Section:  .. / 0209-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 73
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: guardadv.db4web.txt
Description:
Guardeonic Solutions Security Advisory #01-2002 - The DB4Web Application Server for Linux, Unix, and Windows can be accessed with malicious URLs allowing users to download any readable file on the server. Exploit URL's included.
Author:Stefan Bagdohn
Homepage:http://www.guardeonic.com
File Size:3215
Last Modified:Sep 21 10:09:06 2002
MD5 Checksum:64d4d5f90284d5f5e2d2bb4d52fe728f

 ///  File Name: trillident.c
Description:
Exploit for the PRIVMESG remote denial of service vulnerability that exists in Trillian v.73 and .74 which sends an overflow in the ident connection. Compiles on Unix based OS's.
Author:Netmask
File Size:4665
Last Modified:Sep 21 09:35:05 2002
MD5 Checksum:73cffa14787d80bf5655dc7c2ecb1125

 ///  File Name: ohMy-another-efs.c
Description:
Efstool local root exploit which works against Redhat 7.3.
Author:Joker
Homepage:http://www.daforest.org/~j0ker/index.html
File Size:7612
Last Modified:Sep 20 20:11:34 2002
MD5 Checksum:c20b9e3e46a310536130a5d004e7bfff

 ///  File Name: Trillian-Privmsg.c
Description:
Exploit for the PRIVMESG DoS that exists in several Trillian versions. This code, which emulates an IRC server, should work against Trillian version 0.73 and 0.74. Compiles on Windows - Tested with Borland 5.5 Commandline Tools.
Author:Lance Fitz-Herbert
File Size:2377
Last Modified:Sep 20 16:32:58 2002
MD5 Checksum:b8200c45f1819c16c6c76345ee427d53

 ///  File Name: ES-cisco-vpn.c
Description:
Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.
Author:ElectronicSouls
File Size:3087
Last Modified:Sep 19 14:07:14 2002
MD5 Checksum:a2c3a57714a738b22361ec246558f0da

 ///  File Name: cisco-vpn-5000-lnx.c
Description:
This exploit abuses a local buffer overflow in the Cisco VPN 5000 Linux client v5.1.5 close_tunnel binary to spawn a root shell.
Author:Zillion
Homepage:http://www.safemode.org
File Size:1848
Last Modified:Sep 19 14:02:03 2002
MD5 Checksum:7943a0a865858b090e32ef6d43864ca5

 ///  File Name: k3.c
Description:
k3.c is a Linux proof of concept exploit for a buffer overflow vulnerability that exists in the atftp client version 0.5 and 0.6.
Author:sacrine.
Homepage:http://www.netric.org
File Size:1985
Last Modified:Sep 19 11:33:53 2002
MD5 Checksum:a91745fde8b472e0455ff81b929e63c3

 ///  File Name: apache-linux.txt
Description:
Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.
Author:Nebunu
File Size:18138
Last Modified:Sep 19 08:39:21 2002
MD5 Checksum:6c13247823eb45dd5c16db33f5077072

 ///  File Name: free-apache.txt
Description:
FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.
Author:Nebunu
File Size:9102
Last Modified:Sep 19 08:34:19 2002
MD5 Checksum:c951622daa65e39d1df562c2219acecc

 ///  File Name: openssl-too-open.tar.gz
Description:
OpenSSL v0.9.6d and below remote exploit for Apache/mod_ssl servers which takes advantage of the KEY_ARG overflow. Tested against most major Linux distributions. Gives a remote nobody shell on Apache and remote root on other servers. Includes an OpenSSL vulnerability scanner which is more reliable than the RUS-CERT scanner and a detailed vulnerability analysis.
Author:Solar Eclipse
Homepage:http://phreedom.org
File Size:18396
Last Modified:Sep 17 15:49:52 2002
MD5 Checksum:6c37282f541f13add85e5b2b76e3678e

 ///  File Name: idefense.libkvm.txt
Description:
iDEFENSE Security Advisory 09.16.2002 - The FreeBSD ports asmon, ascpu, bubblemon, wmmon, and wmnet2 can be locally manipulated to take advantage of open file descriptors /dev/mem and /dev/kmem to gain root privileges on a target host. These five programs are installed setgid kmem by default. Exploit information included.
Author:David Endler and Jaguar
Homepage:http://www.idefense.com
File Size:3351
Last Modified:Sep 17 14:29:59 2002
MD5 Checksum:b728af73087e744934fdfbbea052f689

 ///  File Name: lconfmdk.c
Description:
Linuxconf local root exploit for Mandrake 8.2.
Author:Priest.
File Size:4215
Last Modified:Sep 17 13:39:57 2002
MD5 Checksum:0d6dda171bc76298526af8422229e9cb

 ///  File Name: pwck_expl.c
Description:
Pwck local exploit for Redhat 7.2. /usr/sbin/pwck must be -rwsr-sr-x to give a root shell.
Author:Klep
File Size:2212
Last Modified:Sep 17 05:38:42 2002
MD5 Checksum:e75c0f9d4f3f94b01dfe8ec10f582fa4

 ///  File Name: bugtraqworm.tgz
Description:
Linux Slapper Worm - This file contains the binaries and source code for the current Apache worm which affects multiple versions of Linux. It exploits an OpenSSL buffer overflow to run a shell on the remote system and also contains the ability to perform a DDoS attack. These files were found in the wild from machines that had been compromised.
File Size:87726
Last Modified:Sep 16 19:19:29 2002
MD5 Checksum:fc2a65953a4b98971888d9b5df4d1c53

 ///  File Name: efstool.txt
Description:
Efstool local root exploit. A condition has been found in efstool which is shipped with Redhat and Slackware linux (and possibly other distributions) which, given the right environment, root privileges can be gained. Full research provided.
Author:ntfx
Homepage:http://www.soldierx.com
File Size:6573
Last Modified:Sep 13 00:27:30 2002
MD5 Checksum:044dc4da250fc55be975c7fb9c557d87

 ///  File Name: sx-slap.pl
Description:
Remote / Local buffer overflow for Savant Web Server 3.1 and below, as described in Foundstone advisory 091002-SVWS. Crashes the daemon, no patch is available as of the 11th of Sept, 02.
Author:NTFX
Homepage:http://legion2000.security.nu
File Size:1106
Last Modified:Sep 12 14:22:18 2002
MD5 Checksum:727c37f6b87d09e49e5738313b20ce83

 ///  File Name: targets.319
Description:
List of targets for the x2 remote crc32 ssh exploit which contains 319 entries.
File Size:34692
Last Modified:Sep 11 16:31:01 2002
MD5 Checksum:d6d6df1179ca1c74160efd5cdeb5b0c0

 ///  File Name: coudrape.c
Description:
Efstool local root exploit for linux/x86 in C.
Author:Cloudass
File Size:1621
Last Modified:Sep 11 16:18:00 2002
MD5 Checksum:84517123be77c81385f4331da5de0b49

 ///  File Name: efstool.pl
Description:
Efstool local root exploit for linux/x86 in perl.
Author:user_15335[at]erato.uk.clara.net
File Size:646
Last Modified:Sep 11 16:15:00 2002
MD5 Checksum:adcba327cd833a9c94c4cfbf10570e96

 ///  File Name: autolinuxconf.tgz
Description:
Autolinuxconf.tgz is an improved exploit for linuxconf <= 1.28r3 which has been found to work on Mandrake 8.1 and 8.2 and Redhat 7.2 and 7.3.
Author:Syscalls
Homepage:http://www.myseq.com
File Size:2880
Last Modified:Sep 11 16:05:00 2002
MD5 Checksum:835c256e407b88f79f3720a9d406f353

 ///  File Name: woltlab.txt
Description:
Woltlab Burning Board 2.0 RC 1 has a vulnerability that allows any user (even guests, depending on the configuration) to compromise every other account due to a variable containing unchecked user input in board.php, which can be used for a sql injection attack.
Author:Cano2
File Size:1959
Last Modified:Sep 11 08:30:05 2002
MD5 Checksum:f6e418e576a98c54acfc3e3af0967bb9

 ///  File Name: gm010-ie
Description:
GreyMagic Security Advisory GM#010-IE - Microsoft Internet Explorer 5.5 and above are vulnerable to an attacker who can execute scripts on any page that contains frame or iframe elements, ignoring any protocol or domain restriction set forth by Internet Explorer. This means that an attacker can steal cookies from almost any site, access and change content in sites and in most cases also read local files and execute arbitrary programs on the client's machine. Note that any other application that uses Internet Explorer's engine is also affected.
Homepage:http://sec.greymagic.com/adv/gm010-ie/
File Size:4712
Last Modified:Sep 11 08:20:53 2002
MD5 Checksum:0a3d976bfa8b7f03c04ae3576b7fb110

 ///  File Name: TRU64_xkb
Description:
Proof of concept local root exploit for _XKB_CHARSET on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:2175
Last Modified:Sep 11 07:38:22 2002
MD5 Checksum:b7d1b4f1d2f36cd4d8925080798e18fd

 ///  File Name: TRU64_su
Description:
Another version of the proof of concept local root exploit for su on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:946
Last Modified:Sep 11 07:36:28 2002
MD5 Checksum:f587978781a3655004ef60d6595781ee

 ///  File Name: TRU64_nlspath
Description:
Proof of concept local root exploit written in Perl for NLSPATH overflow on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:2859
Last Modified:Sep 11 07:27:31 2002
MD5 Checksum:dee2152324a9cc4b106b58e6c131dfef