Section:  .. / 0312-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 42 of 42
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: mdaemon-raw.txt
Description:
Alt-N Technologies MDaemon Mail Server versions 6.52 to 6.85 suffer from a remote buffer overflow in its raw message handler. Sending more than 153 bytes in the From field to FROM2Raw.exe creates a raw file, that when processed by mdaemon, will cause a stack buffer overflow.
Author:Pejamn Davarzani, Behrang Fouladi
Homepage:http://www.hat-squad.com
File Size:3352
Last Modified:Dec 29 23:43:52 2003
MD5 Checksum:74de9bd4c75e8a57e115b87b3aff2516

 ///  File Name: surfboard-1.1.8.txt
Description:
The Surfboard webserver v1.1.8 and below contains remote directory traversal and denial of service vulnerabilities. Exploit URLs and a patch included.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:3331
Last Modified:Dec 3 06:05:43 2003
MD5 Checksum:e9e9f373b1b53affd3965a21178e5ba3

 ///  File Name: m00-apache-w00t.tar.gz
Description:
Apache 1.3.*-2.0.48 remote users disclosure exploit - Checks Apache webservers for a wrong default configuration of mod_userdir which allows account name guessing and then attempts to login to the found accounts with ftp. Effective against Linux and *BSD boxes.
Author:d4rkgr3y
Homepage:http://www.m00.ru
File Size:3186
Last Modified:Dec 16 08:42:04 2003
MD5 Checksum:01464a2fa047af3a15831c455b89f9c9

 ///  File Name: x_hp-ux11i_nls_ct.c
Description:
X_hp-ux11i_nls_ct.c is a local root format string exploit for /usr/bin/ct tested on HP-UX B11.11. Uses the NLSPATH vulnerability described here.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:3093
Last Modified:Dec 15 09:41:44 2003
MD5 Checksum:837f5eb9c39c2662a7b97b20d7b5a6bc

 ///  File Name: brk_poc.asm
Description:
Linux kernel v2.4.22 and below do_brk() proof of concept exploit written in ASM which tests for the vulnerability, rebooting your system if it is found. Requires nasm greater than v0.98.36, tested with nasm 0.98.38.
Author:Christophe Devine
Homepage:http://www.cr0.net:8040/about
File Size:2913
Last Modified:Dec 3 05:28:43 2003
MD5 Checksum:38e4261798444f0cd584107388e6c96e

 ///  File Name: quikstore.txt
Description:
The QuikStore Shopping Cart suffers from directory traversal vulnerabilities that allow a remote attacker to gain access to files outside of the webroot and also discloses installation path information on error pages.
Author:Dr`Ponidi
File Size:2755
Last Modified:Dec 29 23:33:22 2003
MD5 Checksum:4953833c7c0fe6962bd8a66fecb9aa0a

 ///  File Name: launchprotect.pl
Description:
Remote exploit for Eudora 6.0.1's (on Windows) LaunchProtect feature, which warns the user before running executable attachments. Unfortunately this only works in the attach folder; using spoofed attachments, executables stored elsewhere may run without warning.
Author:Paul Szabo
File Size:2466
Last Modified:Dec 3 05:22:16 2003
MD5 Checksum:9a3e27e8c64d0481380bbcf5c7ea965f

 ///  File Name: cesarDoS.txt
Description:
CesarFTP version 0.99g and below has a security hold in the command CWD that allows a remote attacker the ability to cause a denial of service by raising the CPU utilization up to 100%.
Author:zib zib
File Size:2457
Last Modified:Dec 23 10:57:36 2003
MD5 Checksum:90b7691cee7a770103bf922c3069fb0c

 ///  File Name: phpping.txt
Description:
php-ping improperly filters user inputs, allowing for a malicious remote attacker to execute arbitrary commands as the webserver uid.
Author:ppp-design
Homepage:http://www.ppp-design.de
File Size:2403
Last Modified:Dec 30 19:18:37 2003
MD5 Checksum:450d6884bb82ab689b9ced960891973e

 ///  File Name: dcamwebcam.txt
Description:
DCAM webcam versions 8.2.5 and below suffer from a directory traversal attack that allow a remote attacker to access any file available to the webserver uid.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1979
Last Modified:Dec 23 11:12:26 2003
MD5 Checksum:5f7b85639545d288c78372f4006ccd66

 ///  File Name: f.c
Description:
F.c is a local root exploit for the the SuSEconfig.vmware symbolic link vulnerability. Tested on SuSE 8.2. More information available here.
Author:Nash Leon
Homepage:http://cdm.frontthescene.com.br
File Size:1943
Last Modified:Dec 2 21:29:06 2003
MD5 Checksum:d24a6e89b53d4792d7839c915a6c05f8

 ///  File Name: winamp-exploit.c
Description:
Local buffer overflow exploit for Winamp version 5.1.
Author:Johnny Mast
Homepage:http://www.rosiello.org
File Size:1931
Last Modified:Dec 31 21:01:00 2003
MD5 Checksum:54ff3ee95d8a7f6802122f4362e72352

 ///  File Name: thttpd-sontot.c
Description:
Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit. Tested against FreeBSD, SunOS 4, Solaris 2, BSD/OS, Linux, and OSF.
Author:decka_trash
File Size:1753
Last Modified:Dec 15 06:51:35 2003
MD5 Checksum:a5c7e0e2f95d01da4ebc029018d79d1f

 ///  File Name: gallery133.txt
Description:
Gallery versions 1.3.3 and below suffer from a cross-site scripting vulnerability in its searching functionality.
Author:The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:1649
Last Modified:Dec 30 19:30:52 2003
MD5 Checksum:bd8fa7a52e93df322ab5dc54d4b6faf3

 ///  File Name: exp_unix2tcp.c
Description:
Exp_unix2tcp.c is a local exploit for unix2tcp below v0.8.0 which gives root access if unix2tcp is setuid, which it is usually not. Tested on Redhat Linux 9.
Author:n2n
Homepage:http://www.eos-india.net
File Size:1646
Last Modified:Dec 24 10:39:33 2003
MD5 Checksum:17f3b5fb7f646a6cb8647a775b53c63e

 ///  File Name: thttpd_DoS.c
Description:
Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit.
Author:Phender
Homepage:http://
File Size:1080
Last Modified:Dec 15 07:09:10 2003
MD5 Checksum:bd2573973214bc89db0e755641fda1a6

 ///  File Name: showexp.txt
Description:
Exploit code that makes use of the showHelp() vulnerability found in Microsoft Explorer versions 5.x-6.0. This file must be renamed with a .html extension to work.
Author:Arman Nayyeri
Related File:ie_showHelp.txt
File Size:270
Last Modified:Dec 30 19:42:28 2003
MD5 Checksum:e99fb54eb1ced09dc1fd2e3187b715cb