Section:  .. / 0310-exploits  /

Page 1 of 2
<< 1 2 >> Files 1 - 25 of 42
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0310-exploits.tgz
Description:
Packet Storm new exploits for October, 2003.
File Size:91652
Last Modified:Dec 10 03:25:00 2003
MD5 Checksum:63cd13d549e08c661624ae5de22a9818

 ///  File Name: proftpdr00t.c
Description:
Remote root exploit for ProFTPd versions 1.2.7 - 1.2.9rc2 that breaks the chroot and uses brute force. Tested against SuSE 8.0/8.1 and RedHat 7.2/8.0.
Author:Haggis
File Size:20280
Last Modified:Oct 14 05:52:33 2003
MD5 Checksum:499e84e8c8590d9bb323ea7c761673f8

 ///  File Name: php-nuke.6.5.php.txt
Description:
PHP-Nuke v6.5 and Spaiz-nuke v1.2 SQL injection exploit written in PHP. Adds an admin account.
Author:Blade
Homepage:http://www.fihezine.tsx.to
File Size:19194
Last Modified:Oct 30 19:12:23 2003
MD5 Checksum:075b3b2c3a8864197675515e90a3342d

 ///  File Name: ld.so.exp.c
Description:
Solaris runtime linker (ld.so.1) local root buffer overflow exploit. Bug discovered by Jouko Pynnonen.
Author:Osker178
File Size:12219
Last Modified:Oct 30 05:21:23 2003
MD5 Checksum:159fa40468397e901231ffb0c7a34c8f

 ///  File Name: leap.tgz
Description:
Exploit that brute forces Microsoft's Active Directory authentication used in conjunction with the Cisco LEAP authentication on Cisco wireless access points. Related writing here.
File Size:11668
Last Modified:Oct 3 22:38:34 2003
MD5 Checksum:e8a8d7a237a6939d59520e342161c120

 ///  File Name: x-ws_ftp.c
Description:
WS_FTP server <= v4.0.1 for Windows 2000 remote stack overflow exploit which binds a shell to a port. Requires a ftp account.
Author:Eyas
Homepage:http://www.xfocus.net
File Size:8918
Last Modified:Oct 30 19:28:30 2003
MD5 Checksum:d1c0de9f904bf4d9a6e68e991267a850

 ///  File Name: SA-20031006.txt
Description:
slocate package version 2.6 has a heap overflow that can be used to escalate privileges.
Author:Patrik Hornik
File Size:7504
Last Modified:Oct 15 05:52:24 2003
MD5 Checksum:00b366b2c5e22e03fdbb21c45a07520c

 ///  File Name: FlexWATCH.txt
Description:
The FlexWATCH surveillance camera server is used by many banks and "secure" places and contains remotely exploitable vulnerabilities which allow remote attackers to view camera footage, add users, remove users, change the configuration, disable camera surveillance, and more.
Author:Slaizer
File Size:7284
Last Modified:Oct 30 06:31:17 2003
MD5 Checksum:656d2fad064108c3fe3c98b3b6f97e4f

 ///  File Name: oracle_ownage.c
Description:
Local exploit for Oracle Release 2 Patch Set 3 Version 9.2.0.4.0 for Linux x86 that makes use of a buffer overflow to escalate user privileges via the oracle binary.
Author:c0ntex
File Size:6976
Last Modified:Oct 17 23:04:15 2003
MD5 Checksum:e67aa2d4ffbc82a005daedd92002cbf9

 ///  File Name: prockill.txt
Description:
Inside the PostThreadMessage API, any user of any security level can give a WM_QUIT message causing the process to terminate. Sample exploit code included.
Author:Brett Moore
Homepage:http://www.security-assessment.com
File Size:6073
Last Modified:Oct 2 18:54:32 2003
MD5 Checksum:c0fedf0d4109221190edc25b07a689d0

 ///  File Name: ms03-043.c
Description:
Remote denial of service exploit for the Microsoft Messenger service buffer overflow described in ms03-043 which causes the target machine to reboot. Includes the ability to send the packet from a spoofed source address and requires the remote netbios name. Tested against Windows 2000 SP4.
Author:LSD, ported to Linux and *bsd by VeNoMouS
File Size:5930
Last Modified:Oct 21 02:55:57 2003
MD5 Checksum:75bde2a7d5758f67ec04524fa6b11be9

 ///  File Name: guppy24.txt
Description:
GuppY versions 2.4p3 and below are susceptible to cross site scripting attacks and have a lack of authentication when various data submissions are performed.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:5835
Last Modified:Oct 6 21:09:56 2003
MD5 Checksum:750a17e26237a6be3d4788f970d7a31a

 ///  File Name: ms03-046.pl
Description:
Exploit for ms03-046 - Microsoft Exchange Server 5.5 and Exchange 2000 buffer overflow, in perl. Denial of service only.
Author:HD Moore
Homepage:http://www.metasploit.com
File Size:5499
Last Modified:Oct 30 05:08:34 2003
MD5 Checksum:17479c516711b178d64dbfcb23ff116f

 ///  File Name: php.advanced.poll.txt
Description:
PHP Advanced Poll v2.0.2 contains remotely exploitable PHP code injection, file include, and phpinfo vulnerabilities. Exploit URLs and vulnerable code snippets included. Patch and vulnerability details available here.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:5159
Last Modified:Oct 30 05:59:16 2003
MD5 Checksum:56e9fbaca901131a100472faa9d3f17b

 ///  File Name: I2S-LAB-25-09-2003.txt
Description:
I2S LAB Security Advisory - The HTTP daemon for FirstClass build 133 (SP3) and below suffers from a heap overflow that allows a remote attacker to shutdown various services on the server.
Author:Fred Chaverot, Aurélien Boudoux
Homepage:http://www.I2S-LaB.com
File Size:4561
Last Modified:Oct 6 21:29:43 2003
MD5 Checksum:ba4b7562f6fe8af950ac6534737239a0

 ///  File Name: yax-phpnuke.sh
Description:
Php-nuke v6.6 and spaiz-nuke below v1.2beta remote exploit which allows you to take over the administrator account. In Spanish.
Author:Flux
File Size:4244
Last Modified:Oct 30 06:55:08 2003
MD5 Checksum:d0db271a1958e0baff9284c3401640c7

 ///  File Name: ms2k3traversal.txt
Description:
Microsoft Windows Server 2003 allows a remote attacker to traverse directories and access arbitrary files via shell: references.
Author:Eiji James Yoshida
File Size:3816
Last Modified:Oct 9 07:47:37 2003
MD5 Checksum:4358258836ecf8434dba681ac39b3d17

 ///  File Name: gEEk-fuck-khaled.c
Description:
mIRC v6.1 and below remote exploit which takes advantage of the bug described in mirc61.txt. Creates a HTML file which overflows the irc:// URI handling, spawning a local cmd.exe window. The exploit works even if mIRC is not started - The HTML can be in a HTML email or on a web page. Tested against Windows XP build 2600.xpclient.010817-1148.
Author:Blasty
Homepage:http://www.geekz.nl
File Size:3506
Last Modified:Oct 21 03:11:05 2003
MD5 Checksum:bdc38dfedffb7977637c36ede12ea4e8

 ///  File Name: cafelog.txt
Description:
WordPress Cafelog is vulnerable to a number of SQL injection attacks that allow a local attacker with access to the same filesystem as the database to exploit.
Author:Seth Woolley
File Size:2690
Last Modified:Oct 3 23:23:10 2003
MD5 Checksum:ed17f61eb59c8f6d8edcea50685c919c

 ///  File Name: pfpoc.c
Description:
Remote root exploit for ProFTPd 1.2.7-1.2.8.
Author:netris
File Size:2659
Last Modified:Oct 14 05:55:13 2003
MD5 Checksum:da4e6897a3b2f1a99efc2ef3fd5b0837

 ///  File Name: sh-httpd.txt
Description:
Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org
File Size:2645
Last Modified:Oct 30 06:59:24 2003
MD5 Checksum:0a6560a983f4d7c86c1eb4c1f8375ba8

 ///  File Name: easyfile12.txt
Description:
Easy File Sharing Web Server 1.2 allows for remote access to logs and options without any type of authentication.
Author:nimber
Homepage:http://nimber.plux.ru
File Size:2544
Last Modified:Oct 6 23:55:30 2003
MD5 Checksum:d5619a7af590c8ed019e96a20685cd2e

 ///  File Name: taper.txt
Description:
The taper program in Redhat 7.3 contains a stack overflow. Note that taper is not setuid.
Author:Polygrithm
Homepage:http://geekz.nl
File Size:2503
Last Modified:Oct 30 07:15:06 2003
MD5 Checksum:22f491634bf9f13060313a42fd059611

 ///  File Name: asl_plz.txt
Description:
Information and packet capture of Mirc v6.11 and below DCC SEND buffer overflow exploit which crashes the client.
Author:Omi Da
File Size:2358
Last Modified:Oct 27 21:06:44 2003
MD5 Checksum:a84a0c6eae3a016419e6195491cd79b4

 ///  File Name: c-sillyPoker.c
Description:
Local proof of concept exploit that makes use of the HOME environment variable related overflow in Silly Poker v0.25.5. Yields group id of games.
Author:demz
Homepage:http://www.c-code.net
File Size:2317
Last Modified:Oct 1 18:26:14 2003
MD5 Checksum:2fd90ac8f55bff836228b9a176515ae2