.:[ packet storm ]:.
                         
paranoia is a friend like no other
paranoia is a friend like no other

 Section:  .. / 0008-exploits  /

Some of these exploits are from Bugtraq and Security Bugware

Page 2 of 5
<< 1 2 3 4 5 >> Files 25 - 50 of 119
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: eject-x86.c
Description:
/usr/bin/eject local root exploit for solaris 2.5 2.5.1 x86.
Homepage:http://lsd-pl.net
File Size:2120
Last Modified:Sep 7 22:37:23 2000
MD5 Checksum:7308219daf7c83c637920c0cd85f37b8

 ///  File Name: eject.c
Description:
/bin/eject local root exploit for solaris 2.5 2.5.1 sparc.
Homepage:http://lsd-pl.net
File Size:1650
Last Modified:Sep 7 22:21:45 2000
MD5 Checksum:12d8a70763042b720188a420ee7c86a6

 ///  File Name: eject3.c
Description:
/usr/sbin/eject local exploit for Irix 6.2.
Homepage:http://lsd-pl.net
File Size:1692
Last Modified:Sep 8 00:30:10 2000
MD5 Checksum:b4d3a80494b3fd6e91498e0cc48548be

 ///  File Name: everythingform.txt
Description:
The Everything Form (everythingform.cgi) contains remote vulnerabilities which allow any file on the sytem to be read.
Author:Signal 9
File Size:1850
Last Modified:Aug 14 22:25:42 2000
MD5 Checksum:886d2b5c72aae75767b040e22b3bbd9f

 ///  File Name: fdformat-x86.c
Description:
/bin/fdformat for solaris 2.5 2.5.1 x86.
Homepage:http://lsd-pl.net
File Size:2222
Last Modified:Sep 7 22:54:56 2000
MD5 Checksum:2bb1d59e021606127ba8760761553b28

 ///  File Name: fdformat.c
Description:
/bin/fdformat local root exploit for solaris 2.5 2.5.1 sparc.
Homepage:http://lsd-pl.net
File Size:1782
Last Modified:Sep 7 22:20:54 2000
MD5 Checksum:c933d007471a0ff5ab4708209cf5ae26

 ///  File Name: ffbconfig.c
Description:
/usr/sbin/ffbconfig local root exploit for solaris 2.5 2.5.1 sparc.
Homepage:http://lsd-pl.net
File Size:1801
Last Modified:Sep 7 22:19:33 2000
MD5 Checksum:2c5e7ff50700fd9684999fb461a4d779

 ///  File Name: form-totaller.txt
Description:
Form-Totaller version 1.0 (form-totaller.cgi) trusts user input for filenames, allowing a remote user to read any file on the webserver.
Author:Signal 9
File Size:1879
Last Modified:Aug 14 22:29:59 2000
MD5 Checksum:c176fa3885dae24832840fa6cf24539d

 ///  File Name: fpage-DoS.pl
Description:
Fpage-DoS.pl - Info based attacks DoS Front page. To exploit this vunerability you must have the extensions "/ _ vti_bin/shtml.exe in your server. This is a demonstration script to remotely overflow various server buffers, resulting in a denial of service, for TESTING purposes only. Runs on *nix & Windows with perl.
Author:alt3kx
Homepage:http://www.raza-mexicana.org
File Size:4865
Last Modified:Aug 30 23:24:30 2000
MD5 Checksum:4ef33313379701100a8e4dac1ecbb646

 ///  File Name: FS-073100-10-BEA.txt
Description:
Foundstone Security Advisory FS-073100-10-BEA - It is possible to compile and execute any arbitrary file within the web document root directory of the WebLogic server as if it were a JSP/JHTML file, even if the file type is not .jsp or .jhtml. If applications residing on the WebLogic server write to files within the web document root directory, it is possible to insert executable code in the form of JSP or JHTML tags and have the code compiled and executed using WebLogic's handlers. This can potentially cause an attacker to gain administrative control of the underlying operating systems.
Author:Shreeraj Shah
Homepage:http://www.foundstone.com/advisories.htm
File Size:5037
Last Modified:Aug 2 20:44:19 2000
MD5 Checksum:1dd991014f7279d9d772f52478be66d3

 ///  File Name: FtpdXploit2000.tar
Description:
This is an exploit that explores the vulnerability of the versions 2.4.4, 2.5.0 and 2.6.0 of Wu-ftpd. Written in Portugese.
Homepage:http://www.geocities.com/cultbh
File Size:20480
Last Modified:Aug 30 10:41:33 2000
MD5 Checksum:e30e8c879f8071f9cc3b34371990388f

 ///  File Name: gr_osview.c
Description:
/usr/sbin/gr_osview local exploit for Irix 6.2 and 6.3.
Homepage:http://lsd-pl.net
File Size:1758
Last Modified:Sep 8 00:27:15 2000
MD5 Checksum:5e2840ed7076d1cb5b71eb61c4225231

 ///  File Name: gtkicq.c
Description:
gtkicq-0.62 local exploit. Overflows the HOME environment variable.
Author:Sebastien Roy
File Size:2547
Last Modified:Sep 7 22:30:51 2000
MD5 Checksum:8487d5f8f0583ab4c9c53e62f381c74d

 ///  File Name: horde.txt
Description:
The $from-bug is in the horde library file 'horde.lib', (on debian systems installed in /usr/share/horde/lib/horde.lib) in line 1108 belonging to function "mailfrom". In this file there is a call to "popen" with an unchecked "from:"-line as argument. Bug found and exploited by Jens "atomi" Steube, Fixed and documentated by Christian "thepoet" Winter
File Size:3312
Last Modified:Sep 11 19:09:56 2000
MD5 Checksum:7ee65a0d5d1fa264e6a56df32877bea2

 ///  File Name: hpux.ftpd.txt
Description:
HPUX's ftpd contains a remotely exploitable format string vulnerability in the PASS command.
Author:Venglin
Homepage:http://www.freebsd.lublin.pl
File Size:1080
Last Modified:Aug 11 00:59:15 2000
MD5 Checksum:52757625c75bb68c6c403710d078bc99

 ///  File Name: htgrep.c
Description:
Htgrep has a vulnerability which allows a remote user to read arbitrary files on the system with the priviledge of the user running the program.
Author:n30
File Size:2386
Last Modified:Aug 21 23:04:12 2000
MD5 Checksum:44e6b83eeb52eb927c6866f44c07cd87

 ///  File Name: HWA-warpcrash.c
Description:
HWA-warpcrash - Systems Affected: OS/2 Warp 4.5 FTP server V4.0/4.2, OS/2 Warp 4.5 FTP server V4.3, Probably other versions of the software as well. Problem: The FTP server that comes with OS/2 Warp 4.5 TCP/IP can be brought down by a malicious connection attempt.
Author:eth0
Homepage:http://www.hwa-security.net
File Size:2802
Last Modified:Aug 31 01:56:28 2000
MD5 Checksum:18b76e61c2aea73422b522534b5da8e6

 ///  File Name: ie5-msn.exec.txt
Description:
Georgi Guninski security advisory #18 - Two serious vulnerabilities have been found Microsoft products - Internet Explorer 5.5/5.x may execute arbitrary programs when visiting a web page, reading HTML based mail with Outlook, or simply browsing folders as web pages. In addition, the default installation of Windows 2000 allows Local Administrator compromise via opening local folders as web pages. In both cases a malicous person may take full control over user's computer / server. Includes proof of concept HTML code. Demonstration available here.
Author:Georgi Guninski
Homepage:http://www.nat.bg/~joro
File Size:8941
Last Modified:Aug 16 02:12:00 2000
MD5 Checksum:1f4cc1e9ab9d13efedb1c42dbabdbc96

 ///  File Name: inpview.c
Description:
/usr/lib/InPerson/inpview local exploit for irix 6.5 and 6.5.8.
Homepage:http://lsd-pl.net
File Size:1265
Last Modified:Sep 8 00:30:59 2000
MD5 Checksum:e451bb3c91d58f58a0be7cf74296cba9

 ///  File Name: irix-libc.c
Description:
libc.so NLSPATH local exploit for Irix 6.2.
Homepage:http://lsd-pl.net
File Size:3111
Last Modified:Sep 8 00:26:12 2000
MD5 Checksum:2b1f37157932fbf6eba526123da8636f

 ///  File Name: irix-xlock.c
Description:
Irix 6.3/6.2 /usr/bin/X11/xlock local buffer overflow exploit.
Homepage:http://lsd-pl.net
File Size:1744
Last Modified:Sep 8 00:21:02 2000
MD5 Checksum:19d26832ec333919d795f33bfc09de1f

 ///  File Name: irix.telnetd.txt
Description:
A serious vulnerability has been found in IRIX telnetd which can give remote root access to any IRIX 6.2-6.5.8[m,f] system. The vulnerability occurrs when one of the environment variables contains a format string which is passed on to the syslog() function. Proof of concept exploit included (updated version - compiler and little endian fixes). Fix available here.
Author:LSD
Homepage:http://lsd-pl.net
File Size:21301
Last Modified:Sep 13 21:11:15 2000
MD5 Checksum:22385913d3970f9f00addf76aa299fee

 ///  File Name: irix_rpc_ttdbserverd.c
Description:
rpc.ttdbserverd remote root exploit for irix 5.2 5.3 6.2 6.3 6.4 6.5 6.5.2.
Homepage:http://lsd-pl.net
File Size:7902
Last Modified:Sep 7 23:00:57 2000
MD5 Checksum:983cc713413d355851a1143d56d1b1e5

 ///  File Name: kcms_configure-x86.c
Description:
/usr/openwin/bin/kcms_configure for solaris 2.5.1 2.7 x86.
Homepage:http://lsd-pl.net
File Size:2217
Last Modified:Sep 7 22:54:13 2000
MD5 Checksum:d7fb8e71c2df1089a59cf1071a511f15

 ///  File Name: kcms_configure.c
Description:
/usr/openwin/bin/kcms_configure local root exploit for solaris 2.7 sparc.
Homepage:http://lsd-pl.net
File Size:2237
Last Modified:Sep 7 22:18:46 2000
MD5 Checksum:1dc3962c071af0f2d89f4f8957149827