Section:  .. / 0307-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 64
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: DSR-ftp_clients.pl
Description:
This script runs in place of ftpd to exploit the moxftp/mftp 2.2, cftp 0.12, and Iglooftp 0.6.1 clients. Written to exploit these clients on FreeBSD.
Author:inv
Homepage:http://www.dtors.net
File Size:4935
Last Modified:Jul 7 21:03:12 2003
MD5 Checksum:7dc4f6daf3a63c8b52d05b39e03d6cf2

 ///  File Name: DSR-gnats.pl
Description:
Proof of concept local exploit for gnats version 3.113.1_6 tested on FreeBSD 5.0. If successful, escalates privileges to gnats.
Author:inv
Homepage:http://www.dtors.net/
File Size:620
Last Modified:Jul 20 08:34:44 2003
MD5 Checksum:f35302b106a2fee84c4ceed3da644de6

 ///  File Name: DSR-listproc.pl
Description:
Local root exploit for listproc 8.2.09 written for FreeBSD.
Author:kokanin
Homepage:http://www.dtors.net
Related File:srt2003-1137.txt
File Size:1196
Last Modified:Jul 9 17:51:29 2003
MD5 Checksum:a65af9fb53e73d9c62532f6a4a3e3389

 ///  File Name: DSR-mnogo.pl
Description:
Proof of concept exploit for mnoGoSearch 3.1.20 (and possibly works on 3.2.10) that binds a shell to port 10000. Tested against FreeBSD.
Author:inv
Homepage:http://www.dtors.net
File Size:1194
Last Modified:Jul 11 23:04:32 2003
MD5 Checksum:2c6a3ed744a1a81e74c48085d0b4da50

 ///  File Name: DSR-upclient.pl
Description:
Local exploit for Upclient 5.0.b5 that spawns a shell with kmem privileges. Tested on FreeBSD 5.0.
Author:inv
Homepage:http://www.dtors.net
File Size:633
Last Modified:Jul 15 01:02:55 2003
MD5 Checksum:6956c86d50be5d1076121733aedb2449

 ///  File Name: elf-reloc.c
Description:
A demonstration of ELF relocation.
Author:Soeren Bleikertz
Homepage:http://www.sac.cc
File Size:10869
Last Modified:Jul 29 02:06:36 2003
MD5 Checksum:d072fc2f8db2721c0971aa0ee90e4ab3

 ///  File Name: essenexploit.c
Description:
A buffer overflow exists in the Essentia Web Server for Linux due to bad boundary checking with long urls which are greater than 2000 bytes. Versions higher than 2.12 are vulnerable.
Author:B-r00t
File Size:4241
Last Modified:Jul 4 19:13:57 2003
MD5 Checksum:757c024869e07919914a13548a11d4dd

 ///  File Name: ex_bru.c
Description:
Local root exploit for bru, or Backup and Restore Utility for Unix, that makes use of a stack overflow. Includes both Linux and FreeBSD targets.
Author:Dvdman
Related File:SRT2003-07-16-0358.txt
File Size:2330
Last Modified:Jul 19 01:15:51 2003
MD5 Checksum:9e4e064acba76fd0ff9c367ec8ea852c

 ///  File Name: exceed.c
Description:
Hummingbird's Exceed X emulator mishandles fonts and is vulnerable to both remote and local denial of service attacks and may allow an attacker to remotely gain root privileges.
Author:c0ntex
File Size:6257
Last Modified:Jul 15 01:56:15 2003
MD5 Checksum:0b5ebb158eab213b26366e5f689ba41c

 ///  File Name: eXtreme.c
Description:
Linux eXtremail versions 1.5-8 and below remote root exploit that makes use of a format string vulnerability in its logging mechanism.
Author:B-r00t
Related File:eXtremail.txt
File Size:7734
Last Modified:Jul 7 03:49:04 2003
MD5 Checksum:60ecf98dc6615b43a41e3e95ec8abbbb

 ///  File Name: FBHtoppler.c
Description:
Local exploit for the setgid game toppler. There is a stack overflow vulnerability with how toppler makes use of the HOME environment variable. Successful exploitation escalates user privileges to the group for games.
Author:fbhowns
File Size:3108
Last Modified:Jul 8 00:58:27 2003
MD5 Checksum:faff6a2833b8fb276ce613f446822f67

 ///  File Name: hlbof-client.zip
Description:
Half-Life client versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) remote exploit that will pose as a server that overwrites the stored return address but does not attempt any command execution.
Author:Auriemma Luigi
Homepage:http://www.pivx.com/luigi/
File Size:8268
Last Modified:Jul 29 20:38:34 2003
MD5 Checksum:47c81302e345d9a31e8cb8ee2dab615f

 ///  File Name: hlbof-server.zip
Description:
Half-Life server versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) remote exploit that will cause a denial of service.
Author:Auriemma Luigi
Homepage:http://www.pivx.com/luigi/
Related File:halflife.txt
File Size:8703
Last Modified:Jul 29 20:24:01 2003
MD5 Checksum:5936369be7bf61fd4c0c410f03526b21

 ///  File Name: IEbug.txt
Description:
Internet Explorer 6 has a bug that will lock up the browser if C:\aux is entered. It is similar to the C:\con\con problem where it is trying to access a hardware device. Microsoft claims this bug does not exist.
Author:Fabian Becker
Homepage:http://www.neonomicus.ionichost.com
File Size:652
Last Modified:Jul 7 21:13:23 2003
MD5 Checksum:6ba39980f6227e4a1edf8efb4b71ff75

 ///  File Name: iglooftppro.zip
Description:
Proof of concept exploit for IglooFTP PRO 3.8 and possibly earlier versions. This package suffers from multiple client side vulnerabilities including the banner, username, password, and account SMTP parameters.
Author:Peter Winter-Smith
Related File:IglooFTPPRO.txt
File Size:9525
Last Modified:Jul 7 04:10:45 2003
MD5 Checksum:5d7cd2e211932330dac32ebc4fed8286

 ///  File Name: intersystems.txt
Description:
iDEFENSE Security Advisory 07.01.03: InterSystems Corp. Cache installs with insecure file and directory permissions, thereby allowing local attackers to gain root access by manipulating items in the main package tree. The vulnerability specifically exists because files and directories are open to all users for read, write, and execute operations.
Author:Larry W. Cashdollar
Homepage:http://www.idefense.com/
File Size:3493
Related CVE(s):CAN-2003-0497, CAN-2003-0498
Last Modified:Jul 3 07:30:44 2003
MD5 Checksum:a64a4be588901be55acb1feceb00d908

 ///  File Name: kereval.phpgroup.txt
Description:
Kereval Security Advisory KSA-003 - Cross Site Scripting vulnerabilities exist in Phpgroupware very 0.9.14.003.
Author:François SORIN
Homepage:http://www.kereval.com
File Size:4016
Last Modified:Jul 4 19:46:09 2003
MD5 Checksum:20f15be1a0ddb7d5a03e4844b0352974

 ///  File Name: MABRYdtv.txt
Description:
The Mabry HTTP server version 1.00.047 suffers from multiple directory traversal attacks that allow an attacker to view the content of files outside of the web root.
Author:dr_insane
File Size:1373
Last Modified:Jul 11 21:18:19 2003
MD5 Checksum:c41348186e0a9a2cd7038995494a60a6

 ///  File Name: msqlex.c
Description:
Remote exploit for miniSQL version 1.3 and below that achieves privilege escalation root gid.
Author:The Itch, lucipher
Homepage:http://www.netric.org/
File Size:14277
Last Modified:Jul 24 23:00:07 2003
MD5 Checksum:2fc4590154b857c4bf26fc805bb66099

 ///  File Name: NetScare.c
Description:
Remote buffer overflow denial of service exploit for the Netware Enterprise CGI2PERL.NLM.
Author:Knight420.
File Size:11683
Last Modified:Jul 24 22:56:42 2003
MD5 Checksum:c7063bffb5b954421951423f36a48c07

 ///  File Name: Netsuite121.txt
Description:
Moby's Netsuite 1.21 httpd server is vulnerable to a multitude of directory traversal bugs that allow an attacker to access files outside of the web root.
Author:Dr_insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:2216
Last Modified:Jul 15 02:00:45 2003
MD5 Checksum:13a9b1d37922d0946aefdc3259f7eb32

 ///  File Name: PUPET-simpnews.txt
Description:
Simpnews has an include file vulnerability that allows a remote attacker to load malicious PHP scripts.
Author:PUPET
File Size:2060
Last Modified:Jul 18 02:19:51 2003
MD5 Checksum:41e2b8e194447464b096d39c7b931325

 ///  File Name: sambash-release.c
Description:
Remote root exploit for samba 2.2.7a and below using reply_nttrans(). Written for the Linux x86 platform.
Author:flatline
File Size:25440
Last Modified:Jul 28 02:55:41 2003
MD5 Checksum:e79059d286adde4d8809a56206df5089

 ///  File Name: screenapple.txt
Description:
The screen saver that comes with MacOSX crashes when an large amount of characters are entered and then the return key is pressed. At this point, access to the desktop is achieved.
Author:Delfim Machado
Homepage:http://lab.xpto.org
File Size:2377
Last Modified:Jul 4 20:35:14 2003
MD5 Checksum:5070858a1c37df111b8b6666b66e45ed

 ///  File Name: SCSA019.txt
Description:
Security Corporation Security Advisory [SCSA-019]: Gattaca Server 2003 version 1.0.8.1 and below is vulnerable to displaying of directory contents and files, a denial a service, a directory traversal attack, and cross site scripting.
Author:Gregory Le Bras
Homepage:http://www.Security-Corp.org
File Size:7603
Last Modified:Jul 11 21:43:28 2003
MD5 Checksum:7c03f7aa26c914d304e30bf9e23cd131