Section:  .. / 0304-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 40 of 40
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: ptrace-kmod.c
Description:
Local root exploit for ptrace/kmod that exploits a race condition which creates a kernel thread in an insecure manner. Works under the 2.2.x and 2.4.x series of kernels.
Author:Wojciech Purczynski
File Size:3921
Last Modified:Apr 2 06:01:21 2003
MD5 Checksum:62a1d99ea86b0d49a09346cb59589f5c

 ///  File Name: les-exploit.c
Description:
Local root exploit for a stack overflow discovered in the linux-atm binary /usr/local/sbin/les.
Author:Angelo Rosiello
Homepage:http://www.dtors.net
File Size:3762
Last Modified:Apr 25 06:31:53 2003
MD5 Checksum:f359e77f4c99e42da154156e7123b11d

 ///  File Name: xlock-XLOCALEDIR.c
Description:
Local root exploit utilizing the overflow in XLOCALEDIR under XFree86 Version 4.2.x using xlock. Written to work on Redhat 7.2.
Author:Omega
File Size:3683
Last Modified:Apr 5 19:24:59 2003
MD5 Checksum:5c46aeb641757ecb42e3148969495004

 ///  File Name: truegalerie.txt
Description:
A problem exists in True Galerie v1.0 that allows a remote attacker to obtain administrative access to this utility due to misuse of cookies.
Author:Frog Man
Homepage:http://www.frog-man.org/tutos/TrueGalerie.txt
File Size:3175
Last Modified:Apr 28 00:21:24 2003
MD5 Checksum:31b936edf4c3057a878bbb7c8906aae4

 ///  File Name: monkeyHTTPd.txt
Description:
The Monkey HTTPd v0.6.1 web server is vulnerable to a remote buffer overflow in the handling of forms submitted with the POST request method. The unchecked buffer lies in the PostMethod() procedure.
Author:Matthew Murphy
File Size:3037
Last Modified:Apr 21 20:44:15 2003
MD5 Checksum:5605063d4420a60aa0206189fb3365c5

 ///  File Name: ptnews.txt
Description:
PT News v1.7.7 allows access to administrator functionality without authentication via news.inc which is included in the index.php file.
Author:scrap
Homepage:http://www.securiteinfo.com
File Size:3035
Last Modified:Apr 22 07:18:22 2003
MD5 Checksum:87798f1e9b8b9a07ac7fd2086b0174f3

 ///  File Name: sp-xeneo.pl
Description:
The Xeneo Web Server v2.2.9.0 is vulnerable to a Denial of Service attack when a GET request with 4096 ?'s are received. Tested against Windows XP Pro SP1 and Windows 2000 SP3.
Author:badpack3t
Homepage:http://www.security-protocols.com
File Size:2810
Last Modified:Apr 22 07:28:55 2003
MD5 Checksum:6005e09c96be815df9a48d1c3c802832

 ///  File Name: badblue.txt
Description:
BadBlue web server versions 2.15 and below have a vulnerability that allows remote attackers to gain administrative control of a server. The ext.dll that allows pages parsing with the LoadPage command attempts to prevent remote users from accessing .hts pages by checking the 'referer' HTTP header of requests, and also verifying that all requests for .hts pages originate from 127.0.0.1 (the loopback).
Author:appending certain illegal characters to the requested filename, it is possible to cause BadBlue to interpret .hts files from a remote system, thereby yielding administrative control of the server to the attacker.
File Size:2350
Last Modified:Apr 21 20:40:09 2003
MD5 Checksum:e98dbd9eeaba1247bc190d69fec06b8b

 ///  File Name: safemode-adv-chitext.txt
Description:
ChiTeX, the utility used to put Chinese Big5 codes in TeX/LaTeX documents, contains two setuid root binaries that execute cat without using an explicit path allowing an attacker to easily gain root privileges.
Author:zillion
Homepage:http://www.safemode.org/
File Size:2322
Last Modified:Apr 3 17:59:56 2003
MD5 Checksum:f107ca1f74294149bd0cffe342b40ffe

 ///  File Name: SFAD03-001.txt
Description:
The iWeb Mini Web Server for Microsoft Windows NT/XP/9x fails to properly filter GET requests for ../ which inadvertently allows for directory traversal attacks.
Author:subversive
File Size:2258
Last Modified:Apr 16 09:13:01 2003
MD5 Checksum:6dce02a7c8a43ebba137e18b57323d67

 ///  File Name: ss-dos.c
Description:
Remote exploit written in C for the Twilight Utilities TW-WebServer that is vulnerable to a denial of service attack by a long HTTP GET request.
Author:Shashank pandey
Homepage:http://geekgroove.8m.com
File Size:2245
Last Modified:Apr 21 20:17:31 2003
MD5 Checksum:7352450188c50b46a73d0b823b566505

 ///  File Name: mod_ntlm.txt
Description:
mod_ntlm is the Apache module for versions 1.3 and 2.0 which gives Apache the ability to authenticate users via the NTLM authentication technology that is largely specific to Microsoft IIS. The log() function contains two remotely exploitable vulnerabilities. Both a heap overflow and an incorrect call to ap_log_rerror() allow for arbitrary code execution.
Author:Matthew Murphy
File Size:2207
Last Modified:Apr 21 20:53:43 2003
MD5 Checksum:ad450fcef6dadc5b28ffbefe83da9432

 ///  File Name: ANHTTPd.txt
Description:
AN HTTPd versions 1.42h and prior ships with a script called count.pl which allows remote attackers to use a directory traversal attack to overwrite the contents of files on the system.
Author:Matthew Murphy
File Size:1984
Last Modified:Apr 22 07:22:18 2003
MD5 Checksum:bb7b403dffcc890d5a26cfb87b43ff22

 ///  File Name: sp-urfuqed.pl
Description:
Remote exploit written in Perl for the Twilight Utilities TW-WebServer that is vulnerable to a denial of service attack by a long HTTP GET request.
Author:badpack3t
Homepage:http://www.security-protocols.com
File Size:1555
Last Modified:Apr 21 20:20:15 2003
MD5 Checksum:8b752ac5486724bb9a3b4ba974aa27f7

 ///  File Name: HackTrack-2003-03-001.txt
Description:
A directory traversal bug exists in the QuickFront webserver that allows remote attackers to gain access to system files. Version affected: 1.0.0.189.
Author:Kachlik Jan
File Size:1269
Last Modified:Apr 10 06:31:55 2003
MD5 Checksum:222a9abd3b16ea36884137398910fb05