Section:  .. / 0303-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 40 of 40
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: cpanel.pl
Description:
Remote CGI exploit written in Perl for Cpanel 5 Guestbook. Spawns a bash shell with the uid of the webserver.
Author:Spabam
Homepage:http://spabam.tk
File Size:3611
Last Modified:Mar 14 16:49:18 2003
MD5 Checksum:b74b98833c694b43c9004d61d7c35c97

 ///  File Name: sa2003-01.txt
Description:
NSFOCUS Security Advisory SA2003-01 - The NSFOCUS Security Team has found a buffer overflow vulnerability in Microsoft Windows XP Redirector that can be exploited locally and can allow attackers to crash the system or gain local system privilege by carefully crafted code.
Author:NSFOCUS Security Team
Homepage:http://www.nsfocus.com
File Size:3607
Last Modified:Mar 29 05:58:33 2003
MD5 Checksum:32f822ed02f74b915809f044498b5f9f

 ///  File Name: 85deadelf.c
Description:
Exploit for the file(1) buffer overflow vulnerability found by iDEFENSE. When file is run upon this binary, a shell is bound to port 2003.
Author:CrZ
File Size:3589
Last Modified:Mar 7 08:17:08 2003
MD5 Checksum:a353c1302cbcbc300c36e3265e98f555

 ///  File Name: phpnuke60.2.txt
Description:
PHP Nuke 6.0 has vulnerabilities in the Forums and Private_Messages modules which allow attackers to save forum information and user data to a text file.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:3318
Last Modified:Mar 11 08:23:34 2003
MD5 Checksum:80c22a6eceb2e375d163e34b0c7ebe30

 ///  File Name: SCSA009.txt
Description:
Security Corporation Security Advisory [SCSA-009]: PHP ping, a utility that allows an end user to ping a remote machine, has a vulnerability which allows remote attackers to execute commands remotely and could lead to compromise of some, if not all, the operating system.
Author:Grégory Le Bras
Homepage:http://www.Security-Corp.org
File Size:3081
Last Modified:Mar 7 10:08:24 2003
MD5 Checksum:b5ba86dd6ce4774640f9e4b1a2721d49

 ///  File Name: ftpd.pl
Description:
The CuteFTP 5.0 client is vulnerable to an overflow in the LIST response. This exploit spawns a fake FTP daemon that will take advantage of an inbound vulnerable client.
Author:snooq
Homepage:http://www.angelfire.com/linux/snooq/
File Size:2836
Last Modified:Mar 29 05:44:14 2003
MD5 Checksum:2ec2f7ed3b9660b30d8669fe95b5e839

 ///  File Name: mailex-gen.c
Description:
pgp4pine local exploit for version 1.76 (and possibly below) for the buffer overflow which allows specially crafted emails the ability to execute arbitrary code on the recipient box when the mail is opened.
Author:Eric AUGE
File Size:2778
Last Modified:Mar 13 03:53:36 2003
MD5 Checksum:76503e21270ebc034fdc743270bb6075

 ///  File Name: postnuke723.txt
Description:
Postnuke v0.723 has SQL injection and directory traversal vulnerabilities which allow an attacker to view directories and perform remote command execution.
Author:pokleyzz
Homepage:http://www.scan-associates.net
File Size:2039
Last Modified:Mar 11 03:45:36 2003
MD5 Checksum:284a2e4c39b826426f271806dc067b58

 ///  File Name: kebi.txt
Description:
INetCop Security Advisory #2002-0x82-013 - The Kebi Academy 2001 Web Solution suffers from a basic directory traversal vulnerability which may allow remote attackers to execute code on the server.
Author:dong-houn yoU
File Size:2012
Last Modified:Mar 17 20:06:18 2003
MD5 Checksum:170b01b195b33ebb9f6ea136257d9c6b

 ///  File Name: DSR-unreal.c
Description:
Local exploit for Unreal IRC daemon 3.2.
Author:Rave
Homepage:http://www.dtors.net
File Size:1773
Last Modified:Mar 11 03:19:46 2003
MD5 Checksum:3944c76e3276bbbb584f20f211bc1545

 ///  File Name: 0x333cya.tar.gz
Description:
0x333cya.tar.gz is a Mandrake 9.0 local root exploit which uses bugs in the printer-drivers package. Cya.c gets group sys privileges with a bug in /usr/bin/mtink, and anger.c uses the sys privileges to exploit a bug in /usr/bin/ml85p, spawning a root shell.
Author:Cowboy
Homepage:http://www.0x333.org
File Size:1682
Last Modified:Mar 3 07:10:12 2003
MD5 Checksum:c6654bda25cad0217945eee8922be483

 ///  File Name: rs_iis_xpl.pl
Description:
Rs_iis_xpl.pl is a remote exploit for rs_iis.c, a remote IIS exploit. Sets up a web server, and if rs_iis.c is used to attempt an exploit, a shell will be spawned on the attacking host. Tested against FreeBSD 4.7-RELEASE-p7.
Author:Knud Erik Højgaard
File Size:1570
Last Modified:Apr 1 09:52:06 2003
MD5 Checksum:666e7e0351c92f9cd0454a234f39b9e9

 ///  File Name: oC-zlib.c
Description:
Zlib gzprintf() proof-of-concept buffer overflow exploit.
Author:dcryptr
Homepage:http://crionized.net
File Size:1530
Last Modified:Nov 24 20:04:40 2003
MD5 Checksum:d5b1906d63b88374446744f7749febd4

 ///  File Name: xf42local.c
Description:
Local root exploit utilizing the overflow in XLOCALEDIR under XFree86 Version 4.2.x using xterm. Tested against Slackware 8.1 with kernel version 2.2.25.
Author:r3b00t
Homepage:http://r3b00t.tx.pl
File Size:1009
Last Modified:Nov 4 07:40:36 2003
MD5 Checksum:c6db6a549211c9f37b33706e6efd1435

 ///  File Name: DSR-toppler.pl
Description:
Local exploit to get gid of games for toppler.
Author:Kokanin
Homepage:http://www.dtors.net
File Size:592
Last Modified:Mar 11 03:17:28 2003
MD5 Checksum:cff54e7df97086e60b0a29f381d442d0