Section:  .. / 0411-exploits  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 77
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: phpnolimit.c
Description:
Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.
Author:Gyan Chawdhary
Related File:php_memory_limit_remote.txt
File Size:8196
Related CVE(s):CAN-2004-0594
Last Modified:Dec 11 22:49:10 2004
MD5 Checksum:7aadceaf9298a2f92f0e123e7baaf4af

 ///  File Name: phpwebsite.txt
Description:
phpWebSite 0.9.3-4 is susceptible to an HTTP response splitting vulnerability.
Author:Maestro
File Size:2005
Last Modified:Nov 13 00:47:34 2004
MD5 Checksum:f84a1df64f88dc3f3e8f541a2fca2859

 ///  File Name: pntresmailer.txt
Description:
PnTresMailer code browser version 6.03 is susceptible to path disclosure and directory traversal attacks.
Author:John C.
File Size:1011
Last Modified:Dec 11 23:13:05 2004
MD5 Checksum:62590d39a08e1474f473776fb3efc8d7

 ///  File Name: pop_exp2.py
Description:
YPOPS version 0.6 exploit that binds a shell to port 4444.
Author:varun uppal
File Size:3790
Last Modified:Nov 12 04:52:28 2004
MD5 Checksum:2a84533c53d3d8b230e5c6e7730d7610

 ///  File Name: proz_ex.c
Description:
Prozilla-1.3.6 remote client side stack overflow exploit, tested against current Gentoo, slackware, Debian, and suse.
Author:Serkan Akpolat
Homepage:http://deicide.siyahsapka.org
File Size:10859
Last Modified:Nov 24 05:23:06 2004
MD5 Checksum:9a0268a366aa17a0540e97e9a3beee8c

 ///  File Name: qwik_fmtstr_xpl.c
Description:
qwik_smtpd remote root format string exploit.
Author:Carlos Barros
Homepage:http://www.barrossecurity.com
File Size:10227
Last Modified:Nov 10 07:47:34 2004
MD5 Checksum:7f49b64e48f0b748c872b5bfcf26825d

 ///  File Name: slmail5x.txt
Description:
SLMail 5.x POP3 remote PASS buffer overflow exploit that binds a shell to port 4444. Tested on Windows 2000 SP4.
Author:muts
Homepage:http://www.whitehat.co.il
File Size:4234
Related CVE(s):CAN-2004-0942
Last Modified:Nov 20 23:24:03 2004
MD5 Checksum:2f39531126d87191b5ceaf073ca81878

 ///  File Name: sof2boom.zip
Description:
Remote proof of concept exploit for Soldier of Fortune II versions 1.0.3 gold and below that suffer from a typical sprintf() overflow.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:sof2boom.txt
File Size:10157
Last Modified:Dec 11 19:55:47 2004
MD5 Checksum:cc8c46b475c92d775136290efc2c773e

 ///  File Name: SSA-20041122-10.txt
Description:
STG Security Advisory: KorWeblog suffers from a directory traversal vulnerability that malicious attackers can get file lists of arbitrary directories.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:2642
Last Modified:Dec 11 20:05:22 2004
MD5 Checksum:bf3673a09ff52d676ea067fb60869653

 ///  File Name: SSA-20041122-11.txt
Description:
STG Security Advisory: Due to an input validation flaw, JSPWiki is vulnerable to cross site scripting attacks.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:1396
Last Modified:Dec 11 20:06:28 2004
MD5 Checksum:cea8374c7e4fd06bbe51b34084d7006e

 ///  File Name: SSA-20041122-12.txt
Description:
STG Security Advisory: Due to an input validation flaw, Zwiki is vulnerable to cross site scripting attacks.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:1416
Last Modified:Dec 11 20:07:18 2004
MD5 Checksum:ee307c282c2b83d763b5b423918746e0

 ///  File Name: ssfakep.zip
Description:
Remote denial of service exploit for games using the Serious engine. Generates UDP packets that have fake players enter a room. The system fails to limit the amount of users that can enter.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:ssfakep.txt
File Size:9644
Last Modified:Dec 11 23:40:25 2004
MD5 Checksum:0ad8fba41b88800236ee2330ecee1271

 ///  File Name: swbfp.zip
Description:
Remote test exploit for Star Wars Battlefront versions 1.11 and below that checks for buffer overflow and memory access flaws.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:swbfp.txt
File Size:20635
Last Modified:Dec 11 20:52:13 2004
MD5 Checksum:87011dbb3c49943fe2adbe77eb7ab5b5

 ///  File Name: technote-commandexec.txt
Description:
Technote web board products are susceptible to a remote command execution vulnerable that has been around since 2000.
File Size:820
Last Modified:Nov 5 05:34:39 2004
MD5 Checksum:d650e7cdaac5835672b963aa4cf9886d

 ///  File Name: technote.pl
Description:
Technote remote command execution that spawns bash style shell with the webserver uid.
Author:SPABAM
File Size:3877
Last Modified:Nov 13 00:24:27 2004
MD5 Checksum:48c69b4c9a92c741a4d33374e40e9da7

 ///  File Name: tweaky.pl
Description:
TWiki Release 01-Feb-2003 and below remote code execution exploit in perl.
Author:Roman Medina-Heigl Hernandez aka RoMaNSoFt
Homepage:http://www.rs-labs.com
File Size:6620
Related CVE(s):CAN-2004-1037
Last Modified:Nov 20 21:52:55 2004
MD5 Checksum:b739c6999441255807941107c5a1e500

 ///  File Name: vbul30x.txt
Description:
Another SQL injection has been discovered in VBulletin Forums 3.0.x.
Author:Dr. Death
File Size:398
Last Modified:Nov 12 21:37:04 2004
MD5 Checksum:0a368925cf1755b7c915b05b9e353208

 ///  File Name: waraxe-2004-SA037.txt
Description:
A SQL injection bug exists in Phorum versions 5.0.12 and below. Exploitation example given.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:5257
Last Modified:Nov 13 00:22:44 2004
MD5 Checksum:126da5f1fe68ed3742dd59eb079def15

 ///  File Name: waraxe-2004-SA038.txt
Description:
The Event Calendar module for PHP-Nuke suffers from cross site scripting, path disclosure, SQL injection, and script insertion attacks.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:5700
Last Modified:Nov 20 22:38:21 2004
MD5 Checksum:39075f33edc60c02047b4706096f6897

 ///  File Name: wchannelPriv.txt
Description:
Local user input handling vulnerabilities exist in WCI's TC-IDE Embedded Linux that allow local users with access to the tools provided with the system to spawn a root console, gaining full control over the running Linux operating system.
Author:Yuri Gushin, Alex Behar, Valentin Slalov
File Size:2091
Last Modified:Dec 11 19:04:53 2004
MD5 Checksum:35ed88030fee586dc75fd7aed730ad46

 ///  File Name: webcalendar.txt
Description:
The PHP application WebCalendar is susceptible to cross site scripting, http response splitting, code execution, path disclosure, and privilege escalation vulnerabilities.
Author:Joxean Koret
File Size:6010
Last Modified:Nov 12 04:39:06 2004
MD5 Checksum:f852aff719048217be25181fe7b04d22

 ///  File Name: winampm3u.c
Description:
Exploit for the Winamp vulnerability existing in versions 5.06 and below making use of the IN_CDDA.dll remote buffer overflow.
Related File:winamp505.txt
File Size:3318
Last Modified:Dec 11 20:20:03 2004
MD5 Checksum:b39f45ee690142f7e8e9e75f7fd5da0f

 ///  File Name: wodftpcrash.txt
Description:
WodFtpDLX versions below 2.3.2.97 are susceptible to a classic buffer overflow attack. Denial of service exploit included.
Author:Komrade
Homepage:http://unsecure.altervista.org
File Size:8904
Last Modified:Dec 11 19:19:35 2004
MD5 Checksum:7f450c6c70ab44fd46130137dfaffb1f

 ///  File Name: zipbrk.zip
Description:
This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.
Author:oc.192
File Size:10847
Related CVE(s):CAN-2004-0932, CAN-2004-0937
Last Modified:Nov 20 20:01:01 2004
MD5 Checksum:42e2e861784ebb52460984f688aed1ad

 ///  File Name: ZipMe!.cpp
Description:
Microsoft Windows Vulnerability in Compressed (zipped) Folders (MS04-034) proof of concept exploit. Tested on Windows XP SP0 Spanish and English. More information available here.
Author:Takaro
Homepage:http://Haxorcitos.com
File Size:9697
Last Modified:Nov 19 09:07:04 2004
MD5 Checksum:b46769dec05e15ac32380061ff02f09a