Section:  .. / 0312-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 42 of 42
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 1n74ne-cha0s.exe
Description:
WarFTPD v1.82.0.2 and below remote denial of service exploit, win32 binary. Disables WarFTPD by making multiple connections, causing the server to stop accepting new connections, and crash after two days.
Author:Dr. Insane
File Size:135168
Last Modified:Dec 15 07:15:41 2003
MD5 Checksum:7d5791bcad0c1b4941743c8738286dfc

 ///  File Name: thttpd_DoS.c
Description:
Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit.
Author:Phender
Homepage:http://
File Size:1080
Last Modified:Dec 15 07:09:10 2003
MD5 Checksum:bd2573973214bc89db0e755641fda1a6

 ///  File Name: thttpd-sontot.c
Description:
Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit. Tested against FreeBSD, SunOS 4, Solaris 2, BSD/OS, Linux, and OSF.
Author:decka_trash
File Size:1753
Last Modified:Dec 15 06:51:35 2003
MD5 Checksum:a5c7e0e2f95d01da4ebc029018d79d1f

 ///  File Name: Security_FlexWATCH-2.txt
Description:
The FlexWATCH surveillance camera server (tested FlexWATCH-50 web ver 2.2 Build Nov 18 2003) is used by many banks and "secure" places and contains remotely exploitable vulnerabilities which allow remote attackers to view camera footage, add users, remove users, change the configuration, disable camera surveillance, cross site scripting, and more.
Author:Slaizer
File Size:10603
Last Modified:Dec 15 06:47:52 2003
MD5 Checksum:109e75117811a6f4fdc578e24bb624fd

 ///  File Name: dcomrpc_magickey_win.c
Description:
Dcom RPC remote win32 exploit, ported to Windows for compilation with VC++ 6. Uses "magic keys" to find the offset. Ported by Lordy
File Size:19369
Last Modified:Dec 15 06:40:13 2003
MD5 Checksum:e68f717861ce1d1e65ca2d14d5d93f20

 ///  File Name: lsbody.c
Description:
UW-imapd v12.261, 12.264, 2000.283, 2000.284, 2000.287 and 2001.315 remote exploit which takes advantage of a bug in the body command. Requires an IMAP username and password.
Author:skylazart
Homepage:http://core.cx/skylazart
File Size:14136
Last Modified:Dec 15 06:32:27 2003
MD5 Checksum:908db2cb149c78738ba743a8ffb0d9f5

 ///  File Name: lssoltel.c
Description:
Remote exploit for login/telnetd tested on Solaris Sparc v6/7/8 which uses the TTYPROMPT vulnerability. Spawns a shell.
Author:skylazart
Homepage:http://core.cx/skylazart
File Size:9375
Last Modified:Dec 15 06:23:07 2003
MD5 Checksum:ad70f20ff91e7a8f764012a9f0e6606f

 ///  File Name: xgrpck.c
Description:
/usr/sbin/grpck local buffer overflow exploit. Note that grpck is not setuid by default. Tested on Red Hat 7.3 and 8.0, Cobalt Linux 6.x and 7.x, Debian 2.1 and 2.2, and Mandrake 8.1 and 8.2.
Author:Metin Cengiz
Homepage:http://www.rsf.gen.tr
File Size:3781
Last Modified:Dec 15 05:05:49 2003
MD5 Checksum:56e7c86766fc1efedffdfaaefe263664

 ///  File Name: 0x333ebola.c
Description:
Ebola v0.1.4 remote stack overflow exploit tested against Red Hat 8.0. Bug found by Secure Network Operations.
Author:c0wboy
Homepage:http://www.0x333.org
File Size:6810
Last Modified:Dec 15 04:59:01 2003
MD5 Checksum:1607f965b471b34d5d5e0300be518e95

 ///  File Name: qwks.cpp
Description:
Microsoft Windows WKSSVC remote exploit written in C++. Upon successful exploitation, it downloads a binary via a remote ftp server and executes it.
Author:qaaz
File Size:9842
Last Modified:Dec 6 00:55:00 2003
MD5 Checksum:b2e388a3d4cac23b59525fc9aa6e497f

 ///  File Name: I2S-LAB-10-15-03.Shell32-Do.txt
Description:
I2S LAB Security Advisory - A malicious attacker can utilize any type of media against the SHELL32.DLL library to cause a massive denial of service. Microsoft Windows 2000 versions SP4 and below are affected. Full research and exploit provided. The next service pack released will have this fixed.
Author:I2S-LaB
Homepage:http://www.I2S-LaB.com
File Size:9175
Last Modified:Dec 5 18:22:00 2003
MD5 Checksum:1e98d8c19dfcda7d2669632436140845

 ///  File Name: rpc_wks_bo.c
Description:
Remote exploit for the Microsoft Windows WKS vulnerability that allows a specially crafted network message the ability to trigger a buffer overflow.
Author:fiNis
Related File:CA-2003-28.MS.txt
File Size:9181
Last Modified:Dec 5 05:01:00 2003
MD5 Checksum:466e9162a46e5f7009dbd6fc9020abd1

 ///  File Name: ezphotoshare.txt
Description:
eZphotoshare has multiple overflow vulnerabilities that allow remote code execution from a heap corruption in ntdll.dll and the ability to overwrite important saved values via vulnerable code in mfc42.dll.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/ezphotoshare.txt
File Size:6511
Last Modified:Dec 4 23:32:00 2003
MD5 Checksum:77ff372954b829eda766bbf04b438890

 ///  File Name: surfboard-1.1.8.txt
Description:
The Surfboard webserver v1.1.8 and below contains remote directory traversal and denial of service vulnerabilities. Exploit URLs and a patch included.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:3331
Last Modified:Dec 3 06:05:43 2003
MD5 Checksum:e9e9f373b1b53affd3965a21178e5ba3

 ///  File Name: brk_poc.asm
Description:
Linux kernel v2.4.22 and below do_brk() proof of concept exploit written in ASM which tests for the vulnerability, rebooting your system if it is found. Requires nasm greater than v0.98.36, tested with nasm 0.98.38.
Author:Christophe Devine
Homepage:http://www.cr0.net:8040/about
File Size:2913
Last Modified:Dec 3 05:28:43 2003
MD5 Checksum:38e4261798444f0cd584107388e6c96e

 ///  File Name: launchprotect.pl
Description:
Remote exploit for Eudora 6.0.1's (on Windows) LaunchProtect feature, which warns the user before running executable attachments. Unfortunately this only works in the attach folder; using spoofed attachments, executables stored elsewhere may run without warning.
Author:Paul Szabo
File Size:2466
Last Modified:Dec 3 05:22:16 2003
MD5 Checksum:9a3e27e8c64d0481380bbcf5c7ea965f

 ///  File Name: f.c
Description:
F.c is a local root exploit for the the SuSEconfig.vmware symbolic link vulnerability. Tested on SuSE 8.2. More information available here.
Author:Nash Leon
Homepage:http://cdm.frontthescene.com.br
File Size:1943
Last Modified:Dec 2 21:29:06 2003
MD5 Checksum:d24a6e89b53d4792d7839c915a6c05f8