Section:  .. / 0309-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 47 of 47
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: Mirc-USERHOST-Poc.zip
Description:
Remote MIRC proof of concept exploit that makes use of an overflow in the USERHOST reply to the mirc-client.
Author:Sylvain Descoteaux
File Size:165320
Last Modified:Sep 25 05:28:19 2003
MD5 Checksum:0c6308f424c2487217ea6a89f381c512

 ///  File Name: mounty.c
Description:
Remote root exploit for rpc.mountd that makes use of the xlog off-by-one vulnerability discussed here.
Author:newroot
Homepage:http://www.newroot.de
File Size:9448
Last Modified:Sep 17 18:30:54 2003
MD5 Checksum:eb911a8a195173435b059a49e159a2a7

 ///  File Name: MS03-039-linux.c
Description:
Remote Windows exploit for the RPC DCOM long filename heap overflow discovered by NSFOCUS.
Author:ey4s. This version was ported to Linux by nulluid.
Related File:sa2003-06.txt
File Size:13641
Last Modified:Sep 18 20:31:36 2003
MD5 Checksum:bc05567626bebd91b9ea3c9844b4a56a

 ///  File Name: myPHPNuke.txt
Description:
myPHPNuke version 1.8.8_7 performs improper variable sanitizing that will inadvertently allow a remote attacker to upload files from another site to the current site.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:2845
Last Modified:Sep 13 08:25:35 2003
MD5 Checksum:82ce1f957a210e93e078256ee2002d53

 ///  File Name: myserver043.txt
Description:
MyServer 0.4.3 is susceptible to a directory traversal attack that allows access to files and directories outside of the web root.
Author:Arnaud Jacques aka scrap
Homepage:http://www.securiteinfo.com
File Size:1380
Last Modified:Sep 25 23:05:57 2003
MD5 Checksum:b0cc267b208678ec8492add73805049f

 ///  File Name: netris-shash.c
Description:
Remote exploit for netris version 0.5 on RedHat 8.0 that makes use of a buffer overflow vulnerability where a client connecting to an untrusted netris server could be sent an unusually long data packet, which would be copied into a fixed-length buffer without bounds checking.
Author:Shashank Pandey
File Size:5241
Last Modified:Sep 21 21:06:28 2003
MD5 Checksum:b41e303ebc81036b1621bb7f2266048b

 ///  File Name: pandpdos.txt
Description:
The Plug and Play Web Server version 1.0002c is susceptible to multiple buffer overflow attacks that cause the server to crash.
Author:Bahaa Naamneh
Homepage:http://www.bsecurity.tk
File Size:4014
Last Modified:Sep 18 23:20:56 2003
MD5 Checksum:3ad96e586456835afc357813677d3683

 ///  File Name: pandpdt.txt
Description:
The Plug and Play Web Server version 1.0002c is susceptible to multiple directory traversal attacks allowing a remote attacker to gain access to internal system files.
Author:Bahaa Naamneh
Homepage:http://www.bsecurity.tk
File Size:1258
Last Modified:Sep 18 23:15:33 2003
MD5 Checksum:0aa35da7a4f31656a6ae8a61cb6f88ae

 ///  File Name: rootdown.pl
Description:
Remote exploit for Solaris that only requires a single UDP packet to the sadmind service to execute commands.
Author:H D Moore
Homepage:http://www.metasploit.com/
Related File:09.16.03.txt
File Size:12406
Last Modified:Sep 19 00:51:29 2003
MD5 Checksum:866bc503fccd155f0a660998fd1ee863

 ///  File Name: rp9-priv-esc.c
Description:
RealOne Player 9 exploit for Unix/Linux that escalates privileges to the person using the utility by taking advantage of group write permissions on user configuration files.
Author:Jon Hart
File Size:6183
Last Modified:Sep 11 08:14:45 2003
MD5 Checksum:4445831b67a74340eaffa17ee24060b4

 ///  File Name: rpcHeap.txt
Description:
A detailed analysis and exploitation of the RPC Long Filename heap overflow found in the CoGetInstanceFromFile API that was originally discovered by NSFOCUS.
Author:Flashsky
Homepage:http://www.xfocus.net
Related File:sa2003-06.txt
File Size:20562
Related CVE(s):CAN-2003-0528
Last Modified:Sep 21 21:22:06 2003
MD5 Checksum:0c78799bf2460199a346ad31c4598e7d

 ///  File Name: savant31.txt
Description:
The Savant Web Server version 3.1 for Windows 95, 98, ME, NT, and 2000 is remotely vulnerable to a denial of service condition when various malformed GET requests are passed to the server.
Author:Phuong Nguyen
File Size:1836
Last Modified:Sep 25 04:10:48 2003
MD5 Checksum:1b6abe30608b8908694266f9448c5acf

 ///  File Name: shatterSEH3.txt
Description:
Version three of this paper discussing more shatter attacks that are possible using progress bars. Related information available here.
Author:Brett Moore
Homepage:http://www.security-assessment.com
File Size:5578
Last Modified:Sep 29 20:31:32 2003
MD5 Checksum:1135794bd92aa08169c33e449387a87c

 ///  File Name: smc2404WBR.txt
Description:
Exploit that causes a denial of service against the SMC2404WBR BarricadeT Turbo 11/22 Mbps wireless cable/dsl broadband router by sending random UDP packets to multiple ports.
Author:_6mO_HaCk
File Size:1557
Last Modified:Sep 26 20:46:46 2003
MD5 Checksum:cd13536a95ff8f037417abe72891e053

 ///  File Name: sorpine.c
Description:
Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here.Binds a shell to port 6682. Written for Slackware 8.0, 8.1, and 9.0 and works for RedHat as well.
Author:sorbo
Homepage:http://www.darkircop.org
File Size:20847
Last Modified:Sep 16 21:37:14 2003
MD5 Checksum:f9e9118421a2a9d7c0f6da00eb98f949

 ///  File Name: sp-myserver.c
Description:
Remote denial of service exploit for MyServer 0.4.3.
Author:badpack3t
Homepage:http://www.security-protocols.com
Related File:myserver.txt
File Size:8268
Last Modified:Sep 10 02:21:13 2003
MD5 Checksum:26fe6f995a2b40b213a0a7f660d0d2b5

 ///  File Name: tellurian.txt
Description:
Tellurian TFTPDNT server version 1.8 for Windows NT and Windows 9x suffers from a buffer overflow that allows remote attackers to execute arbitrary code.
Author:Storm
Homepage:http://www.securiteam.com/windowsntfocus/5RP0M1PAUM.html
File Size:2090
Last Modified:Sep 4 05:06:02 2003
MD5 Checksum:59926ee18abe7c877c439b49e109a025

 ///  File Name: TEXONET-20030902.txt
Description:
Texonet Security Advisory 20030902 - SCO OpenServer / Internet Manager (mana) versions 5.0.5 to 5.0.7 are susceptible to escalating a local attacker's privileges due to being tricked into executing the environment variable REMOTE_ADDR when it is set.
Homepage:http://www.texonet.com/
File Size:3991
Last Modified:Sep 16 23:45:03 2003
MD5 Checksum:e110cec39a0883d80e796ab5fd06d804

 ///  File Name: WebX.txt
Description:
WebX 1.1 and WebX Lite 1.1 web servers are vulnerable to a directory traversal attack that allows a remote attacker to access any files outside of the web root.
Author:dr_insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:1962
Last Modified:Sep 10 02:23:36 2003
MD5 Checksum:156de465b5dc858d41dabb4a2546a5d6

 ///  File Name: word.zip
Description:
Exploit that makes use of the Microsoft Word WordPerfect document converter which has been found vulnerable to a buffer overflow when a malicious .doc file is opened.
Author:valgasu
Homepage:http://valgasu.rstack.org/
Related File:mswordcon.txt
File Size:19944
Last Modified:Sep 6 03:32:20 2003
MD5 Checksum:19134e503acc53ad924e617d58add3f7

 ///  File Name: wzftpdos.c
Description:
Remote denial of service exploit for wzdftpd FTP server version 0.1rc5 that sends a single CRLF sequence at login causing an Unhandled exception.
Author:r3b00t
File Size:1250
Last Modified:Nov 4 07:42:37 2003
MD5 Checksum:e7efd476b7117d05c238ecce4243452e

 ///  File Name: xmpg123.c
Description:
mpg123 v0.59r and 0.59s remote client-side heap corruption exploit that makes use of the overflow found in the readstring() function of httpget.c which does not limit the amount of data written to a buffer.
Author:vade79
File Size:20282
Last Modified:Sep 23 17:54:22 2003
MD5 Checksum:578765a85ce61b5cbc41aa2541e2d7dc