Section:  .. / 0303-exploits  /

Page 1 of 2
<< 1 2 >> Files 1 - 25 of 40
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: cpanel.exe
Description:
Remote CGI exploit written in Perl for Cpanel 5 Guestbook. Spawns a bash shell with the uid of the webserver. Windows version. Warning: Use this binary at your own risk.
Author:Spabam
Homepage:http://spabam.tk
File Size:960370
Last Modified:Mar 11 04:06:39 2003
MD5 Checksum:4f268fd0b9bbd2b1a18650f544f0492a

 ///  File Name: 0303-exploits.tgz
Description:
Packet Storm new exploits for March, 2003.
File Size:631802
Last Modified:Sep 23 20:38:21 2003
MD5 Checksum:8de821018c3d03573538a1be238a2355

 ///  File Name: gespuis.c
Description:
Gespuis acts as an irc bouncer and exploits BitchX/Epic clients spawning a bindshell.
Author:eSDee
Homepage:http://www.netric.org
File Size:38855
Last Modified:Mar 29 06:21:14 2003
MD5 Checksum:3ca5ef2ff1acf701252d9a1695323968

 ///  File Name: OpenFuck.c
Description:
Remote exploit for Apache + OpenSSL v0.9.6d and below. This exploit is based upon the openssl-too-open exploit by Solar Eclipse and offers more than 130 targets including various flavors of Linux.
Author:Spabam
Homepage:http://spabam.tk
File Size:33244
Last Modified:Mar 14 17:41:29 2003
MD5 Checksum:b6a3b4dc6f8899a7d85a1f7318d8bce4

 ///  File Name: wd.pl
Description:
Wd.pl is a remote IIS exploit in perl which exploits the bug in ntdll.dll described inms03-007. Tested on Windows 2000 Advanced Server SP3 - Korean language edition.
Author:JW Oh
Homepage:http://monkey.org/~mat/
File Size:20857
Last Modified:Mar 27 09:34:39 2003
MD5 Checksum:bc7a10f11c570c05c9270352b83bc6cb

 ///  File Name: rs_iis.c
Description:
Proof of concept exploit that will bind a cmd.exe shell on a given port utilizing the vulnerability in ntdll.dll described in ms03-007.
Author:RoMaNSoFt
Homepage:http://www.rs-labs.com/
File Size:20022
Last Modified:Apr 11 03:29:09 2003
MD5 Checksum:bde683df66587c96ac1fc655a0bcd706

 ///  File Name: phpnuke60.txt
Description:
PHP Nuke 6.0 is vulnerable to multiple SQL injection attacks that will allow an attacker to access member lists, show users by user ID, show moderators, show administrators, privilege escalation, and more.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:14864
Last Modified:Mar 11 00:06:31 2003
MD5 Checksum:47e2a6def3c9208720bc85f64acb23dc

 ///  File Name: USG-ipp.c
Description:
IS 5.0 / Windows 2000 mass scanner / rooter which spawns a shell from a vulnerable system back over to the machine from where the attack is launched.
Author:USG
Homepage:http://www.usg.org.uk
File Size:13553
Last Modified:Mar 13 04:05:22 2003
MD5 Checksum:f2661e8b34090be5c1ebafa036fe7f79

 ///  File Name: wb.c
Description:
Ntdll.dll remote IIS exploit which exploits the bug described inms03-007. Attempts to spawn a remote shell.
Author:Kralor
Homepage:http://www.coromputer.net
File Size:9412
Last Modified:Mar 25 06:41:29 2003
MD5 Checksum:ad7e1825587e07dd7be6c3a99a53089b

 ///  File Name: elfrape.c
Description:
Proof of concept exploit that will patch an ELF binary to utilize the stack overflow in file 3.39 and below. If someone runs file against said binary, a suid shell is created as /tmp/.sh of that uid.
File Size:9233
Last Modified:Jun 22 07:32:46 2004
MD5 Checksum:b1285b85abea7af08f5c4dc1bf2c4338

 ///  File Name: outblaze.txt
Description:
Outblaze web based email is vulnerable to user cookie spoofing that will allow an attacker to retrieve a user's password.
Author:Xpl017Elz
File Size:8514
Last Modified:Mar 17 20:12:15 2003
MD5 Checksum:e5b6b1ace59084e8b7a607d370416569

 ///  File Name: lhttpd00r.c
Description:
LHTTPd 0.1 remote buffer overflow exploit for the Win32 platform. This exploits a buffer overflow in GET request handling of HTTPd 0.1 for Microsoft Windows and binds a shell to the desired port.
Author:uid0x00
File Size:7969
Last Modified:Mar 4 06:14:10 2003
MD5 Checksum:91f2bbbde3b22b3d8b5d11536dccfa80

 ///  File Name: s0h_Win32hlp.c
Description:
Win32hlp exploit for the :LINK overflow that traps a .CNT file with arbitrary code that once downloaded will execute without a user being prompted for verification. Tested against Windows 2000 PRO/SERVER SP0/SP1/SP2.
Author:ThreaT
Homepage:http://s0h.cc/~threat/
File Size:7186
Last Modified:Mar 11 03:30:27 2003
MD5 Checksum:8f66b0353e98a096871afda6e17c2f63

 ///  File Name: SCSA012.txt
Description:
Security Corporation Security Advisory [SCSA-012]: The Sambar server default installation has a cgi-bin directory which contains executables that allow remote users to view information regarding the operating system and web server's directory. It also path disclosure and tons of cross site scripting vulnerabilities.
Author:Gregory Le Bras
Homepage:http://www.Security-Corp.org
File Size:6759
Last Modified:Mar 29 06:17:16 2003
MD5 Checksum:2c0035655e239bc15b151194d7f7a88d

 ///  File Name: alexandria.txt
Description:
Alexandria versions 2.5 and 2.0, the open-source project management system used by Sourceforge, has multiple vulnerabilities in its PHP scripts. In the upload scripts there is a lack of input validation that allows an attacker to remotely retrieve any files off of the system, such as /etc/passwd. Other vulnerabilities including the sendmessage.php script allowing spammers to make use of it to mask real source identities and various cross site scripting problems exist as well.
Author:Ulf Harnhammar
Homepage:http://www.secunia.com/
File Size:6179
Last Modified:Mar 29 09:12:11 2003
MD5 Checksum:53ef53a2cf3fb8f1209246dfd6d1f124

 ///  File Name: ST-tcphump.c
Description:
ST-tcphump.c is a remote tcpdump ISAKMP denial of service exploit. Sends a packet on UDP port 500 which sends tcpdump into an infinite loop upon receipt of the specially crafted packet. Supports spoofed and non-spoofed packets.
Author:The Salvia Twist
Homepage:http://hack.batcave.net
File Size:6116
Last Modified:Mar 3 06:59:03 2003
MD5 Checksum:e3e6e05e044908ead42c57f538a48be8

 ///  File Name: oC-localX.c
Description:
oC-localX.c is a XFree86 Version 4.2.x local root exploit which overflows the XLOCALEDIR environment variable. Tested against Slackware 8.1.
Author:Dcryptr, Tarranta
Homepage:http://crionized.net
File Size:5822
Last Modified:Mar 3 07:51:54 2003
MD5 Checksum:79b1d63117f04cf3bf5dc206a4169cdf

 ///  File Name: 85pxe.c
Description:
Remote exploit for Intel's PXE (Pre-boot eXecution Environment) daemon on RedHat Linux 8.0.
Author:CrZ, LByte
Homepage:http://lbyte.void.ru
File Size:5696
Last Modified:Mar 17 07:35:29 2003
MD5 Checksum:2f512e5088c11ba8c64b2bfd733a7f06

 ///  File Name: core.gnome.txt
Description:
CORE Security Technologies Advisory - A vulnerability exists in GNOME's Eye of Gnome versions 2.2.0 and below that is locally exploitable. When EOG is used as a default image viewer, it takes in the image name as a command line argument and in turn can execute arbitrary commands with the privileges of the user attempting to view the image.
Homepage:http://www.coresecurity.com
File Size:5543
Last Modified:Mar 29 09:03:13 2003
MD5 Checksum:b683e87cc57b124ad78cf448c8ab8409

 ///  File Name: sphereexp.c
Description:
Exploit for the win32 Sphere Server .55i from the Ultima Online Server Emulator.
Author:sloth
Homepage:http://www.nopninjas.com
File Size:5221
Last Modified:Jul 6 21:48:53 2003
MD5 Checksum:e74b4d13c36b0b4a46576a1bf92939ff

 ///  File Name: elfrape2.c
Description:
Proof of concept exploit that will patch an ELF binary to utilize the stack overflow in file 3.39 and below. If someone runs file against said binary, a suid shell is created as /tmp/.sh of that uid. New version works on both Linux and the BSDs .
File Size:4791
Last Modified:Jun 22 07:33:03 2004
MD5 Checksum:7d7f9c560785a0ae752cb43a175504ba

 ///  File Name: hoagie_solarisldap.c
Description:
Local exploit for the SUNWlldap library buffer overflow vulnerability on Sun Solaris x86.
Author:Andi
File Size:4272
Last Modified:Mar 14 20:48:09 2003
MD5 Checksum:61e4ea12099a43481c81da63481e4cc7

 ///  File Name: axis1exp-13_3_0.c
Description:
Exploit for remote administrative access on the freeware Ultima Online server emulator from sphereserver.com. Tested against axissvr 0.13.3.0.
Author:sloth
Homepage:http://www.nopninjas.com
File Size:4093
Last Modified:Jul 6 21:47:07 2003
MD5 Checksum:a91fed4ea17cee3ec66f075169cff84e

 ///  File Name: 0x333toper-local.c
Description:
Local exploit that yields gid of games for /usr/bin/toppler. Tested against RedHat 8.0.
Author:nic
Homepage:http://www.0x333.org
File Size:4039
Last Modified:Jul 18 03:27:33 2003
MD5 Checksum:3227eb42cffcb5a73535d8935e16bc6c

 ///  File Name: fws160.txt
Description:
Forum Web Server v1.60 has multiple vulnerabilities including a directory traversal that can be used to get usernames and passwords for the server and a cross site scripting vulnerability during message replies.
Author:Dennis Rand
Homepage:http://www.Infowarfare.dk/
File Size:3727
Last Modified:Mar 7 09:59:47 2003
MD5 Checksum:f2d5d6463673b7a4caa5d34559f0ed13