Section:  .. / 0312-exploits  /

Page 1 of 2
<< 1 2 >> Files 1 - 25 of 42
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0312-exploits.tgz
Description:
Packet Storm new exploits for December, 2003.
File Size:3362818
Last Modified:Apr 16 07:08:19 2004
MD5 Checksum:fd96104b52452635a55566e5bde24485

 ///  File Name: dosMac.txt
Description:
It is possible to cause a denial of service attack against the SecurityServer daemon in MacOS X, MacOS X Server, and Darwin by unlocking a locked keychain and specifying a very long password.
Author:Matt Burnett
File Size:3533
Last Modified:Jan 1 07:02:11 2004
MD5 Checksum:d81f8b6a87bdb09dcd8e8e493388372e

 ///  File Name: winamp-exploit.c
Description:
Local buffer overflow exploit for Winamp version 5.1.
Author:Johnny Mast
Homepage:http://www.rosiello.org
File Size:1931
Last Modified:Dec 31 21:01:00 2003
MD5 Checksum:54ff3ee95d8a7f6802122f4362e72352

 ///  File Name: netobserve.txt
Description:
NetObserve versions 2.0 and below suffer from a severe security bypass flaw that will enable remote attackers to gain administrative privileges and execute arbitrary code on the server.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/netobserve.txt
File Size:4129
Last Modified:Dec 31 03:21:28 2003
MD5 Checksum:2bd139ff34e8256e5aee6cfc5963c5e9

 ///  File Name: showexp.txt
Description:
Exploit code that makes use of the showHelp() vulnerability found in Microsoft Explorer versions 5.x-6.0. This file must be renamed with a .html extension to work.
Author:Arman Nayyeri
Related File:ie_showHelp.txt
File Size:270
Last Modified:Dec 30 19:42:28 2003
MD5 Checksum:e99fb54eb1ced09dc1fd2e3187b715cb

 ///  File Name: gallery133.txt
Description:
Gallery versions 1.3.3 and below suffer from a cross-site scripting vulnerability in its searching functionality.
Author:The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:1649
Last Modified:Dec 30 19:30:52 2003
MD5 Checksum:bd8fa7a52e93df322ab5dc54d4b6faf3

 ///  File Name: phpping.txt
Description:
php-ping improperly filters user inputs, allowing for a malicious remote attacker to execute arbitrary commands as the webserver uid.
Author:ppp-design
Homepage:http://www.ppp-design.de
File Size:2403
Last Modified:Dec 30 19:18:37 2003
MD5 Checksum:450d6884bb82ab689b9ced960891973e

 ///  File Name: mdaemon-raw.txt
Description:
Alt-N Technologies MDaemon Mail Server versions 6.52 to 6.85 suffer from a remote buffer overflow in its raw message handler. Sending more than 153 bytes in the From field to FROM2Raw.exe creates a raw file, that when processed by mdaemon, will cause a stack buffer overflow.
Author:Pejamn Davarzani, Behrang Fouladi
Homepage:http://www.hat-squad.com
File Size:3352
Last Modified:Dec 29 23:43:52 2003
MD5 Checksum:74de9bd4c75e8a57e115b87b3aff2516

 ///  File Name: quikstore.txt
Description:
The QuikStore Shopping Cart suffers from directory traversal vulnerabilities that allow a remote attacker to gain access to files outside of the webroot and also discloses installation path information on error pages.
Author:Dr`Ponidi
File Size:2755
Last Modified:Dec 29 23:33:22 2003
MD5 Checksum:4953833c7c0fe6962bd8a66fecb9aa0a

 ///  File Name: SPK-IMSPd.c
Description:
IMSPd v1.7 and below remote root buffer overflow exploit which takes advantage of a bug in abook_dbname(). Tested against IMSPd 1.7 and 1.6a3 under RedHat 8.0. Fix available here.
Author:SpikE
File Size:14498
Last Modified:Dec 25 08:00:28 2003
MD5 Checksum:5162fefc17a2d96ad76b83a84c36f570

 ///  File Name: exp_unix2tcp.c
Description:
Exp_unix2tcp.c is a local exploit for unix2tcp below v0.8.0 which gives root access if unix2tcp is setuid, which it is usually not. Tested on Redhat Linux 9.
Author:n2n
Homepage:http://www.eos-india.net
File Size:1646
Last Modified:Dec 24 10:39:33 2003
MD5 Checksum:17f3b5fb7f646a6cb8647a775b53c63e

 ///  File Name: dcamwebcam.txt
Description:
DCAM webcam versions 8.2.5 and below suffer from a directory traversal attack that allow a remote attacker to access any file available to the webserver uid.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1979
Last Modified:Dec 23 11:12:26 2003
MD5 Checksum:5f7b85639545d288c78372f4006ccd66

 ///  File Name: cesarDoS.txt
Description:
CesarFTP version 0.99g and below has a security hold in the command CWD that allows a remote attacker the ability to cause a denial of service by raising the CPU utilization up to 100%.
Author:zib zib
File Size:2457
Last Modified:Dec 23 10:57:36 2003
MD5 Checksum:90b7691cee7a770103bf922c3069fb0c

 ///  File Name: projectforum.txt
Description:
A fault lies in ProjectForum versions 8.4.2.1 and below that allow an attacker the ability to cause the server application 'projectforum.exe' to crash and stop responding to requests from clients. This can be triggered by sending an overly long 'find' request string to the server in question.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/pfbugs.txt
File Size:5683
Last Modified:Dec 23 10:38:43 2003
MD5 Checksum:d343ce102b631366e79d2489a662a593

 ///  File Name: eZXploit.pl
Description:
Remote exploit for eZnetwork versions 3.3 to 3.5 that sends a shell back to the host that the attack spawns from.
Author:kralor
Homepage:http://www.coromputer.net
File Size:4092
Last Modified:Dec 18 05:22:02 2003
MD5 Checksum:1c79c869e872b376278eb4416b3b6625

 ///  File Name: ms03-043v2.c
Description:
Remote exploit for the Microsoft Messenger service buffer overflow described in ms03-043. Tested against Windows 2000 FR SP0.
Author:Mr. Nice
File Size:8042
Last Modified:Dec 18 05:01:20 2003
MD5 Checksum:7923cdcc15237bb37be9249d97ee337e

 ///  File Name: Opera7.22.pl
Description:
Opera for Windows v7.x prior to v7.23 build 3227 remote exploit which sets up a web server and feeds Opera a URL that will create and execute a batch file on the clients computer.
Author:Nesumin
Homepage:http://opera.rainyblue.org
File Size:3402
Last Modified:Dec 16 08:50:54 2003
MD5 Checksum:85a437cea2b1f6be1b26143e87f00b60

 ///  File Name: m00-apache-w00t.tar.gz
Description:
Apache 1.3.*-2.0.48 remote users disclosure exploit - Checks Apache webservers for a wrong default configuration of mod_userdir which allows account name guessing and then attempts to login to the found accounts with ftp. Effective against Linux and *BSD boxes.
Author:d4rkgr3y
Homepage:http://www.m00.ru
File Size:3186
Last Modified:Dec 16 08:42:04 2003
MD5 Checksum:01464a2fa047af3a15831c455b89f9c9

 ///  File Name: ThunderstormWks.cpp
Description:
ThunderstormWks is a mass exploiter / scanner for the windows workstation vulnerability discussed in ms03-049. Can scan random IP ranges quickly and contains a ftp download payload.
Author:hi_tech_assassin
File Size:10909
Last Modified:Dec 16 08:34:30 2003
MD5 Checksum:3b686e6d08c2b7c6cb1d2d11ca3cbc62

 ///  File Name: hatorihanzo.c
Description:
Linux kernel do_brk local root exploit for kernel v2.4 prior to 2.4.23.
Author:Paul Starzetz, Wojciech Purczynski
File Size:6510
Last Modified:Dec 16 08:28:08 2003
MD5 Checksum:15831ce915376b30d4db0512a3ad10f1

 ///  File Name: ms03-049-II.c
Description:
Microsoft Workstation Service WKSSVC Remote Exploit for the bug discussed in MS03-049. This version does not crash services.exe until the shell exits.
Author:snooq
Homepage:http://www.angelfire.com/linux/snooq
File Size:15982
Last Modified:Dec 16 08:22:45 2003
MD5 Checksum:cd0ae50e67851a9a724ad3f6a064b09c

 ///  File Name: eznetexploit.pl
Description:
Eznet v3.5.0 and below remote stack overflow exploit which includes shell code that downloads and runs an executable from a web server.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net
File Size:6655
Last Modified:Dec 16 08:10:10 2003
MD5 Checksum:55be4f3bf8bcb93395dae0be528a718a

 ///  File Name: x_hp-ux11i_nls_ct.c
Description:
X_hp-ux11i_nls_ct.c is a local root format string exploit for /usr/bin/ct tested on HP-UX B11.11. Uses the NLSPATH vulnerability described here.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:3093
Last Modified:Dec 15 09:41:44 2003
MD5 Checksum:837f5eb9c39c2662a7b97b20d7b5a6bc

 ///  File Name: milla.tar.gz
Description:
Mvdsv Quake Server v0.171 and below remote exploit. Tested against Debian GNU/Linux 3.0 and Slackware 9.0. Includes a patched Quake source which includes shellcode in cl_main.c which binds a shell to port 30464.
Author:Oscar Linderholm
File Size:3250388
Last Modified:Dec 15 07:37:56 2003
MD5 Checksum:dc1c49288d1bc3fa76cc72ffdb03b3e7

 ///  File Name: m00-mod_gzip.c
Description:
Unavailable.
File Size:7913
Last Modified:Dec 15 07:21:15 2003
MD5 Checksum:385c31b5ee1dd97a7c52554b6aefc0ad