Section:  .. / 0309-exploits  /

Page 1 of 2
<< 1 2 >> Files 1 - 25 of 47
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: wzftpdos.c
Description:
Remote denial of service exploit for wzdftpd FTP server version 0.1rc5 that sends a single CRLF sequence at login causing an Unhandled exception.
Author:r3b00t
File Size:1250
Last Modified:Nov 4 07:42:37 2003
MD5 Checksum:e7efd476b7117d05c238ecce4243452e

 ///  File Name: 0309-exploits.tgz
Description:
Packet Storm new exploits for September, 2003.
File Size:289863
Last Modified:Oct 1 18:30:31 2003
MD5 Checksum:59467f6e73e9c68cdd7add8c6a4a0c31

 ///  File Name: guppy.txt
Description:
GuppY versions 2.4p1 and below are susceptible to cross site scripting attacks.
Homepage:http://www.echu.org
File Size:3207
Last Modified:Sep 30 00:47:06 2003
MD5 Checksum:d9b975da70fae430922d7527eeb5c876

 ///  File Name: shatterSEH3.txt
Description:
Version three of this paper discussing more shatter attacks that are possible using progress bars. Related information available here.
Author:Brett Moore
Homepage:http://www.security-assessment.com
File Size:5578
Last Modified:Sep 29 20:31:32 2003
MD5 Checksum:1135794bd92aa08169c33e449387a87c

 ///  File Name: geeklog2.txt
Description:
Geeklog versions 2.x and below are susceptible to cross site scripting vulnerabilities and various SQL injection attacks.
Author:Lorenzo Hernandez Garcia-Hierro
Homepage:http://security.novappc.com
File Size:9088
Last Modified:Sep 29 20:18:03 2003
MD5 Checksum:5e292ac0ff2be42ecabd916e479a3305

 ///  File Name: cfengine.c
Description:
Remote exploit for Cfengine versions 2.-2.0.3 that makes use of a stack overflow discussed here. Binds a shell to port 26112. Tested against RedHat.
Author:jsk
File Size:8044
Last Modified:Sep 29 20:14:22 2003
MD5 Checksum:cc32ba54fe67a178fcd9b423342f3643

 ///  File Name: IBM-DB2-db2licm.c
Description:
Local root exploit for IBM DB2 Universal Database version 7.2 for Linux/s390 which makes use of the db2licm binary that is setuid by default.
Author:Juan Manuel Pascual Escriba
Homepage:http://concepcion.upv.es/~pask
Related File:core.db2.txt
File Size:2234
Related CVE(s):CAN-2003-0758, CAN-2003-0759
Last Modified:Sep 27 01:24:08 2003
MD5 Checksum:66f6d20f27d150e451308763e3f84b2f

 ///  File Name: smc2404WBR.txt
Description:
Exploit that causes a denial of service against the SMC2404WBR BarricadeT Turbo 11/22 Mbps wireless cable/dsl broadband router by sending random UDP packets to multiple ports.
Author:_6mO_HaCk
File Size:1557
Last Modified:Sep 26 20:46:46 2003
MD5 Checksum:cd13536a95ff8f037417abe72891e053

 ///  File Name: DSR-cfengine.pl
Description:
Remote exploit for Cfengine versions 2.-2.0.3 that makes use of a stack overflow discussed here. Tested against FreeBSD 4.8-RELEASE. Binds a shell to port 45295.
Author:kokanin
Homepage:http://www.dtors.net
File Size:1679
Last Modified:Sep 26 15:39:32 2003
MD5 Checksum:bec7a5ae73b4eb63bb76d5151e18f80b

 ///  File Name: atphttp0x06.c
Description:
Remote exploit for atphttpd version 0.4b and below on Linux x86 that binds a shell to port 65535. Tested against Debian 3.0 and RedHat 8.0.
Author:r-code
File Size:9954
Last Modified:Sep 25 23:58:20 2003
MD5 Checksum:12201535f967d9970d38c353615b22a4

 ///  File Name: myserver043.txt
Description:
MyServer 0.4.3 is susceptible to a directory traversal attack that allows access to files and directories outside of the web root.
Author:Arnaud Jacques aka scrap
Homepage:http://www.securiteinfo.com
File Size:1380
Last Modified:Sep 25 23:05:57 2003
MD5 Checksum:b0cc267b208678ec8492add73805049f

 ///  File Name: Mirc-USERHOST-Poc.zip
Description:
Remote MIRC proof of concept exploit that makes use of an overflow in the USERHOST reply to the mirc-client.
Author:Sylvain Descoteaux
File Size:165320
Last Modified:Sep 25 05:28:19 2003
MD5 Checksum:0c6308f424c2487217ea6a89f381c512

 ///  File Name: chat-Xploit.c
Description:
Proof of concept exploit for /usr/sbin/chat on RedHat Linux 7.3. Note: chat is not setuid by default on most installations.
Author:polygrithm
File Size:3697
Last Modified:Sep 25 04:45:03 2003
MD5 Checksum:824304839459bd776fac887b83886e13

 ///  File Name: BRSwebweaver.txt
Description:
WebWeaver version 1.06 and below allows for anonymous surfing of the server if the Host field is set excessively long. It is also susceptible to various denial of services attacks.
Author:euronymous
File Size:2421
Last Modified:Sep 25 04:27:51 2003
MD5 Checksum:7ab029ca9b5cfba5799d80bcd08c6871

 ///  File Name: lansuite2003.txt
Description:
602PRO LanSuite 2003 for Windows is vulnerable to sensitive information disclosure, logs freely being accessible to any remote attacker, the ability to read any file on the server, and directory traversal attacks.
Author:Phuong Nguyen
File Size:2777
Last Modified:Sep 25 04:13:56 2003
MD5 Checksum:3f7b94da5c8b74ee04a3d3dcc11918d5

 ///  File Name: savant31.txt
Description:
The Savant Web Server version 3.1 for Windows 95, 98, ME, NT, and 2000 is remotely vulnerable to a denial of service condition when various malformed GET requests are passed to the server.
Author:Phuong Nguyen
File Size:1836
Last Modified:Sep 25 04:10:48 2003
MD5 Checksum:1b6abe30608b8908694266f9448c5acf

 ///  File Name: xmpg123.c
Description:
mpg123 v0.59r and 0.59s remote client-side heap corruption exploit that makes use of the overflow found in the readstring() function of httpget.c which does not limit the amount of data written to a buffer.
Author:vade79
File Size:20282
Last Modified:Sep 23 17:54:22 2003
MD5 Checksum:578765a85ce61b5cbc41aa2541e2d7dc

 ///  File Name: lsh_exploit.c
Description:
Remote exploit for lsh 1.4.x that makes use of a boundary error in read_line.c when checking for errors. Spawns a bindshell on port 45295.
Author:Haggis aka Carl Livitt.
File Size:8179
Last Modified:Sep 23 17:22:37 2003
MD5 Checksum:60a9d09b21839048217308ccd3cf3dd4

 ///  File Name: rpcHeap.txt
Description:
A detailed analysis and exploitation of the RPC Long Filename heap overflow found in the CoGetInstanceFromFile API that was originally discovered by NSFOCUS.
Author:Flashsky
Homepage:http://www.xfocus.net
Related File:sa2003-06.txt
File Size:20562
Related CVE(s):CAN-2003-0528
Last Modified:Sep 21 21:22:06 2003
MD5 Checksum:0c78799bf2460199a346ad31c4598e7d

 ///  File Name: netris-shash.c
Description:
Remote exploit for netris version 0.5 on RedHat 8.0 that makes use of a buffer overflow vulnerability where a client connecting to an untrusted netris server could be sent an unusually long data packet, which would be copied into a fixed-length buffer without bounds checking.
Author:Shashank Pandey
File Size:5241
Last Modified:Sep 21 21:06:28 2003
MD5 Checksum:b41e303ebc81036b1621bb7f2266048b

 ///  File Name: 0x333hztty.c
Description:
Local root exploit for hztty 2.0 that makes use of the buffer overflows discovered by Jens Steube.
Author:c0wboy
Homepage:http://www.0x333.org
File Size:1688
Related CVE(s):CAN-2003-0783TestedonRedHat90
Last Modified:Sep 21 20:36:57 2003
MD5 Checksum:1d319b945284869c7bd86d5af02d4d0e

 ///  File Name: rootdown.pl
Description:
Remote exploit for Solaris that only requires a single UDP packet to the sadmind service to execute commands.
Author:H D Moore
Homepage:http://www.metasploit.com/
Related File:09.16.03.txt
File Size:12406
Last Modified:Sep 19 00:51:29 2003
MD5 Checksum:866bc503fccd155f0a660998fd1ee863

 ///  File Name: pandpdos.txt
Description:
The Plug and Play Web Server version 1.0002c is susceptible to multiple buffer overflow attacks that cause the server to crash.
Author:Bahaa Naamneh
Homepage:http://www.bsecurity.tk
File Size:4014
Last Modified:Sep 18 23:20:56 2003
MD5 Checksum:3ad96e586456835afc357813677d3683

 ///  File Name: pandpdt.txt
Description:
The Plug and Play Web Server version 1.0002c is susceptible to multiple directory traversal attacks allowing a remote attacker to gain access to internal system files.
Author:Bahaa Naamneh
Homepage:http://www.bsecurity.tk
File Size:1258
Last Modified:Sep 18 23:15:33 2003
MD5 Checksum:0aa35da7a4f31656a6ae8a61cb6f88ae

 ///  File Name: gyan_pine.c
Description:
Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here. Binds a shell to port 10000. Tested against RedHat Linux 7.0.
Author:Gyan Chawdhary
File Size:3944
Last Modified:Sep 18 23:09:48 2003
MD5 Checksum:2b5be512d212c9827dc8c6867ec28473