Section:  .. / 0308-exploits  /

Page 1 of 2
<< 1 2 >> Files 1 - 25 of 32
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0308-exploits.tgz
Description:
Packet Storm new exploits for August, 2003.
File Size:143580
Last Modified:Sep 9 17:33:53 2003
MD5 Checksum:ee3882f25921fceb2eaabd2c9c6198d0

 ///  File Name: 0x82-WOOoouHappy_new.c
Description:
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here. This is a private and more advanced version of the other exploit located here.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org/
File Size:24551
Last Modified:Aug 11 19:04:10 2003
MD5 Checksum:e32262b59b2c437a042a9c44f585e779

 ///  File Name: 07.30.dcom48.c
Description:
Yet another version of the remote exploit for DCOM. This one includes over 48 targets for Windows variants.
Homepage:http://www.k-otik.com
File Size:21420
Last Modified:Aug 5 18:47:12 2003
MD5 Checksum:ba4ad0bd824948b679e8fd14983f052b

 ///  File Name: priv8-uhagr-halflife.c
Description:
Half-Life remote server root exploit for FreeBSD that works against version lower or equal to 1.1.1.0, and versions 3.1.1.1c1 and 4.1.1.1a.
Author:wsxz, hkvig
Homepage:http://www.priv8security.com
File Size:20755
Last Modified:Aug 5 19:25:00 2003
MD5 Checksum:98b9485c9d0bf54af7b72729976950e0

 ///  File Name: wu262.zip
Description:
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here. Win32 version included that requires cygwin1.dll.
Author:Xpl017Elz. Ported to Win32 by class101.
Homepage:http://x82.inetcop.org/
File Size:18567
Last Modified:Aug 6 17:05:15 2003
MD5 Checksum:d51a154c43964e9060e022535d454572

 ///  File Name: CiscoCasumEst.tgz
Description:
Cisco IOS 12.x/11.x remote exploit for the HTTP integer overflow using a malformed HTTP GET request and two gigabytes of data.
Author:FX
Homepage:http://www.phenoelit.de
Related File:cisco-sn-20030730-ios-2gb-get.shtml
File Size:18004
Last Modified:Aug 10 22:32:06 2003
MD5 Checksum:c9ac23b2148d2852017b34f6302f570b

 ///  File Name: 0x82-wu262.c
Description:
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org/
File Size:17692
Last Modified:Aug 5 19:53:35 2003
MD5 Checksum:ba62e7c09104708dc6d95e0c0e6ccbea

 ///  File Name: THCREALbad.zip
Description:
Helix Universal Server aka Real Server versions 7, 8, and 9 remote root exploit for both Windows and Linux.
Author:Johnny Cyberpunk
Homepage:http://www.thc.org/
Related File:aitel.html
File Size:16740
Last Modified:Aug 26 06:29:26 2003
MD5 Checksum:e17e0be9476f149f39b762dcf3a811ff

 ///  File Name: oc192-dcom.c
Description:
RPC DCOM remote Windows exploit. Includes 2 universal targets, 1 for win2k, and 1 for winXP. This exploit uses ExitThread in its shellcode to prevent the RPC service from crashing upon successful exploitation. It also has several other options including definable bindshell and attack ports.
Author:.:[oc192.us]:.
Homepage:http://www.oc192.us
File Size:16591
Last Modified:Aug 6 17:24:33 2003
MD5 Checksum:d7edc50159c79c3805c83a01e295979b

 ///  File Name: dcom_scan.c
Description:
Scanner which utilizes the RPC DCOM vulnerability in the Windows operating system.
Author:rrm
File Size:16428
Last Modified:Aug 16 07:34:00 2003
MD5 Checksum:ac7619f3c70854b346a05ea6cd8c2af1

 ///  File Name: 0x82-dcomrpc_usemgret.c
Description:
New version of the DCOM remote exploit that uses a magic return address.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org/
File Size:15781
Last Modified:Aug 5 18:32:15 2003
MD5 Checksum:3c971c900f29a65fc93e7c0dd596382e

 ///  File Name: Poc.c.txt
Description:
Yet another version of the remote exploit for DCOM. This one includes over 20 targets for Windows variants.
Author:Sami Anwer Dhillon
File Size:14963
Last Modified:Aug 5 18:43:04 2003
MD5 Checksum:0f858fc576c5d4701cdbffe9821b8502

 ///  File Name: nfm-shatterdame.zip
Description:
DameWare Mini Remote Control Server version 3.71.0.0 and below remote exploit that takes advantage of a shatter style attack.
Author:ash, xenophile, class101.
File Size:10615
Last Modified:Aug 16 04:02:22 2003
MD5 Checksum:72ed2f0b3d6137c5be7a0174c2558259

 ///  File Name: rpcdcom101.zip
Description:
DCOM remote exploit for the Win32 platform utilizing the issue discussed here. This version has 73 offsets including all of the magical offsets.
Author:class101
File Size:10611
Last Modified:Aug 19 05:26:56 2003
MD5 Checksum:e829bf97060988fe1b81bc6aa8362a57

 ///  File Name: m00-HL-portbind.c
Description:
Half-Life client version 1.1.1.0 and below remote exploit that binds a cmd.exe on port 61200.
Author:d4rkgr3y, Over_G
File Size:6184
Last Modified:Aug 12 04:55:43 2003
MD5 Checksum:6f8a47f2b4566909eb71bbda053e52cc

 ///  File Name: dcomworm.zip
Description:
Possibly one of many DCOM scanners/worms in circulation. Makes use of the 48 target exploit.
Author:Legion2000
Homepage:http://legion2000.tk
File Size:5931
Last Modified:Aug 5 21:14:33 2003
MD5 Checksum:14d238481d4104716ef52c87d2b4d3b8

 ///  File Name: wam1040.txt
Description:
WAM! FTP Server version 1.0.4.0 for Windows is susceptible to a directory traversal that allows a remote attacker to break out of the restricted root and download any file on the system.
Author:Peter Winter-Smith
File Size:4949
Last Modified:Aug 11 00:44:31 2003
MD5 Checksum:6747fe92d894edfcff4db9bd8ee18d8d

 ///  File Name: SRT2003-08-01-0126.txt
Description:
Secure Network Operations, Inc. Advisory SRT2003-08-01-0126 - The cdrtools-2.x package comes with a setuid helper binary that allows non-root users to overwrite root owned files. Instructions for local privilege escalation included.
Author:KF
Homepage:http://www.secnetops.com/
File Size:4528
Last Modified:Aug 5 19:10:43 2003
MD5 Checksum:67ea20b7624e4960efb7264ac237a3ab

 ///  File Name: monosex.c
Description:
monop local exploit that achieves privilege escalation to the second player's uid.
Author:^sq
Homepage:http://www.u-n-f.com
File Size:3222
Last Modified:Aug 26 06:35:29 2003
MD5 Checksum:c26759b97943d809aa935799b3c1b387

 ///  File Name: intersystems2.txt
Description:
Further information and research in regards to the InterSystems Cache vulnerabilities discussed here. Two new vulnerabilities have been discovered and exploits are included.
Author:Larry W. Cashdollar
File Size:2680
Related CVE(s):CAN-2003-0497, CAN-2003-0498
Last Modified:Aug 26 05:10:38 2003
MD5 Checksum:d8d2308fa5893bf58ac73513ebf91311

 ///  File Name: bestbuy.txt
Description:
The Best Buy Employee Toolkit software program has a URL Parsing vulnerability in the configuration screen that could allow an attacker to hijack certain network connections or read plain-text passwords.
Author:cmthemc
File Size:2434
Last Modified:Aug 16 07:07:44 2003
MD5 Checksum:7e4100a77219c6924638aa1f01931ec2

 ///  File Name: lukemftp.pl
Description:
realpath(3) lukemftpd remote exploit for FreeBSD 4.8 that makes use of the off-by-one error.
Author:deadbeat.
Related File:FreeBSD-SA-03:08.realpath
File Size:2393
Last Modified:Aug 12 18:29:12 2003
MD5 Checksum:9e343c9c93cd8db1abb79c17d467d652

 ///  File Name: IglooExloit.c
Description:
IglooFTP Pro 3.8 client side remote exploit for Windows XP Pro Build 2600.x. Included shellcode runs notepad.exe.
Author:Vafa Khoshaein
File Size:2035
Last Modified:Aug 9 05:52:38 2003
MD5 Checksum:62c12ed443019a451a9e8c3ec4a5fce0

 ///  File Name: postfixdos.c
Description:
Postfix 1.1.12 remote denial of service exploit.
Author:r3b00t
Related File:postfix1112.txt
File Size:1740
Last Modified:Aug 5 21:25:28 2003
MD5 Checksum:bda3786815480328c8e0581554bf14a8

 ///  File Name: SynAtari800.pl
Description:
Local exploit for the atari800 Atari emulator on Linux. Makes use of the -config overflow.
Author:default, this binary is not normally default on most Linux installations.
File Size:1511
Last Modified:Aug 5 20:37:48 2003
MD5 Checksum:2761f54dffd04f1ea1f5aeacd6520ec8