Section:  .. / 0312-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 42 of 42
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: netobserve.txt
Description:
NetObserve versions 2.0 and below suffer from a severe security bypass flaw that will enable remote attackers to gain administrative privileges and execute arbitrary code on the server.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/netobserve.txt
File Size:4129
Last Modified:Dec 31 03:21:28 2003
MD5 Checksum:2bd139ff34e8256e5aee6cfc5963c5e9

 ///  File Name: Opera7.22.pl
Description:
Opera for Windows v7.x prior to v7.23 build 3227 remote exploit which sets up a web server and feeds Opera a URL that will create and execute a batch file on the clients computer.
Author:Nesumin
Homepage:http://opera.rainyblue.org
File Size:3402
Last Modified:Dec 16 08:50:54 2003
MD5 Checksum:85a437cea2b1f6be1b26143e87f00b60

 ///  File Name: phpping.txt
Description:
php-ping improperly filters user inputs, allowing for a malicious remote attacker to execute arbitrary commands as the webserver uid.
Author:ppp-design
Homepage:http://www.ppp-design.de
File Size:2403
Last Modified:Dec 30 19:18:37 2003
MD5 Checksum:450d6884bb82ab689b9ced960891973e

 ///  File Name: projectforum.txt
Description:
A fault lies in ProjectForum versions 8.4.2.1 and below that allow an attacker the ability to cause the server application 'projectforum.exe' to crash and stop responding to requests from clients. This can be triggered by sending an overly long 'find' request string to the server in question.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/pfbugs.txt
File Size:5683
Last Modified:Dec 23 10:38:43 2003
MD5 Checksum:d343ce102b631366e79d2489a662a593

 ///  File Name: quikstore.txt
Description:
The QuikStore Shopping Cart suffers from directory traversal vulnerabilities that allow a remote attacker to gain access to files outside of the webroot and also discloses installation path information on error pages.
Author:Dr`Ponidi
File Size:2755
Last Modified:Dec 29 23:33:22 2003
MD5 Checksum:4953833c7c0fe6962bd8a66fecb9aa0a

 ///  File Name: qwks.cpp
Description:
Microsoft Windows WKSSVC remote exploit written in C++. Upon successful exploitation, it downloads a binary via a remote ftp server and executes it.
Author:qaaz
File Size:9842
Last Modified:Dec 6 00:55:00 2003
MD5 Checksum:b2e388a3d4cac23b59525fc9aa6e497f

 ///  File Name: rpc_wks_bo.c
Description:
Remote exploit for the Microsoft Windows WKS vulnerability that allows a specially crafted network message the ability to trigger a buffer overflow.
Author:fiNis
Related File:CA-2003-28.MS.txt
File Size:9181
Last Modified:Dec 5 05:01:00 2003
MD5 Checksum:466e9162a46e5f7009dbd6fc9020abd1

 ///  File Name: Security_FlexWATCH-2.txt
Description:
The FlexWATCH surveillance camera server (tested FlexWATCH-50 web ver 2.2 Build Nov 18 2003) is used by many banks and "secure" places and contains remotely exploitable vulnerabilities which allow remote attackers to view camera footage, add users, remove users, change the configuration, disable camera surveillance, cross site scripting, and more.
Author:Slaizer
File Size:10603
Last Modified:Dec 15 06:47:52 2003
MD5 Checksum:109e75117811a6f4fdc578e24bb624fd

 ///  File Name: showexp.txt
Description:
Exploit code that makes use of the showHelp() vulnerability found in Microsoft Explorer versions 5.x-6.0. This file must be renamed with a .html extension to work.
Author:Arman Nayyeri
Related File:ie_showHelp.txt
File Size:270
Last Modified:Dec 30 19:42:28 2003
MD5 Checksum:e99fb54eb1ced09dc1fd2e3187b715cb

 ///  File Name: SPK-IMSPd.c
Description:
IMSPd v1.7 and below remote root buffer overflow exploit which takes advantage of a bug in abook_dbname(). Tested against IMSPd 1.7 and 1.6a3 under RedHat 8.0. Fix available here.
Author:SpikE
File Size:14498
Last Modified:Dec 25 08:00:28 2003
MD5 Checksum:5162fefc17a2d96ad76b83a84c36f570

 ///  File Name: surfboard-1.1.8.txt
Description:
The Surfboard webserver v1.1.8 and below contains remote directory traversal and denial of service vulnerabilities. Exploit URLs and a patch included.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:3331
Last Modified:Dec 3 06:05:43 2003
MD5 Checksum:e9e9f373b1b53affd3965a21178e5ba3

 ///  File Name: thttpd-sontot.c
Description:
Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit. Tested against FreeBSD, SunOS 4, Solaris 2, BSD/OS, Linux, and OSF.
Author:decka_trash
File Size:1753
Last Modified:Dec 15 06:51:35 2003
MD5 Checksum:a5c7e0e2f95d01da4ebc029018d79d1f

 ///  File Name: thttpd_DoS.c
Description:
Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit.
Author:Phender
Homepage:http://
File Size:1080
Last Modified:Dec 15 07:09:10 2003
MD5 Checksum:bd2573973214bc89db0e755641fda1a6

 ///  File Name: ThunderstormWks.cpp
Description:
ThunderstormWks is a mass exploiter / scanner for the windows workstation vulnerability discussed in ms03-049. Can scan random IP ranges quickly and contains a ftp download payload.
Author:hi_tech_assassin
File Size:10909
Last Modified:Dec 16 08:34:30 2003
MD5 Checksum:3b686e6d08c2b7c6cb1d2d11ca3cbc62

 ///  File Name: winamp-exploit.c
Description:
Local buffer overflow exploit for Winamp version 5.1.
Author:Johnny Mast
Homepage:http://www.rosiello.org
File Size:1931
Last Modified:Dec 31 21:01:00 2003
MD5 Checksum:54ff3ee95d8a7f6802122f4362e72352

 ///  File Name: x_hp-ux11i_nls_ct.c
Description:
X_hp-ux11i_nls_ct.c is a local root format string exploit for /usr/bin/ct tested on HP-UX B11.11. Uses the NLSPATH vulnerability described here.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:3093
Last Modified:Dec 15 09:41:44 2003
MD5 Checksum:837f5eb9c39c2662a7b97b20d7b5a6bc

 ///  File Name: xgrpck.c
Description:
/usr/sbin/grpck local buffer overflow exploit. Note that grpck is not setuid by default. Tested on Red Hat 7.3 and 8.0, Cobalt Linux 6.x and 7.x, Debian 2.1 and 2.2, and Mandrake 8.1 and 8.2.
Author:Metin Cengiz
Homepage:http://www.rsf.gen.tr
File Size:3781
Last Modified:Dec 15 05:05:49 2003
MD5 Checksum:56e7c86766fc1efedffdfaaefe263664