Section:  .. / 0412-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 74
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: php-openlog.txt
Description:
Proof of concept exploit for the PHP openlog() vulnerability inherent in PHP 4.3.x. Tested against Win2k SP4 and PHP 4.3.5 on Apache 2.0.49.
Author:The Warlock
Homepage:http://go.to/biohazardhq
File Size:5413
Last Modified:Dec 31 20:46:58 2004
MD5 Checksum:4a46b51bf6d846cb40d8756cf4d49de6

 ///  File Name: shoutcast194.c
Description:
SHOUTcast DNAS/Linux version 1.9.4 format string remote exploit. Tested on slackware 9.1 and 10.0. Bind a shell to port 7000.
Author:Damian Put, Tomasz Trojanowski
Homepage:http://www.cc-team.org
File Size:5347
Last Modified:Dec 31 22:57:59 2004
MD5 Checksum:10a9677625a70dc41e3a961b0e06168d

 ///  File Name: raptor_libdthelp.c
Description:
Local root exploit for a buffer overflow in CDE libDtHelp library that allows local users to execute arbitrary code via a modified DTHELPUSERSEARCHPATH environment variable and the Help feature. Works against Solaris/SPARC 7/8/9.
Author:Marco Ivaldi
Homepage:http://www.0xdeadbeef.info
File Size:5275
Related CVE(s):CAN-2003-0834
Last Modified:Dec 31 21:34:25 2004
MD5 Checksum:f20ed4f52c6e15b57ab4429efee295fd

 ///  File Name: un-aftpd.c
Description:
Ability ftpd version 2.34 remote root exploit that spawns a shell.
Author:Dark Eagle
Homepage:http://unl0ck.void.ru/
Related Exploit:ability.c"
File Size:5237
Last Modified:Dec 30 09:43:10 2004
MD5 Checksum:48bb322231bed83f5b66b558015635fc

 ///  File Name: cuteftpexpl.c
Description:
CuteFTP Professional version 6.0 local denial of service exploit that makes use of a flaw in the client.
Author:priestmaster
Homepage:http://www.priestmaster.org
Related File:cuteftp60.txt
File Size:4535
Last Modified:Dec 31 19:58:32 2004
MD5 Checksum:0b67c5da6899c42ae95b2fb1f3707b6a

 ///  File Name: adv09-y3dips-2004.txt
Description:
paFileDB 3.1 has a couple vulnerabilities that allow for admin password hash retrieval and full path disclosure.
Author:y3dips
Homepage:http://y3dips.echo.or.id/
File Size:4424
Last Modified:Dec 12 19:30:26 2004
MD5 Checksum:8f7a6d93c349ecfa1763b7da8de113bc

 ///  File Name: winrar341.txt
Description:
WinRAR proof of concept buffer overflow exploit for version 3.41 and below.
Author:Vafa Khoshaein
File Size:4418
Last Modified:Dec 30 10:14:22 2004
MD5 Checksum:1e628e892fbc61241ba032079e35f687

 ///  File Name: isec-0019-scm.txt
Description:
A locally exploitable flaw has been found in the Linux socket layer that allows a local user to hang a vulnerable machine. Kernel version 2.4 up to and including 2.4.28 and 2.6 up to and including 2.6.9 are susceptible. Full exploitation provided.
Author:Paul Starzetz
Homepage:http://isec.pl/vulnerabilities/isec-0019-scm.txt
File Size:4262
Related CVE(s):CAN-2004-1016
Last Modified:Dec 30 08:24:55 2004
MD5 Checksum:8899648b0df449114a9613a0d4f6a051

 ///  File Name: wins.c
Description:
Remote Microsoft Windows 2000 WINS exploit that has connectback shellcode. Works on SP3/SP4.
Author:zuc
File Size:4260
Related CVE(s):CAN-2004-1080
Last Modified:Jan 2 21:43:36 2005
MD5 Checksum:bca4ce46995ede27531c85fe556c98c2

 ///  File Name: WHM-autopilot.txt
Description:
WHM AutoPilot version 2.4.6.5 and below suffer from information disclosure, cross site scripting, and file inclusion vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3899
Last Modified:Jan 2 20:54:26 2005
MD5 Checksum:90e228da786478f8e243ab912ca962f1

 ///  File Name: moodle142.txt
Description:
Moodle versions 1.4.2 and below suffer from cross site scripting and file inclusion vulnerabilities.
Author:Bartek Nowotarski
File Size:3831
Last Modified:Jan 2 20:41:32 2005
MD5 Checksum:b9eca4daf115cfb19a91e59348bc0731

 ///  File Name: SSA-20041220-16.txt
Description:
STG Security Advisory: An input validation flaw in ZeroBoard versions 4.1pl4 and below can allow malicious attackers the ability to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:3683
Last Modified:Dec 31 23:08:01 2004
MD5 Checksum:f266dea6fadc6bcb9dcc65dd55ae1090

 ///  File Name: PhpIncludeWorm.txt
Description:
New PHP based worm that targets any vulnerable page or script with a remote file inclusion vulnerability.
File Size:3602
Last Modified:Jan 2 19:55:57 2005
MD5 Checksum:7d59d83dd3eed703eff0dda98b9c9632

 ///  File Name: bruteforce.webmin.txt
Description:
Webmin remote bruteforce and command execution exploit.
Author:Di42lo
File Size:3492
Last Modified:Dec 31 21:50:56 2004
MD5 Checksum:c5fab111968a480a8eab88750e4deecf

 ///  File Name: KorWeblog.txt
Description:
KorWeblog suffers from a directory traversal vulnerability that enables malicious attackers to access files and include malicious php files. Versions 1.6.2-cvs and below are susceptible.
Author:Mins
File Size:3436
Last Modified:Jan 2 21:32:14 2005
MD5 Checksum:aef213cbdc2bb62aa2b5f0700792a633

 ///  File Name: pmc.pl.txt
Description:
Remote exploit for phpMyChat 0.14.5 that adds an administrative account.
Author:sysbug
File Size:3412
Last Modified:Dec 31 20:55:58 2004
MD5 Checksum:76d239aa6079f00c2b41ce5ca9007afb

 ///  File Name: ftpd-iexpl.c
Description:
Proof of concept exploit for Internet Explorer version 6.0.3790.0 that demonstrates an FTP download path disclosure flaw.
Author:Albert Puigsech Galicia
Related File:7a69-17.txt
File Size:3350
Last Modified:Jan 2 21:25:38 2005
MD5 Checksum:c396765c5b95db527753b59b0cb4cfcb

 ///  File Name: isec-0020-mozilla.txt
Description:
A heap overflow in Mozilla browser versions 1.7.3 and below in the NNTP code may allow for arbitrary code execution.
Author:Maurycy Prodeus
Homepage:http://isec.pl/vulnerabilities/isec-0020-mozilla.txt
File Size:3057
Last Modified:Jan 2 21:10:27 2005
MD5 Checksum:28f2d5a8e2e4029a4b83de4ea3ca607e

 ///  File Name: WebLibs10.txt
Description:
WebLibs 1.0 is susceptible to arbitrary file access due to a lack of input validation for a hidden variable. Exploitation details included.
Author:John Bissell
File Size:3056
Last Modified:Dec 12 19:52:09 2004
MD5 Checksum:9f9c94b9d1b26a97f71ded009e986b66

 ///  File Name: angelDust.c
Description:
Snort 2.2.10 and below remote denial of service exploit that makes use of a flaw discovered by Marcin Zgorecki.
Author:Antimatt3r
File Size:2898
Last Modified:Dec 31 20:50:49 2004
MD5 Checksum:4bdcecd0e6e2dfbb74530258e04a2d4f

 ///  File Name: wgettrap.txt
Description:
Proof of concept exploit for the wget directory traversal vulnerability that affects versions 1.8 and below.
Author:Jan Minar
Related File:wget18x.txt
File Size:2554
Last Modified:Dec 30 09:31:59 2004
MD5 Checksum:81e842b6caff9bc3e4ddb975bd37cea2

 ///  File Name: kayako.txt
Description:
Kayako eSupport version 2.x suffers from cross site scripting and SQL injection flaws. Detailed exploitation given.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2477
Last Modified:Dec 30 11:14:52 2004
MD5 Checksum:7c4bc89d826913a9cb09043cb0ecea11

 ///  File Name: raptor_udf.c
Description:
Local root exploit that makes use of the dynamic library for do_system() in MySQL UDF. Tested on MySQL 4.0.17.
Author:Marco Ivaldi
Homepage:http://www.0xdeadbeef.info/
File Size:2470
Last Modified:Dec 31 21:43:34 2004
MD5 Checksum:3793c024d44ae4873abb9da8a046b264

 ///  File Name: phpcalendar.txt
Description:
PHP-Calendar suffers from a file inclusion vulnerability. All versions are affected.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2438
Last Modified:Jan 2 21:07:16 2005
MD5 Checksum:f3d2a2da12855b70374d273e68526a83

 ///  File Name: rpcl_icmpdos.c
Description:
RICOH Aficio 450/455 PCL 5e printer ICMP remote denial of service exploit.
Author:Kyong Joo
Related File:ricohICMP.txt
File Size:2401
Last Modified:Dec 30 09:34:48 2004
MD5 Checksum:bb7c27ed425ed8d8e49d8d016310e055