Section:  .. / 0306-exploits  /

Page 1 of 2
<< 1 2 >> Files 1 - 25 of 42
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0306-exploits.tgz
Description:
Packet Storm new exploits for June, 2003.
File Size:103237
Last Modified:Aug 28 03:54:22 2003
MD5 Checksum:ac9f4f68ae6eef059db7338a6c6fcb34

 ///  File Name: p_kon.c
Description:
Local root exploit for kon version 0.3.9b-16 that makes use of a buffer overflow discovered in the -Coding switch.
Author:pi3
Homepage:http://www.pi3.int.pl
File Size:2885
Last Modified:Aug 11 18:38:59 2003
MD5 Checksum:29737b73e64d572edabe7d3929c0b632

 ///  File Name: pi3_dos.c
Description:
Denial of service exploit for the Pi3 web server version 2.0.2 that makes use of a malformed GET request.
Author:pi3
Homepage:http://www.pi3.int.pl
File Size:2185
Last Modified:Aug 11 18:37:03 2003
MD5 Checksum:090c3dacc1722382b8016be5acff2d16

 ///  File Name: IIS-DoS.c
Description:
Remote IIS 5.0 denial of service exploit that makes use of the stack based overflow in nsiislog.dll.
Author:Rizzy
Related File:wmediaremote.txt
File Size:1314
Last Modified:Jul 19 01:30:28 2003
MD5 Checksum:28883908e092c49535e0ffceaa364f9e

 ///  File Name: compaq.txt
Description:
The Compaq Web Based Management Agent is vulnerable to server side injection, stack overflows, access violations, and creation of script objects.
Author:Ian Vitek
File Size:2258
Last Modified:Jun 30 21:01:00 2003
MD5 Checksum:b9ea91fe17deda91d69ffffe7d5c6ecc

 ///  File Name: secuniaFTP.txt
Description:
Secunia Security Advisory - The FTPServer/X FTP Server Control and COM Object v1.00.045 and v1.00.046 are vulnerable to buffer overflow that results in a denial of service and potentially can enable a remote attacker to gain access to the machine.
Author:Carsten H. Eiram
Homepage:http://www.secunia.com/secunia_security_advisories/
File Size:6935
Last Modified:Jun 29 23:42:46 2003
MD5 Checksum:941f08cf9a416bbeab1599ebbeadaa93

 ///  File Name: DSR-geekrellm-linux.pl
Description:
Gkrellmd 2.1.10 remote exploit with shellcode that does kill(-1,9) then an exit. Written for Linux and tested on Slackware 9.
Author:kokanin
File Size:1344
Last Modified:Jun 29 22:47:40 2003
MD5 Checksum:4ccf4b85bdadaaaeea4abd31891779f4

 ///  File Name: gkrhack0x03.c.gz
Description:
gkrellmd < 2.1.12 remote exploit for Linux. Tested against Debian 3.0 with version 2.1.4.
Author:r-code
File Size:2526
Last Modified:Jun 29 22:34:53 2003
MD5 Checksum:2eb2a5c1a727b39eab68acb29858ea39

 ///  File Name: suiddmp.c
Description:
Local root exploit that makes use of a race condition vulnerability found in the Linux execve() system call that affects the 2.4 kernel tree.
Author:IhaQueR
File Size:2707
Last Modified:Jun 28 21:12:28 2003
MD5 Checksum:4f95beb18386eb443765c00154f4bc3f

 ///  File Name: DSR-geekrellm.pl
Description:
Gkrellmd 2.1.10 remote exploit with connect back shellcode. Tested on FreeBSD 4.8.
Author:kokanin
File Size:1329
Last Modified:Jun 24 16:12:55 2003
MD5 Checksum:19d0e595e3075a1352589025fa029087

 ///  File Name: kereval.tutos.txt
Description:
Kereval Security Advisory KSA-001 - Cross Site Scripting vulnerabilities exist in Tutos 1.1 allow for hostile code execution.
Author:François SORIN
Homepage:http://www.kereval.com
File Size:4147
Last Modified:Jun 24 07:54:45 2003
MD5 Checksum:dfed6e294cfba88c4ce010d032e6dcdf

 ///  File Name: DSR-korean-elm.pl
Description:
Exploit for Elm version ko-elm-2.4h4.1, the Korean release, that yields gid of bin. Old vulnerability related to this is here. Tested against FreeBSD 4.7.
Author:kokanin
File Size:868
Last Modified:Jun 24 07:48:42 2003
MD5 Checksum:0d17996f879f53f34e331038462c23b4

 ///  File Name: gkrellmd
Description:
Gkrellmd 2.1.10 has a daemon that suffers from a buffer overflow where it does not validate the 128 byte buffer input which allows an attack to crash the daemon resulting in a denial of service.
Author:dodo
Homepage:http://darkwired.ath.cx
File Size:1909
Last Modified:Jun 24 07:08:08 2003
MD5 Checksum:addc11f4375377dbd86df7c0e6ad570a

 ///  File Name: myserver-0.4.1.txt
Description:
MyServer 0.4.1 is vulnerable to a denial of service when a GET request with 20 forward slashes gets sent to the server.
Author:deadbeat
File Size:2936
Last Modified:Jun 24 07:03:53 2003
MD5 Checksum:f3ff412cbcda773136f7d61cd680630d

 ///  File Name: 0x82-GNATS_sux.c
Description:
Local root exploit against GNATS v3.113.x that makes use of a heap based environment variable overflow vulnerability.
Author:Xpl017Elz
Homepage:http://www.inetcop.org
Related File:INetCop.GNATS.txt
File Size:11619
Last Modified:Jun 22 02:03:13 2003
MD5 Checksum:c433613d79f8fd6493b48c10d8b30e3f

 ///  File Name: 0x82-GNATS_own.c
Description:
Local root exploit against GNATS v3.2 that makes use of the heap overflow found in the -d switch.
Author:Xpl017Elz
Homepage:http://www.inetcop.org
Related File:INetCop.GNATS.txt
File Size:6875
Last Modified:Jun 22 02:00:49 2003
MD5 Checksum:39b4e56f07ade73a703b6eada24cb533

 ///  File Name: hack-nethack0x02.tar.gz
Description:
jnethack 1.1.5 and below exploit that yields gid of games. Tested against Debian Woody 3.0.
Author:r-code
File Size:2294
Last Modified:Jun 22 01:26:02 2003
MD5 Checksum:76f578f076dc4e0b37dbf2d7cdc12fb6

 ///  File Name: phpbb_sql.pl
Description:
Remote exploit that makes use of a SQL injection vulnerability that exists in the /viewtopic.php file in phpBB.
Author:Rick Patel
File Size:3941
Last Modified:Jun 22 01:18:11 2003
MD5 Checksum:c235a27445cb8f4acf96b74bf8858576

 ///  File Name: STG-Jeus-Eng.txt
Description:
STG Security Advisory - Java Enterprise User Solution, or JEUS, has a cross site scripting vulnerability issue when invoking non-existent URLs.
Author:Jeremy Bae
Homepage:http://www.stgsecurity.com/
File Size:2664
Last Modified:Jun 22 00:57:20 2003
MD5 Checksum:34f259109c7e976a423209c1b4b69594

 ///  File Name: gm014-ie.txt
Description:
Microsoft Internet Explorer 5.01, 5.5 and 6.0 has a parsing procedure with a flaw in it that may cause arbitrary script commands to be executed in the Local Zone. This can lead to potential arbitrary command execution, local file reading and other severe consequences.
Author:GreyMagic Software
Homepage:http://www.greymagic.com
File Size:4773
Last Modified:Jun 22 00:14:56 2003
MD5 Checksum:94c172dcec3f389d6d6c31e555a923cd

 ///  File Name: consroot.exp
Description:
This script is used to automate escalation of normal user privileges to root making use of FORTH hacking on Sparc hardware.
Author:Michael H.G. Schmidt
File Size:3651
Last Modified:Jun 22 00:08:57 2003
MD5 Checksum:984f4ec5229ee63a42019081e311d2dd

 ///  File Name: mame_exp.c
Description:
Xmame local root exploit for Redhat 7.0 and 7.2 which overflows the --lang switch in /usr/local/bin/xmame.x11.
Author:Gabriel A. Maggiotti
Homepage:http://qb0x.net
File Size:2069
Last Modified:Jun 21 15:40:03 2003
MD5 Checksum:a03ebd641b686886d66250196364a7f8

 ///  File Name: EnceladusServerSuite3.9.11.txt
Description:
Enceladus Server Suite v3.9.11 contains buffer overflows in its ftp server that allow a remote attacker to crash the server with the possibility of remote command execution.
Author:Dr_insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:784
Last Modified:Jun 17 06:09:57 2003
MD5 Checksum:43dd957e5b408e37a72bec408734a911

 ///  File Name: lednews.txt
Description:
LedNews v0.7 lacks any filtering allowing a remote attacker to embed javascript or various HTML tags. It may also be possible to add server side include tags into news posts as well.
Author:Gilbert Vilvoorde
File Size:1196
Last Modified:Jun 17 06:04:16 2003
MD5 Checksum:19026b25c3d9e9ce12f765352372b6a4

 ///  File Name: pMachine.txt
Description:
Pmachine version 2.2.1 has a fault Include() routine that allows a remote attacker to supply a malicious URL that in turn can be a script that the webserver will then execute.
Author:Frog Man
Homepage:http://www.frog-man.org/tutos/pMachineFree2.2.1.txt
File Size:2956
Last Modified:Jun 17 06:00:56 2003
MD5 Checksum:2bb7d7139009e054217b2ecd4df0a457