Section:  .. / 0307-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 64 of 64
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: shadowchode.tar.gz
Description:
Remote exploit that will cause a denial of service against Cisco routers and switches.
Author:L0cK.
Related File:ciscoIPv4.txt
File Size:212019
Last Modified:Jul 18 20:59:59 2003
MD5 Checksum:be6bf5e146a17153190577d694cf26b6

 ///  File Name: shatterSEH2.txt
Description:
Version two of this paper discussing more shatter attacks that are possible using SEH memory locations to escalate privileges in Windows. Exploit code included. Related information available here.
Author:Brett Moore
Homepage:http://www.security-assessment.com
File Size:6359
Last Modified:Jul 29 19:51:59 2003
MD5 Checksum:128b5b0cdea6aee5c389eaa7ac17b801

 ///  File Name: splatt.txt
Description:
The Splatt Forum engine allows html code insertion for the post icon form input.
Author:Black Angels, Nemesis
File Size:1943
Last Modified:Jul 18 03:46:43 2003
MD5 Checksum:09c345c267efafe1d85c5484feea2ec0

 ///  File Name: SRT2003-07-07-0831.txt
Description:
Secure Network Operations, Inc. Advisory SRT2003-07-07-0831 - IBM U2 UniVerse version 10.0.0.9 and below on Linux and DGUX has a legacy program included in the package that creates hard links as root.
Author:Strategic Reconnaissance Team
Homepage:http://www.secnetops.com
File Size:5677
Last Modified:Jul 18 00:40:34 2003
MD5 Checksum:4f530cac12d1047f485758b27cc63604

 ///  File Name: SRT2003-07-07-0833.txt
Description:
Secure Network Operations, Inc. Advisory SRT2003-07-07-0833 - IBM U2 UniVerse version 10.0.0.9 and below on Linux allows users with uvadm rights the ability to escalate to root privileges.
Author:Strategic Reconnaissance Team
Homepage:http://www.secnetops.com
File Size:4319
Last Modified:Jul 18 00:43:29 2003
MD5 Checksum:13d39a311c7dfaba2c3bd51ccb556553

 ///  File Name: SRT2003-07-07-0913.txt
Description:
Secure Network Operations, Inc. Advisory SRT2003-07-07-0913 - IBM U2 UniVerse version 10.0.0.9 and below commits some abnormal suid behavior in its uvrestore and setacc applications allowing an attacker to monitor other user ttys and more.
Author:Strategic Reconnaissance Team
Homepage:http://www.secnetops.com
File Size:5366
Last Modified:Jul 18 00:47:07 2003
MD5 Checksum:9e89ac21655bf53bd9caae649ef91a26

 ///  File Name: STG-Verity-K2.txt
Description:
STG Security Advisory SSA-20030701-02 - The Verity K2 Toolkit Query Builder suffers from a cross site scripting vulnerability.
Author:SSR Team
File Size:2988
Last Modified:Jul 4 18:46:26 2003
MD5 Checksum:3b7f9bfc19192e033b01fbdd0c4cc63c

 ///  File Name: Verity-K2Toolkit-Eng.txt
Description:
STG Security Advisory SSA-20030701-02: Verity's K2 Toolkit has a XSS vulnerability in its Query Builder.
Author:SSR Team
Homepage:http://www.stgsecurity.com
File Size:2766
Last Modified:Jul 9 17:33:06 2003
MD5 Checksum:e311754582aaf122768c3fb8b1178a66

 ///  File Name: VPASP.txt
Description:
VP-ASP suffers from a SQL injection attack in shopexd.asp. The vulnerability allows a remote attacker to gain full administrative control of the web based interface.
Author:AresU, TioEuy
Homepage:http://bosen.net/releases/
File Size:5317
Last Modified:Jul 7 21:31:50 2003
MD5 Checksum:91c1a47f59fbcc6e6c6536af6ade51a4

 ///  File Name: wilco.zip
Description:
This tool make uses of the recent vulnerabilities discussed here regarding a broadcast buffer overflow and server freeze denial of service discovered in Roger Wilco.
Author:Auriemma Luigi
Homepage:http://www.pivx.com/luigi/
File Size:10220
Last Modified:Jul 4 19:09:03 2003
MD5 Checksum:0ce7866114009e152ce1905369898649

 ///  File Name: Yahoo-ducky.txt
Description:
Yahoo Messenger 5.5 and below suffers from a buffer overflow that was originally discovered and fixed in May of 2002, but has since resurfaced. Systems Affected: Windows NT/2000/SP1/SP2/SP3, Windows ME, Windows 95/98, Windows XP.
Author:Rave, Bob
Homepage:http://www.dtors.net/
File Size:10139
Last Modified:Jul 6 21:29:49 2003
MD5 Checksum:6f46595fb8f8c9ab9e7d127ab94b1f67

 ///  File Name: YahPoo.c
Description:
Exploit for Yahoo Messenger, Yahoo Module that allows for remote command execution on a victim machine via bad URI handling. Requires the victim to view the html.
Author:bob
Homepage:http://www.dtors.net/
File Size:3705
Last Modified:Jul 15 01:08:15 2003
MD5 Checksum:1f8a1f0189da4662ead77ad7254d271a

 ///  File Name: ZH2003-11SA.txt
Description:
Zone-H Security Advisory ZH2003-11SA - Elite News version 1.0.0.0-1.0.0.3 Beta allows direct access to various system files which enables an attacker to retrieve the administrator login name, then utilize that name on another page to set a cookie that will be referenced by yet another page that allows an attacker to post as the administrator.
Author:Trash-80
Homepage:http://www.zone-h.org
File Size:2275
Last Modified:Jul 18 03:54:51 2003
MD5 Checksum:e900152d55dde53d9e5ec8afebc4cf84

 ///  File Name: ZH2003-12SA.txt
Description:
PHP-Gästebuch version 1.60 Beta is vulnerable to various attacks due to information disclosure. The md5 hashed password for the administrator user is retrievable by any remote attacker along with the guestbookdat file containing their saved settings.
Author:Trash-80
Homepage:http://www.zone-h.org
File Size:1733
Last Modified:Jul 25 01:59:38 2003
MD5 Checksum:c8eb6e9944f034550eae837f2e8114cd