Section:  .. / 0209-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 73 of 73
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: TRU64_dxterm
Description:
Proof of concept local root exploit for dxterm on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:901
Last Modified:Sep 11 07:20:02 2002
MD5 Checksum:dcff3ccecc59db66d33b935d1b1113d9

 ///  File Name: TRU64_dtterm
Description:
Proof of concept local root exploit for dtterm on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:1037
Last Modified:Sep 11 07:17:34 2002
MD5 Checksum:fbc1785d31e44f9c9588303d7828137f

 ///  File Name: TRU64_dtprintinfo
Description:
Proof of concept local root exploit for dtprintinfo on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:992
Last Modified:Sep 11 07:15:10 2002
MD5 Checksum:7e52f96fd8503185cc33cb015befcb06

 ///  File Name: TRU64_dtaction
Description:
Proof of concept local root exploit for dtaction on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com/
File Size:995
Last Modified:Sep 11 07:10:28 2002
MD5 Checksum:bad813771eedaf4767d6244cfb4ba69c

 ///  File Name: phpcrlf.txt
Description:
fopen(), file() and other functions in PHP have a vulnerability that makes it possible to add extra HTTP headers to HTTP queries. Attackers may use it to escape certain restrictions, like what host to access on a web server. In some cases, this vulnerability even opens up for arbitrary net connections, turning some PHP scripts into proxies and open mail relays.
Author:Ulf Harnhammar
File Size:4861
Last Modified:Sep 11 06:25:52 2002
MD5 Checksum:fb701d51ad9b8b40f4146b525decc01a

 ///  File Name: trillian-ini-decrypt.c
Description:
Trillian, a popular utility used in conjunction with various Instant Messaging like ICQ, AIM, MSN Messenger, etc, stores a User's password utilizing a simple XOR with a key that is uniform throughout every installation. This utility decrypts all related .INI files displaying a list of usernames, "encrypted" passwords, and plain text passwords.
Author:Evan Nemerson
File Size:5538
Last Modified:Sep 10 06:53:31 2002
MD5 Checksum:8f33c678cbd7adb091aaa4b1764a89ce

 ///  File Name: massrooter.tar.gz
Description:
Massrooter takes advantage of vulnerabilities in bind, lpd, rpc, wuftpd, telnet, mail, ssl, and ssh on multiple systems.
Author:Daddy_cad
File Size:1505102
Last Modified:Sep 7 02:33:48 2002
MD5 Checksum:7b5a9c6d711c0796b6a85aa94c7a1f52

 ///  File Name: wuscan.tgz
Description:
Wu-ftpd 2.6.1 mass rooter / scanner.
Author:Daddy_cad
File Size:183110
Last Modified:Sep 7 02:32:43 2002
MD5 Checksum:eb2b86497f9b9f51773beea85d15123a

 ///  File Name: ssh3.tar.gz
Description:
Ssh3.tar.gz is a LPRng, Named, FTPD, SSHD, RPC and Telnetd mass scanner/rooter.
Author:Daddy_cad
File Size:2241217
Last Modified:Sep 7 02:30:02 2002
MD5 Checksum:abf180ace6bd404efc6c00127e6d5213

 ///  File Name: SQLTools.rar
Description:
SQLTools is a collection of tools for auditing MSSQL servers including SQLScanner,SQLPing, SQLCracker, SQLDOSStorm, and SQLOverflowDos.
Author:Refdom
File Size:85807
Last Modified:Sep 6 08:05:17 2002
MD5 Checksum:efeeb8be77d011e25f8dc1cfb38fa77e

 ///  File Name: upb.admin.txt
Description:
Ultimate PHP Board (UPB) prior to Public Beta v1.0b allows users to gain admin access. Exploit information included.
Author:Hipik
Homepage:http://www.hackeri.org
File Size:2155
Last Modified:Sep 6 07:47:23 2002
MD5 Checksum:b062b12a3b4fcbc8784d6ef88b87722a

 ///  File Name: afd-expl.c
Description:
AFD v1.2.14 local root heap overflow exploit. Includes offset for Redhat 7.3 and instructions for finding offsets.
Author:eSDee
Homepage:http://www.netric.org
File Size:2205
Last Modified:Sep 6 06:33:42 2002
MD5 Checksum:f273a2abf33bbe40cc716f3cc0cc09a5

 ///  File Name: pirch98.zip
Description:
Pirch98 irc client contains a buffer overflow which can allow remote code execution in the way that pirch 98 handles links to other channels and websites. The Pirch98 client now shipping at www.pirch.com has been fixed. Includes ASM source and Windows binary for an exploit which opens a shell on port 31337.
Author:Vecna
File Size:15901
Last Modified:Sep 5 09:14:24 2002
MD5 Checksum:4828fff9ebe60b2e0057cb601748011c

 ///  File Name: SurfinGate.txt
Description:
The Finjan SurfinGate 6.0x on Windows NT 4.0 and 2000 can be bypassed by using IP addresses instead of hostnames or by adding a dot to the end of hostnames.
Author:Marc Ruef
Homepage:http://www.computec.ch
File Size:2471
Last Modified:Sep 5 08:59:30 2002
MD5 Checksum:1458603dc6c13802ef082062b929b537

 ///  File Name: pwck_exp.c
Description:
Pwck local linux buffer overflow exploit.
Author:default /usr/sbin/pwck is not setuid, if +s pwck bingo #. Tested on Mandrake 8.2.
File Size:3099
Last Modified:Sep 5 07:30:36 2002
MD5 Checksum:5bf12aa6da163e5d29f5c86199ba3290

 ///  File Name: SQLScan.zip
Description:
SQLScan v1.0 is intended to run against Microsoft SQL Server and attempts to connect directly to port 1433. Features the ability to scan one host or an IP list from an input file, the ability to scan for one SQL account password or multiple passwords from a dictionary file, and the ability to create an administrative NT backdoor account on vulnerable hosts, which will fail if xp_cmdshell is disabled on the server.
Author:NTSleuth
File Size:24788
Last Modified:Sep 5 07:07:41 2002
MD5 Checksum:6e80ac480a5081c6d7b2b7381a02f471

 ///  File Name: smbkillah.c
Description:
Smbkillah.c exploits the SMB death bug in the WinXX OS.
Author:b0uNtYkI113r
File Size:16004
Last Modified:Sep 5 00:54:35 2002
MD5 Checksum:6fd9ace29c75dceb75b2523f9af18d4f

 ///  File Name: scrollkeeper.txt
Description:
A vulnerability exists in the insecure creation of files in /tmp by Scrollkeeper versions 0.3.4 and 0.3.11. Proof of concept exploit included.
Author:Spybreak
File Size:3668
Last Modified:Sep 4 08:02:08 2002
MD5 Checksum:e06c401b1d6823296aa0197b92db901c

 ///  File Name: aspcode.c
Description:
Aspcode.c is an IIS v4.0, 5.0 5.1 asp.dll buffer overflow exploit for Windows.
Author:Yuange
File Size:45626
Last Modified:Sep 3 02:38:42 2002
MD5 Checksum:921d412df9cff8fa94e2aaff0a650ce3

 ///  File Name: sws_web_killer.c
Description:
Proof of Concept Exploit for SWS Web Server v0.1.0. The SWS web server will re-spawn its process every time it receives a string without a linebreak. Tested on: Slackware 8.1 and Redhat 7.0.
Author:SaMaN
File Size:2157
Last Modified:Sep 2 18:32:39 2002
MD5 Checksum:b4f2224f7060b64ce3e013d5f258a859

 ///  File Name: elinuxconf2.c
Description:
Another Proof of Concept exploit for the local buffer overflow vulnerability existing in linuxconf v1.28r3 and below which allows users to spawn a root shell. Tested on Mandrake Linux 8.2.
Author:pokleyzz
Homepage:http://www.scan-associates.net
File Size:1687
Last Modified:Sep 2 18:10:41 2002
MD5 Checksum:9902c624a4fa627d34e0dd222043ded8

 ///  File Name: linuxconf.c
Description:
Proof of Concept exploit for the local buffer overflow vulnerability existing in linuxconf v1.28r3 and below which allows users to spawn a root shell. Tested on RedHat 7.0 with linuxconf 1.25r3.
Author:Jin Yean Tan
File Size:1917
Last Modified:Sep 2 18:07:09 2002
MD5 Checksum:9e3fb1c2aba9c8f13a8b0068713b3667

 ///  File Name: cgitelnet.pdf
Description:
CGI-Telnet 1.0, a cgi telnet script that runs on various Unix and NT webservers has vulnerabilities which can be manipulated into giving a user access. The password file is accessible in the web path and passwords are kept DES encrypted.
Author:Lawrence Lavigne
Homepage:http://neoerudition.net
File Size:45271
Last Modified:Sep 2 17:35:23 2002
MD5 Checksum:cb3d0aa2678e9486c390c0e477aa0e01