Section:  .. / 0303-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 40 of 40
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: phpnuke60.2.txt
Description:
PHP Nuke 6.0 has vulnerabilities in the Forums and Private_Messages modules which allow attackers to save forum information and user data to a text file.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:3318
Last Modified:Mar 11 08:23:34 2003
MD5 Checksum:80c22a6eceb2e375d163e34b0c7ebe30

 ///  File Name: phpnuke60.txt
Description:
PHP Nuke 6.0 is vulnerable to multiple SQL injection attacks that will allow an attacker to access member lists, show users by user ID, show moderators, show administrators, privilege escalation, and more.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:14864
Last Modified:Mar 11 00:06:31 2003
MD5 Checksum:47e2a6def3c9208720bc85f64acb23dc

 ///  File Name: postnuke723.txt
Description:
Postnuke v0.723 has SQL injection and directory traversal vulnerabilities which allow an attacker to view directories and perform remote command execution.
Author:pokleyzz
Homepage:http://www.scan-associates.net
File Size:2039
Last Modified:Mar 11 03:45:36 2003
MD5 Checksum:284a2e4c39b826426f271806dc067b58

 ///  File Name: rs_iis.c
Description:
Proof of concept exploit that will bind a cmd.exe shell on a given port utilizing the vulnerability in ntdll.dll described in ms03-007.
Author:RoMaNSoFt
Homepage:http://www.rs-labs.com/
File Size:20022
Last Modified:Apr 11 03:29:09 2003
MD5 Checksum:bde683df66587c96ac1fc655a0bcd706

 ///  File Name: rs_iis_xpl.pl
Description:
Rs_iis_xpl.pl is a remote exploit for rs_iis.c, a remote IIS exploit. Sets up a web server, and if rs_iis.c is used to attempt an exploit, a shell will be spawned on the attacking host. Tested against FreeBSD 4.7-RELEASE-p7.
Author:Knud Erik Højgaard
File Size:1570
Last Modified:Apr 1 09:52:06 2003
MD5 Checksum:666e7e0351c92f9cd0454a234f39b9e9

 ///  File Name: s0h_Win32hlp.c
Description:
Win32hlp exploit for the :LINK overflow that traps a .CNT file with arbitrary code that once downloaded will execute without a user being prompted for verification. Tested against Windows 2000 PRO/SERVER SP0/SP1/SP2.
Author:ThreaT
Homepage:http://s0h.cc/~threat/
File Size:7186
Last Modified:Mar 11 03:30:27 2003
MD5 Checksum:8f66b0353e98a096871afda6e17c2f63

 ///  File Name: sa2003-01.txt
Description:
NSFOCUS Security Advisory SA2003-01 - The NSFOCUS Security Team has found a buffer overflow vulnerability in Microsoft Windows XP Redirector that can be exploited locally and can allow attackers to crash the system or gain local system privilege by carefully crafted code.
Author:NSFOCUS Security Team
Homepage:http://www.nsfocus.com
File Size:3607
Last Modified:Mar 29 05:58:33 2003
MD5 Checksum:32f822ed02f74b915809f044498b5f9f

 ///  File Name: SCSA009.txt
Description:
Security Corporation Security Advisory [SCSA-009]: PHP ping, a utility that allows an end user to ping a remote machine, has a vulnerability which allows remote attackers to execute commands remotely and could lead to compromise of some, if not all, the operating system.
Author:Grégory Le Bras
Homepage:http://www.Security-Corp.org
File Size:3081
Last Modified:Mar 7 10:08:24 2003
MD5 Checksum:b5ba86dd6ce4774640f9e4b1a2721d49

 ///  File Name: SCSA012.txt
Description:
Security Corporation Security Advisory [SCSA-012]: The Sambar server default installation has a cgi-bin directory which contains executables that allow remote users to view information regarding the operating system and web server's directory. It also path disclosure and tons of cross site scripting vulnerabilities.
Author:Gregory Le Bras
Homepage:http://www.Security-Corp.org
File Size:6759
Last Modified:Mar 29 06:17:16 2003
MD5 Checksum:2c0035655e239bc15b151194d7f7a88d

 ///  File Name: sphereexp.c
Description:
Exploit for the win32 Sphere Server .55i from the Ultima Online Server Emulator.
Author:sloth
Homepage:http://www.nopninjas.com
File Size:5221
Last Modified:Jul 6 21:48:53 2003
MD5 Checksum:e74b4d13c36b0b4a46576a1bf92939ff

 ///  File Name: ST-tcphump.c
Description:
ST-tcphump.c is a remote tcpdump ISAKMP denial of service exploit. Sends a packet on UDP port 500 which sends tcpdump into an infinite loop upon receipt of the specially crafted packet. Supports spoofed and non-spoofed packets.
Author:The Salvia Twist
Homepage:http://hack.batcave.net
File Size:6116
Last Modified:Mar 3 06:59:03 2003
MD5 Checksum:e3e6e05e044908ead42c57f538a48be8

 ///  File Name: USG-ipp.c
Description:
IS 5.0 / Windows 2000 mass scanner / rooter which spawns a shell from a vulnerable system back over to the machine from where the attack is launched.
Author:USG
Homepage:http://www.usg.org.uk
File Size:13553
Last Modified:Mar 13 04:05:22 2003
MD5 Checksum:f2661e8b34090be5c1ebafa036fe7f79

 ///  File Name: wb.c
Description:
Ntdll.dll remote IIS exploit which exploits the bug described inms03-007. Attempts to spawn a remote shell.
Author:Kralor
Homepage:http://www.coromputer.net
File Size:9412
Last Modified:Mar 25 06:41:29 2003
MD5 Checksum:ad7e1825587e07dd7be6c3a99a53089b

 ///  File Name: wd.pl
Description:
Wd.pl is a remote IIS exploit in perl which exploits the bug in ntdll.dll described inms03-007. Tested on Windows 2000 Advanced Server SP3 - Korean language edition.
Author:JW Oh
Homepage:http://monkey.org/~mat/
File Size:20857
Last Modified:Mar 27 09:34:39 2003
MD5 Checksum:bc7a10f11c570c05c9270352b83bc6cb

 ///  File Name: xf42local.c
Description:
Local root exploit utilizing the overflow in XLOCALEDIR under XFree86 Version 4.2.x using xterm. Tested against Slackware 8.1 with kernel version 2.2.25.
Author:r3b00t
Homepage:http://r3b00t.tx.pl
File Size:1009
Last Modified:Nov 4 07:40:36 2003
MD5 Checksum:c6db6a549211c9f37b33706e6efd1435