Section:  .. / 0407-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 38 of 38
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: sharex.c
Description:
Sharutils 4.2.1 local root exploit. Note: shar is NOT setuid by default, so this exploit is completely proof of concept if for some reason the binary was setuid.
Author:n30n
Homepage:http://n30n.byte-lab.com
Related File:sharutil.txt
File Size:2059
Last Modified:Jul 18 12:25:00 2004
MD5 Checksum:a0f331c55a88b263bc3a56d837299108

 ///  File Name: mohaabof.zip
Description:
Remote test code that verifies buffer overflows in the Medal of Honor games including Allied Assault version 1.11v9 and below, Breakthrough version 2.40b and below, and Spearhead version 2.15 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:mohBufferOverflow.txt
File Size:9965
Last Modified:Jul 17 23:42:00 2004
MD5 Checksum:3ce5ddcdc7eaff52426ebace15a4649c

 ///  File Name: utilmaned2.c
Description:
Local elevation of privileges exploit for the Microsoft Windows 2000 Utility Manager vulnerability. Updated version that can be executed via simple cmd.exe shells using a normal user account. Gives a shell with SYSTEM privileges.
Author:kralor
Related File:msWinUtilMan.txt
File Size:10846
Related CVE(s):CAN-2004-0213
Last Modified:Jul 17 23:33:00 2004
MD5 Checksum:278b3f6fd68eefedd079f0e699e5adb5

 ///  File Name: utilmaned1.c
Description:
Local elevation of privileges exploit for the Microsoft Windows 2000 Utility Manager vulnerability. Gives a shell with SYSTEM privileges.
Author:kralor
Related File:msWinUtilMan.txt
File Size:6485
Related CVE(s):CAN-2004-0213
Last Modified:Jul 17 17:09:00 2004
MD5 Checksum:5533394db7076d191c3e49e83ef17f4e

 ///  File Name: webstoreExec.txt
Description:
Web_Store.cgi allows for remote command execution due to a lack of variable sanitization.
Author:Zero-X
Homepage:http://www.Lobnan.de
File Size:268
Last Modified:Jul 17 15:05:00 2004
MD5 Checksum:1c5e520b29e2bf288d01ebd0b9d24539

 ///  File Name: waraxe-2004-SA035.txt
Description:
PHP Nuke versions 6.x through 7.3 suffer from cross site scripting and SQL injection flaws.
Author:Janek Vind
Homepage:http://www.waraxe.us/index.php?modname=sa&id=35
File Size:4044
Last Modified:Jul 16 18:36:00 2004
MD5 Checksum:8b4e0f056d19cb7eca0688a30285f615

 ///  File Name: hlboom.zip
Description:
Remote denial of service exploit for a flaw in the Half-Life server on Linux and Windows where a write occurs to a read-only memory zone.
Author:Luigi Auriemma, Terry Henning
Homepage:http://aluigi.altervista.org
Related File:memHalfLife.txt
File Size:7979
Last Modified:Jul 12 18:55:00 2004
MD5 Checksum:d1fdd00f30e4c58a069834cc783da62f

 ///  File Name: mysql.authentication.bypass_client...>
Description:
A .diff file, applied to the MySQL 5.0.0-alpha source distribution will allow building a MySQL client that can be used to connect to a remote MySQL server with no password.
Author:bambam
Related File:HackingMySQL.txt
File Size:487
Last Modified:Jul 8 17:25:00 2004
MD5 Checksum:a2d6b84debc92d7d3051cf4d65b303f7

 ///  File Name: EudExploit_private.pl
Description:
Eudora versions 5.x to 6.0.3 local exploit that makes use of the attachment buffer overflow.
Author:LibX
File Size:1650
Last Modified:Jul 4 12:36:00 2004
MD5 Checksum:10359bac2d693fcd3ea09b32037b2d1a

 ///  File Name: wostok-setterm.c
Description:
Proof of concept exploit for setterm, which is not usually suid by default.
Author:poma
Homepage:http://wostok.org
File Size:1601
Last Modified:Jul 4 12:32:00 2004
MD5 Checksum:ec97ff10101fcbff283a4a793effb9cc

 ///  File Name: drcat.c
Description:
Exploit for a buffer overflow in drcatd 0.5.0 beta. This may allow for command execution when the system administrator has assumed that only read access to files has been granted, but as it requires a valid username and password, this is unlikely to ever be a high-risk exploit.
Author:Taif
Related File:zone-h-drcat.txt
File Size:11047
Last Modified:Jul 2 19:00:00 2004
MD5 Checksum:7a0995e8f134b7911128d4430d4916c7

 ///  File Name: centreVuln.txt
Description:
A lack of sanity checking in Centre version 1.0 allows unprivileged users the ability to change administrator options and create new accounts.
Author:Manip
File Size:975
Last Modified:Jul 1 13:35:00 2004
MD5 Checksum:882d6a1699ce0c9585a69bac87772441

 ///  File Name: phpMyAdmin257.txt
Description:
phpMyAdmin version 2.5.7 is susceptible to allowing remote malicious users the ability to inject PHP code. Full exploit provided.
Author:Nasir Simbolon
Homepage:http://eagle.kecapi.com
File Size:11896
Last Modified:Jul 1 12:42:00 2004
MD5 Checksum:efa2bc2daeaaf7a11623f78fae49fd53