Section:  .. / 0408-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 55
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 00042-08202004.txt
Description:
GulfTech Security Advisory - BadBlue Webserver version 2.5 is susceptible to a denial of service attack when multiple connections are made to it from a single host. Exploit provided.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3967
Last Modified:Aug 24 08:39:24 2004
MD5 Checksum:6e4e79c4f7dc7d86b591731ad5519977

 ///  File Name: 00045-08242004.txt
Description:
GulfTech Security Advisory - Easy File Sharing webserver version 1.25 is susceptible to denial of service and unauthorized system access vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
Related Exploit:efswsdos.pl"
File Size:1954
Last Modified:Aug 26 21:20:48 2004
MD5 Checksum:15b7fdb4a5b6ad2e27e5534508113c39

 ///  File Name: 0408-exploits.tgz
Description:
Packet Storm new exploits for August, 2004.
File Size:134354
Last Modified:Sep 1 00:15:55 2004
MD5 Checksum:e3ace716b8302d22fb2b673989fa063a

 ///  File Name: aimAway.c
Description:
Local proof of concept exploit for AIM 5.5.3595 that makes use of the Away Message vulnerability. Binds a shell to port 1180.
Author:mandragore
Related File:Aim.DoS.8_9.pdf
File Size:3337
Related CVE(s):CAN-2004-0636
Last Modified:Aug 14 19:39:08 2004
MD5 Checksum:284516fc185508420733abd092c84030

 ///  File Name: axisFlaws.txt
Description:
Axis versions 2100, 2110, 2120, 2420, and 2130 Network Camera along with the 2400 and 2401 Video Servers are susceptible to passwd file retrieval vulnerabilities, unauthenticated admin user additions, and hardcoded login/password flaws.
Author:bashis
File Size:5432
Last Modified:Aug 24 09:31:14 2004
MD5 Checksum:3e83d84a0274030f1df56173ebf03200

 ///  File Name: bjd361exp.cpp
Description:
Proof of concept bindshell exploit code that makes use of a buffer overflow vulnerability found in BlackJumboDog FTP servers versions 3.6.1 and below.
Author:Chew Keong TAN
Homepage:http://www.security.org.sg/vuln/bjd361.html
File Size:7006
Last Modified:Aug 5 07:00:07 2004
MD5 Checksum:7aa6c564a8f8a4179a1251bd81efbfc7

 ///  File Name: c030224-001.txt
Description:
Corsaire Security Advisory - The ServerMask 2.0 product from Port80 fails to full obfuscate header fields as promoted in their functionality. Detailed exploitation given.
Homepage:http://www.corsaire.com/
File Size:6825
Related CVE(s):CAN-2003-0105
Last Modified:Aug 11 01:58:06 2004
MD5 Checksum:a35d9f1b242af70cec5e77bd6fea10f1

 ///  File Name: clearswift.txt
Description:
Clearswift Minesweeper versions 5.0.4 and below suffer from a directory traversal vulnerability.
Author:Pierre Kroma
File Size:2294
Last Modified:Aug 12 09:44:55 2004
MD5 Checksum:dc37e70ddc28a9c0cce597f6802a774e

 ///  File Name: cvstrac.txt
Description:
CVSTrac versions 1.x have an input validation flaw that allows for arbitrary command execution.
Author:Richard Ngo
File Size:624
Related OSVDB(s):8373
Last Modified:Aug 10 01:44:34 2004
MD5 Checksum:66b375d8acb6e0146b64a73a39a2222a

 ///  File Name: dlinkdown.c
Description:
Remote exploit that will change an IP address for the D-Link DCS-900 IP camera, due to the fact that it listens for a 62976/udp broadcast packet telling it what IP address to use without any authentication.
Author:anonymous
File Size:2427
Last Modified:Aug 31 05:26:49 2004
MD5 Checksum:cda6badab6d0afdafacc7b3bff56b715

 ///  File Name: drop-root.c
Description:
Previously unreleased exploit that makes use of an old flaw in Dropbear SSH versions 0.34 and below. Binds a shell to port 10275.
Author:live
File Size:9963
Last Modified:Aug 4 09:30:07 2004
MD5 Checksum:b48a0a2f65aba10778714a65df8d75d5

 ///  File Name: efswsdos.pl
Description:
GulfTech Security Exploit - Easy File Sharing webserver version 1.25 denial of service exploit that consumes 99% of the CPU.
Author:James Bercegay
Homepage:http://www.gulftech.org/
Related Exploit:00045-08242004.txt"
File Size:1247
Last Modified:Aug 26 21:22:08 2004
MD5 Checksum:8a93ae7bc840615e0e2cbde7b9c5b413

 ///  File Name: evil_song.py
Description:
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below. Tested under Slackware 9.1.
Author:Serkan Akpolat
Homepage:http://deicide.siyahsapka.org
Related Exploit:soxWAVFileBufferOverflowExploit.c "
File Size:1477
Related CVE(s):CAN-2004-0557
Last Modified:Aug 5 06:05:59 2004
MD5 Checksum:52a6a4fb57782c46637bac03296b797e

 ///  File Name: freedom.c
Description:
Remote CVS exploit for versions 1.11.15 and below that makes use of the Argumentx error_prog_name double free heap overflow on RedHat 8.0.
Author:Gyan Chawdhary
Related File:092004.txt
File Size:11851
Related CVE(s):CAN-2004-0396
Last Modified:Aug 12 10:22:51 2004
MD5 Checksum:45a646b9d1ea639efc598b6a5d0a9c1b

 ///  File Name: gallery-php.txt
Description:
PHP based exploit for Gallery versions 1.4.4 and below that makes use of an arbitrary file upload flaw.
Author:acidbits
File Size:7122
Last Modified:Aug 26 20:11:45 2004
MD5 Checksum:05693fb275ee8e9d64e65892054a950b

 ///  File Name: gaucho140poc.cpp.txt
Description:
Exploit that simulates POP3 server which sends a specially crafted email to a vulnerable Gaucho email client, triggering an overflow and binding a shell on port 2001. Version 1.4 build 145 is susceptible.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/
Related File:gaucho140.html
File Size:13688
Last Modified:Aug 27 00:23:57 2004
MD5 Checksum:c4c57886b7699669cec7822a1aa61409

 ///  File Name: gc2boom.zip
Description:
Proof of concept exploit that makes use of a denial of service vulnerability in Ground Control II: Operation Exodus versions 1.0.0.7 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:groundControl1007.txt
File Size:9647
Last Modified:Aug 31 02:56:29 2004
MD5 Checksum:a9f5b15d52ca8d7951bf47812a819cc8

 ///  File Name: gmailSurf.txt
Description:
Poor variable sanitization in Google's GMail system allows users to surf anonymously.
Author:Punabi MC
File Size:818
Last Modified:Aug 26 23:40:37 2004
MD5 Checksum:bd4339b67925bd9102e5324c16010ecf

 ///  File Name: goscript20.txt
Description:
GoScript version 2.0 allows for remote command execution due to a lack of input validation.
Author:Francisco Alisson
File Size:378
Last Modified:Aug 5 08:14:41 2004
MD5 Checksum:a87228fe46882d5172b9458808755f2e

 ///  File Name: gv-exploit.c
Description:
Local buffer overflow exploit for gv postscript viewer. Spawns a shell on port 7000.
Author:infamous42md
File Size:2583
Last Modified:Aug 13 17:49:16 2004
MD5 Checksum:09b7025e674c54dcce7f26f77812beba

 ///  File Name: gv-exploitv2.c
Description:
Local buffer overflow exploit that makes use of five vulnerabilities in the gv postscript viewer. Spawns a shell on port 7000.
Author:infamous42md
Related Exploit:gv-exploit.c"
File Size:3615
Last Modified:Aug 18 00:54:45 2004
MD5 Checksum:9b190c92b56581d0779a663a02e10544

 ///  File Name: hafiye.txt
Description:
Hafiye 1.0 has a terminal escape sequence injection vulnerability that can result in a denial of service and remote root compromise. Exploit included.
Author:Serkan Akpolat
Homepage:http://deicide.siyahsapka.org
File Size:4474
Last Modified:Aug 24 10:29:43 2004
MD5 Checksum:ba176c1917a8df85b3c7f22bfd54e958

 ///  File Name: hoagie_openftpd.c
Description:
Remote root exploit for Linux that makes use of a format string vulnerability in OpenFTPD versions up to 0.30.2.
Author:Andi
Homepage:http://www.void.at
Related File:VSA0402.txt
File Size:8136
Last Modified:Aug 5 06:38:48 2004
MD5 Checksum:127cca3422acd202783840765a9478b5

 ///  File Name: HOD-ms04022-task-expl.c
Description:
Microsoft Windows XP Task Scheduler (.job) universal exploit with portbind and connectback shellcode. Tested against Internet Explorer 6.0 (SP1), Explorer, and Windows XP SP0, SP1.
Author:houseofdabus
Related File:mstaskjob.txt
File Size:10591
Related CVE(s):CAN-2004-0212
Last Modified:Aug 5 06:12:48 2004
MD5 Checksum:1e8ccaa6b393fe143b5a7379b74844cb

 ///  File Name: Imailpwdump.cpp
Description:
IpSwitch IMail Server versions 8.1 and below password decryption utility. This server uses the polyalphabetic Vegenere cipher to encrypt its user passwords. This encryption scheme is relatively easy to break.
Author:Adik
File Size:10140
Last Modified:Aug 18 02:44:02 2004
MD5 Checksum:354e62a6cba4b1329c0352f7595bb2dc