Section:  .. / 0501-exploits  /

Page 4 of 4
<< 1 2 3 4 >> Files 75 - 92 of 92
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: top_ex.pl
Description:
Proof of concept exploit for an old format string vulnerability in setuid versions of top. This vulnerability has popped back up in the Solaris 10 Companion CD.
Author:Kevin Finisterre
Related File:DMA-2005-0103a.txt
File Size:2931
Last Modified:Jan 5 05:22:21 2005
MD5 Checksum:30e63e8e67f59c652ec55c5f2f5cfc66

 ///  File Name: trn-test.txt
Description:
Local root exploit for /usr/bin/trn. Tested on Mandrake 9.2, Slackware 9.1.0/10.0.0.
Author:ZzagorR
Homepage:http://www.rootbinbash.com/
File Size:2228
Last Modified:Jan 27 04:58:35 2005
MD5 Checksum:eccb9e46d859b8d7283889195634aa02

 ///  File Name: un-htget_0.9x.txt
Description:
Local root exploit for htget versions 0.9.x and below.
Author:nekd0
Homepage:http://unl0ck.void.ru/
File Size:994
Last Modified:Jan 6 03:56:25 2005
MD5 Checksum:adf05b016c2b23bded09c401ec9f22c5

 ///  File Name: uselib24.c
Description:
Modified uselib() local exploit for the Linux kernel series. This version has been modified to also work on SMP kernels. Linux kernel versions 2.4 up to and including 2.4.29-pre3, 2.6 up to and including 2.6.10 are affected.
Author:timhsu
Homepage:http://www.chroot.org
File Size:18743
Related CVE(s):CAN-2004-1235
Last Modified:Jan 27 05:55:09 2005
MD5 Checksum:7d1888194c26d9c12a40a81c1aa3e184

 ///  File Name: vanisher.tgz
Description:
Proof of concept exploit for the Windows ANI File Parsing vulnerability along with a complete detailed paper describing the process of creating it.
Author:Assaf Reshef
Homepage:http://underwar.livedns.co.il/projects/ani/
Related Exploit:InternetExploiter3.2.zip"
File Size:2950
Last Modified:Jan 16 00:30:29 2005
MD5 Checksum:2d66477114e19c1583d4f4b6fa68194d

 ///  File Name: veritasABS.c
Description:
Remote stack overflow exploit for Veritas Backup Exec. Works for versions 9.1.4691.SP1, 9.1.4691.SP0, and 8.5.3572. Allows for a shell to be bound to port 101 or it spawn a reverse shell as well.
Author:class101
Related File:12.16.04-5.txt
File Size:38588
Related CVE(s):CAN-2004-1172
Last Modified:Jan 12 07:00:39 2005
MD5 Checksum:72015033c9e98600771603805897d0be

 ///  File Name: viewcvs.txt
Description:
ViewCVS 0.9.2 is susceptible to cross site scripting and HTTP-response splitting flaws.
Author:Joxean Koret
File Size:2503
Last Modified:Jan 2 21:53:29 2005
MD5 Checksum:5a6ee9d029cb6f76d95245fb11eb032c

 ///  File Name: w32dasmbof.disasm_me
Description:
Local proof of concept exploit for W32Dasm which suffers from a classic buffer overflow vulnerability when analyzing files.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:w32dasmbof.txt
File Size:2560
Last Modified:Jan 25 08:52:16 2005
MD5 Checksum:c47e3a1d1537b77c56f9e8f526960c2f

 ///  File Name: waraxe-2005-SA039.txt
Description:
SGallery version 1.01 suffers from path disclosure, file inclusion, and SQL injection bugs.
Author:Janek Vind
Homepage:http://www.waraxe.us/advisory-39.html
File Size:5338
Last Modified:Jan 16 00:25:34 2005
MD5 Checksum:feecc216969ec510ec6b27d4066ce481

 ///  File Name: WC-ms05002-ani-expl-cb.c
Description:
Microsoft Internet Explorer .ANI file handling exploit. Modified version of the houseofdabus exploit. Universal version of the exploit. Tested on: Windows Server 2003, Windows XP SP0/SP1, Windows 2000 SP2/SP3/SP4.
Author:WhiskyCoders
Homepage:http://bennupg.ath.cx
Related Exploit:HOD-ms05002-ani-expl.c "
File Size:8176
Last Modified:Jan 31 00:06:24 2005
MD5 Checksum:d7655c62bf4f64164f7a24520e057746

 ///  File Name: WebAdmin302.txt
Description:
Alt-N WebAdmin, the web application used to administer MDaemon and RelayFax, is susceptible to cross site scripting, html injection, and unauthenticated account modification vulnerabilities. Versions 3.0.2 and below are susceptible.
Author:David Alonso Perez
File Size:2634
Last Modified:Jan 29 09:37:08 2005
MD5 Checksum:b3c073f533c811a3079686b8142631ff

 ///  File Name: WebWasherCONNECT.txt
Description:
WebWasher Classic has a design flaw weakness where the CONNECT method allows remote attackers to connect to any server listening on the localhost interface of the proxy server.
Author:Oliver Karow
Homepage:http://www.oliverkarow.de/
File Size:1406
Last Modified:Jan 29 09:14:25 2005
MD5 Checksum:73ddc497f3ae9999b4e962bbea99a087

 ///  File Name: winaceHKI.txt
Description:
WinAce WinHKI version 1.4d suffers from a directory traversal flaw that allows a compressed archive to overwrite files below the extraction directory.
Author:Rafel Ivgi
Homepage:http://theinsider.deep-ice.com
File Size:2410
Last Modified:Jan 7 02:32:01 2005
MD5 Checksum:df3b6d9cc21e72eda8409905d80e03a8

 ///  File Name: wins_ms04_045.pm
Description:
Remote Microsoft Windows WINS exploit created by the Metasploit Framework.
Author:H.D. Moore
Homepage:http://www.metasploit.com/
Related File:sa13466.txt
File Size:8275
Last Modified:Jan 12 08:12:51 2005
MD5 Checksum:3fbe335508354d4c720f728cfff557f6

 ///  File Name: winToken.c
Description:
Local privilege escalation exploit for the improper token validation vulnerability discovered in Microsoft Windows 2000/2003/XP.
Related File:AppSecInc.token.txt
File Size:1763
Last Modified:Jan 12 06:36:42 2005
MD5 Checksum:980d2fbbed6fa3361e5e14aa4fbf0a1a

 ///  File Name: woltlabXSS.txt
Description:
Woltlab Burning Board Lite version 1.0.0 and 1.0.1e are susceptible to a cross site scripting flaw.
Author:Martin Heistermann
File Size:968
Last Modified:Jan 11 02:24:17 2005
MD5 Checksum:7a9c468289b188eda701354e7ce28e40

 ///  File Name: xfkey.c
Description:
fkey version 0.0.2 local file accessibility exploit.
Author:vade79
Homepage:http://fakehalo.us/
File Size:3636
Last Modified:Jan 25 06:21:05 2005
MD5 Checksum:2afe0de2da98e6a863a419723fd42326