Section:  .. / 0302-exploits  /

Page 1 of 1
<< 1 >> Files 1 - 21 of 21
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 0302-exploits.tgz
Description:
Packet Storm new exploits for February, 2003.
File Size:44805
Last Modified:Aug 12 18:42:56 2003
MD5 Checksum:84de4b102d3937e7a827dd07d7e32247

 ///  File Name: absolute_uk2.pl
Description:
Absolute Telnet v2.00 buffer overflow exploit in perl. Creates a fake server for the client to connect to, and sends an overflow string once it connects. Tested against Windows XP, based on an advisory by kain@ircop.dk.
Author:Deadbeat
File Size:4959
Last Modified:Feb 18 11:09:05 2003
MD5 Checksum:efb5f8069a8009f009dfcc20853a62c5

 ///  File Name: beauchamp02032003.txt
Description:
A specially constructed Java Applet crashes Opera versions 6.05 and 7.01. Opera's own class files in the opera.jar library are susceptible to a buffer overrun which causes a JVM crash and then crashes Opera.
Author:Marc Schoenefeld
Homepage:http://www.illegalaccess.org
File Size:3364
Last Modified:Feb 11 05:13:17 2003
MD5 Checksum:725fec5e451ee6bf4bcbb1761bddc632

 ///  File Name: bison_slap.pl
Description:
BisonFTP v4.r2 remote denial of service exploit in perl. Tested against Windows 98.
Author:Deadbeat
Homepage:http://oakey.no-ip.com:82/uk2sec/
File Size:804
Last Modified:Feb 19 08:26:46 2003
MD5 Checksum:277856a954e219f9d43732719681b0ef

 ///  File Name: chat-local.c
Description:
Chat Local root exploit for redhat. Requires chat to be +s for root exploitation. Useful for breaking out from restricted Shells. Tested on Redhat 7.1, 7.2, and 7.3.
Author:c0w_d0g3
Homepage:http://oakey.no-ip.com:82/uk2sec/
File Size:1469
Last Modified:Feb 19 08:21:48 2003
MD5 Checksum:5303c6838e7ca0979a0692c70d9f8a5f

 ///  File Name: DSR-cpanel.c
Description:
Cpanel 5 and below remote exploit which allows users to view any file or execute remote commands due to an insecure open call in guestbook.cgi. Local root vulnerabilities also exist.
Author:Bob
Homepage:http://www.dtors.net
File Size:1584
Last Modified:Feb 20 10:15:38 2003
MD5 Checksum:3b3e532e3718324aaa6fa16ed89e63f2

 ///  File Name: DSR-nethack.c
Description:
Nethack v3.4.0 local buffer overflow exploit which spawns a shell as uid=games. Runs /usr/games/lib/nethackdir/nethack.
Author:Bob
Homepage:http://www.dtors.net
File Size:2128
Last Modified:Feb 20 10:12:48 2003
MD5 Checksum:3b81d062cf1cb44bc672fbd44da2173e

 ///  File Name: efstool-local.c
Description:
Efstool Local root exploit for redhat. Requires efstool to be +s for root exploitation. Useful for breaking out from restricted shells. Tested on Redhat 7.1, 7.2, and 7.3.
Author:c0w_d0g3
Homepage:http://oakey.no-ip.com:82/uk2sec/
File Size:1585
Last Modified:Feb 19 08:23:56 2003
MD5 Checksum:78953c7df4174a50294ac9c4d9e742a7

 ///  File Name: EMUMAIL5.x.txt
Description:
Parameter validation bugs exist in Emumail v5.x which allow remote denial of service and allow remote users to view any account history.
Author:Dr_insane
File Size:3611
Last Modified:Feb 19 09:13:32 2003
MD5 Checksum:ea4bcc708b43c31933aeea832cfe6070

 ///  File Name: ex_stmkfont.sh
Description:
HPUX local buffer overflow exploit for stmkfont which attempts to spawn a gid=bin shell. Tested on HPUX B11.11.
Author:Watercloud
Homepage:http://www.xfocus.org
File Size:1004
Last Modified:Feb 24 01:19:52 2003
MD5 Checksum:05612e25e66d3230934a22c2cc07a40f

 ///  File Name: ftp_banner.txt
Description:
Both the 32 FTP Client version p9.49.01 and ByteCatcher FTP Client V1.04b are susceptible to being crashed due to a large banner. Arbitrary code execution against the client may be possible.
Author:Dennis Rand
Homepage:http://www.infowarfare.dk
File Size:3193
Last Modified:Feb 4 15:46:15 2003
MD5 Checksum:e70a992d2288266bf6f813b4d09f1d4c

 ///  File Name: majordomo_leakage.txt
Description:
Majordomo, the popular mailing list utility, defaults which_access to open in the configuration file. A list of email accounts for a mailing list can be compromised by this de-facto setting by sending which @. Patch included.
Author:Marco van Berkum, Jakub Klausa
File Size:5013
Last Modified:Feb 4 09:06:57 2003
MD5 Checksum:7c5a6d5fb943b636027c61c62cd94d09

 ///  File Name: moxftp.txt
Description:
Moxftp v2.2 and below contains buffer overflow vulnerabilities which allow remote code execution. Includes exploit code which sends a shell.
Author:Knud Erik Højgaard
Homepage:http://kokanins.homepage.dk
File Size:1446
Last Modified:Feb 24 01:35:23 2003
MD5 Checksum:a2887996e92bf9602abb6740e92d9b63

 ///  File Name: nethack.pl
Description:
Local Exploit for a buffer overflow in /usr/ports/games/nethack32 which gives a privilege escalation to group id games.
Author:Knud Erik Højgaard
File Size:908
Last Modified:Feb 11 04:52:45 2003
MD5 Checksum:f378d2b030c8552612f15a6d6c1eaf20

 ///  File Name: pwck-local.c
Description:
/usr/sbin/pwck local root exploit for linux. Affects only +s pwck, remember though its a good way to break free from restricted shells - even to the same UID. Tested on Red Hat 7.1, 7.2, and 7.3.
Author:c0w_d0g3
Homepage:http://oakey.no-ip.com:82/uk2sec/
File Size:1222
Last Modified:Feb 19 08:18:09 2003
MD5 Checksum:c82ad0cde72f8529d0ca0c3e8899e234

 ///  File Name: slocate_sparc.pl
Description:
Local root exploit for slocate on Linux-Sparc.
Author:deadbeat
Related File:MDKSA-2003:015.txt
File Size:1131
Last Modified:Aug 12 17:24:09 2003
MD5 Checksum:18b263d22c67433ac2accd80dd963e1d

 ///  File Name: solaris-at.c
Description:
Solaris "at -r" tmp race condition exploit which allows users to remove any file on the system.
Author:Wojciech Purczynski
Homepage:http://isec.pl
File Size:7429
Last Modified:Feb 6 08:40:27 2003
MD5 Checksum:107ec9758b5a552f2eaef1fbafd4cabf

 ///  File Name: THCunREAL.zip
Description:
Remote root exploit for Realserver 8 on several Windows platforms.
Author:Johnny Cyberpunk
Homepage:http://www.thc.org/misc/sploits
File Size:17527
Last Modified:Feb 11 05:18:17 2003
MD5 Checksum:70745652eb1e4a3cf9ae25c7d58bde54

 ///  File Name: webmail_local.pl
Description:
Cpanel + Openwebmail local root exploit in perl which affects Cpanel 5 and below. Attempts to copy a suid root zsh into /tmp by exploiting /usr/local/cpanel/base/openwebmail/oom.
Author:Deadbeat and c0w_d0g3
Homepage:http://oakey.no-ip.com:82/uk2sec/
File Size:984
Last Modified:Feb 20 10:09:52 2003
MD5 Checksum:7e63aefe7851c82f7b4cf3fb23c7f0ee

 ///  File Name: Xperl_yabbse_mass.tar.gz
Description:
Yabase v1.5.0 and below remote scanner / exploit tool which takes advantage of a bug in an include named Packages.php.
Author:X-perl
File Size:2373
Last Modified:Feb 18 11:03:35 2003
MD5 Checksum:34b3822b69b141eac2c588036fabdc07

 ///  File Name: yabbse.pl
Description:
Yabase v1.5.0 remote exploit to spawn bash shell with Apache uid.
Author:Spabam
File Size:3682
Last Modified:Apr 5 19:49:21 2003
MD5 Checksum:564186b311e373f97f0129b5326a655a