5 and below.
Author:Gangstuck / Psirac
Related File:SSA-20041122-09.txt
File Size:1066
Last Modified:Dec 30 10:16:02 2004
MD5 Checksum:b97606525a055bb667b0f5116855a42a

 ///  File Name: winrar341.txt
Description:
WinRAR proof of concept buffer overflow exploit for version 3.41 and below.
Author:Vafa Khoshaein
File Size:4418
Last Modified:Dec 30 10:14:22 2004
MD5 Checksum:1e628e892fbc61241ba032079e35f687

 ///  File Name: un-aftpd.c
Description:
Ability ftpd version 2.34 remote root exploit that spawns a shell.
Author:Dark Eagle
Homepage:http://unl0ck.void.ru/
Related Exploit:ability.c"
File Size:5237
Last Modified:Dec 30 09:43:10 2004
MD5 Checksum:48bb322231bed83f5b66b558015635fc

 ///  File Name: rpcl_icmpdos.c
Description:
RICOH Aficio 450/455 PCL 5e printer ICMP remote denial of service exploit.
Author:Kyong Joo
Related File:ricohICMP.txt
File Size:2401
Last Modified:Dec 30 09:34:48 2004
MD5 Checksum:bb7c27ed425ed8d8e49d8d016310e055

 ///  File Name: wgettrap.txt
Description:
Proof of concept exploit for the wget directory traversal vulnerability that affects versions 1.8 and below.
Author:Jan Minar
Related File:wget18x.txt
File Size:2554
Last Modified:Dec 30 09:31:59 2004
MD5 Checksum:81e842b6caff9bc3e4ddb975bd37cea2

 ///  File Name: iwebnegar.txt
Description:
iwebnegar, the farsi weblog software, is susceptible to SQL injection attacks.
Homepage:http://www.karchack.com
File Size:521
Last Modified:Dec 30 09:13:48 2004
MD5 Checksum:0360996620880c5375c3a5ad9ae461ac

 ///  File Name: SSA-20041214-14.txt
Description:
STG Security Advisory: GNUBoard versions 3.39 and below suffer from a PHP injection vulnerability that allows for arbitrary command execution.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:2101
Last Modified:Dec 30 09:09:35 2004
MD5 Checksum:0d87d5003e39e373092c0451a80606ab

 ///  File Name: aspSQL.txt
Description:
asp-rider is susceptible to a SQL injection attack.
File Size:718
Last Modified:Dec 30 08:55:49 2004
MD5 Checksum:27a147d6819cff24a452c961326566f9