Section:  .. / 0404-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 50
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: p_xfree.c
Description:
XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.
Author:pi3
Homepage:http://www.pi3.int.pl
Related File:02.11.04.txt
File Size:11670
Last Modified:Apr 20 12:17:00 2004
MD5 Checksum:02f09f93f2adb9197f86c2140e23e6ee

 ///  File Name: Phorum347SQL.pl
Description:
Remote exploit that makes use of a SQL injection vulnerability in Phorum version 3.4.7.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
Related File:waraxe-2004-SA019.txt
File Size:2900
Last Modified:Apr 18 11:34:00 2004
MD5 Checksum:4ec2f69be6677d3a55d044b479749d1c

 ///  File Name: phpBBmod.txt
Description:
phpBB modified by PRzemo version 1.8 allows for arbitrary code execution due to improper filtering allowing for remote script inclusion.
Author:Officerrr
File Size:1871
Last Modified:Apr 19 16:30:00 2004
MD5 Checksum:56451f2f2af87fa042870c5de4688379

 ///  File Name: phpnukeVideo.txt
Description:
PHP-Nuke Video Gallery Module version 0.1 Beta 5 is susceptible to full path disclosure and SQL injection attacks.
Author:DarkBicho
Homepage:http://www.darkbicho.tk
File Size:4374
Last Modified:Apr 28 06:01:47 2004
MD5 Checksum:54acb3d8866b74c2e6d1ec256608e9d9

 ///  File Name: priv8lcd44.pl
Description:
Remote exploit that makes use of overflows in versions 0.4.4 and below of LCDproc's daemon.
Author:Adriano Lima
Homepage:http://www.priv8security.com
Related File:lcdproc.adv2
File Size:3717
Last Modified:Apr 9 06:55:00 2004
MD5 Checksum:7196f50ff2b0c806cf549add4c7278db

 ///  File Name: reset-tcp.c
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
Author:Paul A. Watson
Homepage:http://www.terrorist.net
Related File:SlippingInTheWindow_v1.0.doc
File Size:3373
Related CVE(s):CAN-2004-0230
Last Modified:Apr 24 01:56:17 2004
MD5 Checksum:109c83b293fa1cd19507c8d844936b19

 ///  File Name: reset-tcp_rfc31337-compliant.c
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Some modifications done by J 'Swoop' Barber.
Author:Paul A. Watson
Homepage:http://www.terrorist.net
Related File:SlippingInTheWindow_v1.0.doc
File Size:4479
Related CVE(s):CAN-2004-0230
Last Modified:Apr 24 01:57:29 2004
MD5 Checksum:b89b0241199fd7937f1cc29a3a32e3af

 ///  File Name: reset.zip
Description:
This program will reset a TCP connection by guessing a valid sequence number.
Author:Aphex
Homepage:http://www.iamaphex.cjb.net
Related File:246929.html
File Size:14181
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 04:45:00 2004
MD5 Checksum:f4ab099f779083bfa1ce46e3cdfdea5d

 ///  File Name: rootme.tar
Description:
Local root exploit for the Solaris vfs_getvfssw() Loadable Kernel Module Path vulnerability found by Immunity Security.
Author:Sam
Related File:solaris_kernel_vfs.sxw.pdf
File Size:10240
Last Modified:Apr 7 10:23:00 2004
MD5 Checksum:6d96d97f7cd6f65a60955ca1eab94875

 ///  File Name: RoseAttackv1.txt
Description:
Program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.
Author:Laurent Constantin
Related File:Rose_Frag_Attack_Explained.txt
File Size:6275
Last Modified:Apr 28 07:11:14 2004
MD5 Checksum:abe79cdc4e802902cbc75e03bd7f4406

 ///  File Name: RoseAttackv2.txt
Description:
Another program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.
Author:Chuck
Related File:Rose_Frag_Attack_Explained.txt
File Size:11786
Last Modified:Apr 28 07:12:15 2004
MD5 Checksum:c71f6be9ef9b5b7e9aaaa903c83d697c

 ///  File Name: SCSA028.txt
Description:
Security Corporation Security Advisory [SCSA-028]: Nuked-KlaN versions b1.4 and b1.5 allows for directory traversal attacks and global variable overwriting.
Author:Germain Randaxhe aka frog-man
Homepage:http://www.phpsecure.info
File Size:10380
Last Modified:Apr 17 13:01:00 2004
MD5 Checksum:9a1ed5e3d1ff8b9aeefee4487b9fa4e5

 ///  File Name: SPK-chpasswd.tgz
Description:
Local root exploit for Squirrelmail's chpasswd utility. Original bug found by Matias Neiff.
Author:SpikE
Related File:chpasswd.txt
File Size:1069
Last Modified:Apr 18 11:14:00 2004
MD5 Checksum:89576d98080ddfe977136d731fbd137d

 ///  File Name: sslbomb.c
Description:
Remote denial of service exploit for IIS SSL vulnerability documented in MS04-011.
Author:David Barroso Berrueta, Alfredo Andres Omella
Homepage:http://www.s21sec.com
File Size:12128
Last Modified:Apr 15 09:45:00 2004
MD5 Checksum:655b5cdfab95f087efd0af0e1cbf2d6c

 ///  File Name: SurgeLDAP10.txt
Description:
SurgeLDAP 1.0g suffers from a directory traversal vulnerability in the user.cgi script due to a lack of input validation.
Author:Dr. Insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:1414
Last Modified:Apr 14 16:23:00 2004
MD5 Checksum:114af6df8ed3c31a1fb8814675003e77

 ///  File Name: tcp_reset.c
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
Author:eazy
Related File:SlippingInTheWindow_v1.0.doc
File Size:3737
Related CVE(s):CAN-2004-0230
Last Modified:Apr 28 08:03:00 2004
MD5 Checksum:2edd0e1dafca116fdae393cd4f64c383

 ///  File Name: THCIISSLame.c
Description:
THCIISSLame version 0.2 IIS 5 SSL remote root exploit. Uses a connect back shell.
Author:Johnny Cyberpunk
Homepage:http://www.thc.org/
File Size:6725
Last Modified:Apr 22 18:04:00 2004
MD5 Checksum:b10bb6ba9138a6d29c48e148b7207004

 ///  File Name: tikiwiki181.txt
Description:
Tiki CMS/Groupware (aka TikiWiki) versions 1.8.1 and below suffer from path disclosure, cross site scripting, SQL injection, directory traversal, and arbitrary file upload vulnerabilities.
Author:JeiAr
File Size:8998
Last Modified:Apr 11 12:16:00 2004
MD5 Checksum:e695514d042cdecc0a42e45dcab558ce

 ///  File Name: umodpoc.zip
Description:
Proof of concept exploit for the Unreal engine developed by EpicGames which has a flaw with UMOD where it handles information from files without properly filtering for dangerous characters.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:unrealEngine2.txt
File Size:8523
Last Modified:Apr 22 18:03:00 2004
MD5 Checksum:babab0ce107edf023e98cb9facc781f6

 ///  File Name: waraxe-2004-SA015.txt
Description:
NukeCalendar version 1.1.a, the PHP-Nuke Calendar Module, suffers from SQL injection, cross site scripting, and full path disclosure flaws.
Author:Janek Vind
Homepage:http://www.waraxe.us/index.php?modname=sa&id=15
File Size:3473
Last Modified:Apr 8 16:04:00 2004
MD5 Checksum:347eabc0fa516ae07eb0e9868b897d7c

 ///  File Name: waraxe-2004-SA021.txt
Description:
The phprofession 2.5 module for PostNuke is susceptible to path disclose, cross site scripting, and possible SQL injection attacks.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:3955
Last Modified:Apr 22 10:16:00 2004
MD5 Checksum:60a7eb530f31c704d7281ef37d66a91a

 ///  File Name: waraxe-2004-SA022.txt
Description:
PostNuke 0.726 Phoenix is susceptible to multiple path disclosure and cross site scripting vulnerabilities.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:4922
Last Modified:Apr 22 11:37:00 2004
MD5 Checksum:26c15fd38d1d3b31e7aacd5170f5c586

 ///  File Name: wz_ex.c
Description:
Proof of concept exploit for the WinZip32 MIME Parsing Overflow. Tested against WinZip 8.1 on Windows XP SP1 and Windows 2000 SP1. Instructions for use are included.
Author:snooq
Homepage:http://www.angelfire.com/linux/snooq/
Related File:02.27.04a.txt
File Size:6499
Last Modified:Apr 15 09:23:00 2004
MD5 Checksum:5fc351268d1bcf67459c35ae1510a996

 ///  File Name: XMicro.backdoor.txt
Description:
X-Micro WLAN 11b Broadband Routers versions 1.2.2 and 1.2.2.3 have a backdoor account of super with a password of super.
Author:Gergely Risko
File Size:1896
Last Modified:Apr 10 17:57:00 2004
MD5 Checksum:fb2348377074ae051bdf7d478b99ddd4

 ///  File Name: XMicro.backdoor2.txt
Description:
X-Micro WLAN 11b Broadband Routers versions 1.2.2, 1.2.2.3, 1.2.2.4, 1.6.0.0, and 1.6.0.1 all have a backdoor account of super with a password of super. 1.6.0.1 also has an account 1502 with a password of 1502 hardcoded.
Author:Gergely Risko
File Size:2454
Last Modified:Apr 16 12:31:00 2004
MD5 Checksum:2522c3d224054bfc979da26ee025c82d