Section:  .. / 0310-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 42 of 42
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: proftpdr00t.c
Description:
Remote root exploit for ProFTPd versions 1.2.7 - 1.2.9rc2 that breaks the chroot and uses brute force. Tested against SuSE 8.0/8.1 and RedHat 7.2/8.0.
Author:Haggis
File Size:20280
Last Modified:Oct 14 05:52:33 2003
MD5 Checksum:499e84e8c8590d9bb323ea7c761673f8

 ///  File Name: ms2k3traversal.txt
Description:
Microsoft Windows Server 2003 allows a remote attacker to traverse directories and access arbitrary files via shell: references.
Author:Eiji James Yoshida
File Size:3816
Last Modified:Oct 9 07:47:37 2003
MD5 Checksum:4358258836ecf8434dba681ac39b3d17

 ///  File Name: dtprintinfo.txt
Description:
HPUX dtprintinfo on B.11.00 is vulnerable to a buffer overflow that can allow for privilege escalation.
Author:Davide Del Vecchio
Homepage:http://www.alighieri.org
File Size:1936
Last Modified:Oct 9 07:30:52 2003
MD5 Checksum:c28c1505ec6a76bab631cb245e45fd2f

 ///  File Name: openoffice110.txt
Description:
Illegalaccess.org Security Alert - Openoffice 1.1.0 is vulnerable to a denial of service attack when enabled and a TCP connection to the daemon gets fed a bunch of zeroes.
Author:Marc Schoenefeld
Homepage:http://www.illegalaccess.org
File Size:1153
Last Modified:Oct 9 07:26:24 2003
MD5 Checksum:6379b995196fde39663d7c7af9de8cd2

 ///  File Name: wmpphp.txt
Description:
Exploit that swaps the Windows Media Player with a message from Mindlock by making use of the Internet Explorer 6 XML bypass flaw.
Author:Mindwarper
Homepage:http://mindlock.bestweb.net
Related File:IE6XMLbypass.txt
File Size:1862
Last Modified:Oct 8 01:07:16 2003
MD5 Checksum:8f88cac317274919b012a79b8cac352d

 ///  File Name: easyfile12.txt
Description:
Easy File Sharing Web Server 1.2 allows for remote access to logs and options without any type of authentication.
Author:nimber
Homepage:http://nimber.plux.ru
File Size:2544
Last Modified:Oct 6 23:55:30 2003
MD5 Checksum:d5619a7af590c8ed019e96a20685cd2e

 ///  File Name: conexant.txt
Description:
The Conexant Access Runner DSL Console has faulty authentication capabilities that allow an attacker to login as the administrator after one failed attempt.
Author:Chris Norton
File Size:785
Last Modified:Oct 6 22:11:01 2003
MD5 Checksum:ef90ad98b9812873986dd8461f0b578c

 ///  File Name: I2S-LAB-25-09-2003.txt
Description:
I2S LAB Security Advisory - The HTTP daemon for FirstClass build 133 (SP3) and below suffers from a heap overflow that allows a remote attacker to shutdown various services on the server.
Author:Fred Chaverot, Aurélien Boudoux
Homepage:http://www.I2S-LaB.com
File Size:4561
Last Modified:Oct 6 21:29:43 2003
MD5 Checksum:ba4b7562f6fe8af950ac6534737239a0

 ///  File Name: guppy24.txt
Description:
GuppY versions 2.4p3 and below are susceptible to cross site scripting attacks and have a lack of authentication when various data submissions are performed.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:5835
Last Modified:Oct 6 21:09:56 2003
MD5 Checksum:750a17e26237a6be3d4788f970d7a31a

 ///  File Name: EMML.txt
Description:
EMML version 1.32, or EternalMart Mailing List Manager, and EMGB version 1.1, or EternalMart Guestbook, are both vulnerable to cross site scripting attacks that allow for remote PHP code execution from another site.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:1599
Last Modified:Oct 6 21:04:59 2003
MD5 Checksum:8c1b6f25babfb7d196152e0d98026950

 ///  File Name: php67.txt
Description:
PHP Nuke 6.7 is susceptible to allowing arbitrary file upload and execution via the file mailattach.php.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:1686
Last Modified:Oct 6 20:47:51 2003
MD5 Checksum:b5a09e84e738ddde438a2384f168814a

 ///  File Name: cafelog.txt
Description:
WordPress Cafelog is vulnerable to a number of SQL injection attacks that allow a local attacker with access to the same filesystem as the database to exploit.
Author:Seth Woolley
File Size:2690
Last Modified:Oct 3 23:23:10 2003
MD5 Checksum:ed17f61eb59c8f6d8edcea50685c919c

 ///  File Name: leap.tgz
Description:
Exploit that brute forces Microsoft's Active Directory authentication used in conjunction with the Cisco LEAP authentication on Cisco wireless access points. Related writing here.
File Size:11668
Last Modified:Oct 3 22:38:34 2003
MD5 Checksum:e8a8d7a237a6939d59520e342161c120

 ///  File Name: prockill.txt
Description:
Inside the PostThreadMessage API, any user of any security level can give a WM_QUIT message causing the process to terminate. Sample exploit code included.
Author:Brett Moore
Homepage:http://www.security-assessment.com
File Size:6073
Last Modified:Oct 2 18:54:32 2003
MD5 Checksum:c0fedf0d4109221190edc25b07a689d0

 ///  File Name: winshadow.zip
Description:
OmniCon WinShadow version 2.0 exploit that makes use of a buffer overflow in the client handling of hostnames in host files.
Author:Peter Winter-Smith, Bahaa Naamneh
Homepage:http://www.elitehaven.net/
Related File:winshadow.txt target=ext
File Size:1604
Last Modified:Oct 1 23:06:19 2003
MD5 Checksum:8d3a1c77d7fbb35349c0e91686aa49dd

 ///  File Name: dcpportal.txt
Description:
DCP Portal 5.5 is susceptible to multitudes of SQL injection attacks.
Author:Lifo Fifo
Homepage:http://www.hackingzone.org/
File Size:2097
Last Modified:Oct 1 18:43:32 2003
MD5 Checksum:142855eac3a735ea182606e9af60918d

 ///  File Name: c-sillyPoker.c
Description:
Local proof of concept exploit that makes use of the HOME environment variable related overflow in Silly Poker v0.25.5. Yields group id of games.
Author:demz
Homepage:http://www.c-code.net
File Size:2317
Last Modified:Oct 1 18:26:14 2003
MD5 Checksum:2fd90ac8f55bff836228b9a176515ae2