Section:  .. / 0311-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 40 of 40
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: o_wks.c
Description:
Remote exploit for the Microsoft Windows Workstation server (WKSSVC) buffer overflow.
Author:Snooq
Homepage:http://www.angelfire.com/linux/snooq/
Related File:ms03-049
File Size:12873
Last Modified:Nov 14 02:59:56 2003
MD5 Checksum:42f040aa646dd00f2ed65f55541c93a4

 ///  File Name: phpBB206.txt
Description:
Remote exploit that makes use of a SQL injection vulnerability that exists in the viewtopic.php file in phpBB version 2.06. Using a malformed query against the searching functionality, the MD5 password hash will be exposed. Related type of vulnerability here.
Author:Hat-Squad Security Team
File Size:4953
Last Modified:Dec 1 03:37:47 2003
MD5 Checksum:a0d71696e8ccf3834d85f4c6baa42746

 ///  File Name: pserv.c
Description:
pServ 2.0.x Beta webserver remote exploit that makes use of the User-Agent HTTP Header buffer overflow.
Author:jsk
File Size:7159
Last Modified:Nov 17 23:24:29 2003
MD5 Checksum:27078b058c1063db9695a706a4f68b1d

 ///  File Name: rnnguest12.txt
Description:
The RNN Guestbook version 1.2 has multitudes of vulnerabilities. They range from allowing a remote attacker to execute commands to the ability to achieve full administrative access without authentication. Full descriptions and exploitation enclosed.
Author:BrainRawt
File Size:4395
Last Modified:Dec 1 03:53:30 2003
MD5 Checksum:0754b26af27338e25b349e9041d28689

 ///  File Name: rpc!exec.c
Description:
Windows remote rpc dcom exploit which bypasses non-executable stack protection by using return into libc. Tested against OverflowGuard and StackDefender (with kernel32 imagebase randomization) running on Windows 2000 SP0 and Windows XP SP0.
Author:ins1der
File Size:16612
Last Modified:Nov 8 05:20:15 2003
MD5 Checksum:9e3ef780cbba1ba342d85d3417f43325

 ///  File Name: rush12.txt
Description:
phpWebFileManager version 2.0.0 is susceptible to a directory traversal attack due to a lack of input validation.
Author:idtwolf
Homepage:http://www.rsteam.ru
File Size:2621
Last Modified:Nov 17 23:31:15 2003
MD5 Checksum:9eb1029ff44f80602acd4bef54d419dc

 ///  File Name: rush13.txt
Description:
Rolis Guestbook version 1.0 is susceptible to php injection cross site scripting attacks.
Author:idtwolf
Homepage:http://www.rsteam.ru
File Size:3114
Last Modified:Nov 17 23:34:34 2003
MD5 Checksum:1972e31d4135891fa96c056c66ac386f

 ///  File Name: SCSA021.txt
Description:
Security Corporation Security Advisory [SCSA-021]: vBPortal versions 2.0 alpha 8.1 and below allow a remote attacker the ability to send mail anonymously via a vulnerability in its friend.php script.
Author:frog-man
Homepage:http://www.Security-Corp.com
File Size:8009
Last Modified:Nov 25 04:03:25 2003
MD5 Checksum:b9b406a1de68f15e93c5a0044938ddfa

 ///  File Name: shatterCommCtrl.txt
Description:
Shatter attack exploit against CommCtrl 6.0 Buttons. This write up and exploit demonstrates that any privileged application, which makes use of the Microsoft XP visual styles and creates a window on the interactive desktop, can be used by an attacker to gain elevated privileges.
Author:Oliver Lavery
File Size:7516
Last Modified:Nov 4 07:11:38 2003
MD5 Checksum:d08ebed3d21207d68c67d22e9b554a1d

 ///  File Name: sp-myserver0.5-dos.c
Description:
Remote denial of service exploit for MyServer 0.5. Malicious payload crashes the server giving a runtime error. Tested on Windows XP Pro SP1 and Windows 2000 SP3.
Author:badpack3t
Homepage:http://www.security-protocols.com
File Size:5404
Last Modified:Nov 14 21:30:36 2003
MD5 Checksum:5003eaa9233aaba1997a86319e2b57aa

 ///  File Name: TCM315.txt
Description:
The embedded webserver for the Thomson TCM315 cable modem is vulnerable to a buffer overflow during a typical GET method HTTP request.
Author:aT4r
File Size:3579
Last Modified:Nov 25 05:05:14 2003
MD5 Checksum:51198bef948a30a3927152acb48c8e3f

 ///  File Name: terminatorX-exp.c
Description:
TerminatorX version 3.81 and below local root exploit. Bruteforcing option included. Makes use of vulnerabilities discussed in this related advisory.
Author:Li0n7
File Size:6825
Last Modified:Nov 14 02:10:03 2003
MD5 Checksum:04ab215e46ffae3ec92f1b86dc5cfa09

 ///  File Name: termxploit.c
Description:
TerminatorX version 3.81 and below local root exploit. Makes use of vulnerabilities discussed in this related advisory.
Author:phender
File Size:2650
Last Modified:Nov 14 02:12:09 2003
MD5 Checksum:8b5061ce2be4afdf626e722708c4230e

 ///  File Name: unace-exp.c
Description:
UnAce version 2.20 local proof of concept exploit. Original vulnerability discovery made by MegaHz. Bruteforcing option included.
Author:Li0n7
File Size:4471
Last Modified:Nov 15 18:47:12 2003
MD5 Checksum:652bbe547dbd598468bd44680ceda980

 ///  File Name: xmjong.c
Description:
mah-jong version 1.4 server/client remote buffer overflow exploit that makes use of the SetPlayerOption command in the server and the PlayerOptionSet command in the client.
Author:vade79/v9
File Size:15756
Last Modified:Nov 4 07:02:11 2003
MD5 Checksum:5c35b328c236f41bef652d708c08ca6b