Section:  .. / 0501-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 92
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: firewallbypass.tgz
Description:
A generic problem of common personal firewall products is the allowance of shortcuts or interfaces for controlling traffic. Manipulation of these functions can allow for firewall bypass altogether. Various proof of concepts are included for products such as Zone Alarm, Kerio, Agnitium Outpost firewall, Kaspersky Anti-Hacker, Symantec's Norton Personal Firewall, and more.
Author:Ferruh Mavituna
Homepage:http://ferruh.mavituna.com/
File Size:5415
Last Modified:Jan 5 04:59:33 2005
MD5 Checksum:683f4f847425dcd4616eab03d0c8f4ee

 ///  File Name: waraxe-2005-SA039.txt
Description:
SGallery version 1.01 suffers from path disclosure, file inclusion, and SQL injection bugs.
Author:Janek Vind
Homepage:http://www.waraxe.us/advisory-39.html
File Size:5338
Last Modified:Jan 16 00:25:34 2005
MD5 Checksum:feecc216969ec510ec6b27d4066ce481

 ///  File Name: stackgrow.c
Description:
expand_stack SMP race proof of concept exploit that makes use of a locally exploitable flaw in the Linux page fault handler code.
Author:Christophe Devine
Related File:isec-0022-pagefault.txt
File Size:4853
Related CVE(s):CAN-2005-0001
Last Modified:Jan 15 23:49:05 2005
MD5 Checksum:1a0272676e96d9794dcc23e6e345f3de

 ///  File Name: codebug7.txt
Description:
Codebug Labs Advisory 07 - MercuryBoard version 1.1.1 suffers from full path disclosure, cross site scripting, and SQL injection vulnerabilities.
Homepage:http://www.codebug.org/
File Size:4768
Last Modified:Jan 25 08:59:31 2005
MD5 Checksum:4cd7f78f29b25991daec36c2ccd910d3

 ///  File Name: SSA-20050113-25.txt
Description:
STG Security Advisory: An input validation flaw in ZeroBoard can allow malicious attackers the ability to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:4657
Last Modified:Jan 16 05:50:00 2005
MD5 Checksum:60037566ae608048fb38bbba03815d95

 ///  File Name: iis_w3who_overflow.pm
Description:
Remote buffer overflow exploit for the w3who.dll in Microsoft Windows 2000. Drops to a command shell.
Author:H.D. Moore
Homepage:http://www.metasploit.com/
Related File:esa-2004-1206.txt
File Size:4564
Related CVE(s):CAN-2004-1134
Last Modified:Jan 12 08:19:09 2005
MD5 Checksum:b5ac5a1122b0563bf7f3907983af3280

 ///  File Name: MinisTraverse.txt
Description:
Minis 0.2.1 suffers from a directory traversal flaw that allows for viewing of files outside of the webroot. If the server does not have access to the file, it enters into a loop causing a denial of service.
Author:Madelman
File Size:3879
Last Modified:Jan 16 20:13:00 2005
MD5 Checksum:d3aedc1d21e4c6f53b73e22762727c7d

 ///  File Name: peer2mail.c
Description:
Peer2Mail Encrypt passdumper exploit version 1.0. Versions 1.4 and below are affected. Tested on Win XP SP2.
Author:ATmaCA
Homepage:http://www.atmacasoft.com/
File Size:3681
Last Modified:Jan 19 07:01:44 2005
MD5 Checksum:e6376162f2a711928b65864775d81550

 ///  File Name: xfkey.c
Description:
fkey version 0.0.2 local file accessibility exploit.
Author:vade79
Homepage:http://fakehalo.us/
File Size:3636
Last Modified:Jan 25 06:21:05 2005
MD5 Checksum:2afe0de2da98e6a863a419723fd42326

 ///  File Name: itunesPLS-local.txt
Description:
Proof of concept exploit for iTunes 4.3.7 on OS X 10.3.7. Shellcode binds a shell to port 4444.
Author:nemo
Related File:01.13.05.txt
File Size:3611
Last Modified:Jan 17 00:05:22 2005
MD5 Checksum:2ec510bd1e7504720e2969ebeccde787

 ///  File Name: ad20041011.txt
Description:
3Com's 3CDaemon 2.0 revision 10 is susceptible to multiple vulnerabilities ranging from various format string and denial of service flaws.
Author:Sowhat
Homepage:http://secway.org/
File Size:3536
Last Modified:Jan 5 05:42:45 2005
MD5 Checksum:70f67f8c67fad4e6be72a2ea54c68c6f

 ///  File Name: auth_radius.c
Description:
Apache mod_auth_radius denial of service exploit that makes use of an integer overflow. All versions up to 1.5.4/1.5.7 are affected.
Author:Leon Juranic
Homepage:http://security.lss.hr
Related File:LSS-2005-01-02.txt
File Size:3430
Last Modified:Jan 18 06:32:19 2005
MD5 Checksum:bc6de626e823ef2cea445857d58fa6fc

 ///  File Name: kazaaDoS.txt
Description:
Flaws in Kazaa allow for arbitrary code execution and for remote execution of code.
Author:Rafel Ivgi
Homepage:http://theinsider.deep-ice.com
File Size:3280
Last Modified:Jan 18 07:32:34 2005
MD5 Checksum:d4de1222dbe0a8a0779c4454dcdffaa0

 ///  File Name: ieBarBypass.txt
Description:
Microsoft Internet Explorer 6 is susceptible to a flaw that allows for malicious file download via manipulation of the File Download Information bar functionality.
Author:Rafel Ivgi
Homepage:http://theinsider.deep-ice.com
File Size:3258
Last Modified:Jan 16 06:03:56 2005
MD5 Checksum:c11f180df66f4b95df52ac55789a90f1

 ///  File Name: ReviewPost.txt
Description:
GulfTech Security Research - ReviewPost PHP Pro versions below 2.84 suffer from cross site scripting and SQL injection attacks. Sample exploitation given.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3097
Last Modified:Jan 5 05:06:29 2005
MD5 Checksum:cc9424064ae6b740688d1fdf641acd1d

 ///  File Name: PhotoPost.txt
Description:
GulfTech Security Research - PhotoPost PHP versions 4.8.6 and below suffer from cross site scripting and SQL injection flaws. Sample exploitation given.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3096
Last Modified:Jan 5 05:08:39 2005
MD5 Checksum:a8252c4a7a9a930d42220a299a3a2a0f

 ///  File Name: fm-nacho.c
Description:
Mac OSX versions 10.3.x with a Darwin Kernel equal to or below 7.7.0 are susceptible to a denial of service flaw that may allow for possible privilege escalation.
Author:nemo
File Size:3090
Last Modified:Jan 22 20:50:59 2005
MD5 Checksum:c75586bd9e285adb8bba510e652200ac

 ///  File Name: SSA-20050120-24.txt
Description:
STG Security Advisory: GForge versions 3.3 and below are susceptible to directory traversal attacks.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:3073
Last Modified:Jan 25 06:18:06 2005
MD5 Checksum:fd452561768d50aeceeb2481b57d86e1

 ///  File Name: r57ita.pl.txt
Description:
ITA Forum 1.49 SQL injection exploit with one character bruteforce.
Author:1dt.w0lf
Homepage:http://www.rst.void.ru
File Size:3059
Last Modified:Jan 16 06:47:08 2005
MD5 Checksum:3ab14d20f51df4e0eadc1c0611e59d23

 ///  File Name: adv010-y3dips-2005.txt
Description:
Exponent CMS version 0.95 is susceptible to full path disclosure and cross site scripting vulnerabilities.
Author:y3dips
Homepage:http://y3dips.echo.or.id/
File Size:3001
Last Modified:Jan 26 18:15:44 2005
MD5 Checksum:724c9736a6bc618a34641f4f77dcfcb6

 ///  File Name: vanisher.tgz
Description:
Proof of concept exploit for the Windows ANI File Parsing vulnerability along with a complete detailed paper describing the process of creating it.
Author:Assaf Reshef
Homepage:http://underwar.livedns.co.il/projects/ani/
Related Exploit:InternetExploiter3.2.zip"
File Size:2950
Last Modified:Jan 16 00:30:29 2005
MD5 Checksum:2d66477114e19c1583d4f4b6fa68194d

 ///  File Name: top_ex.pl
Description:
Proof of concept exploit for an old format string vulnerability in setuid versions of top. This vulnerability has popped back up in the Solaris 10 Companion CD.
Author:Kevin Finisterre
Related File:DMA-2005-0103a.txt
File Size:2931
Last Modified:Jan 5 05:22:21 2005
MD5 Checksum:30e63e8e67f59c652ec55c5f2f5cfc66

 ///  File Name: PSA05-010.txt
Description:
Portcullis Security Advisory - The Emotion MediaPartner Web Server version 5.0 suffers from a classic directory traversal attack.
Author:Paul J Docherty
File Size:2758
Last Modified:Jan 12 06:15:11 2005
MD5 Checksum:59e110b694a46434de374cc8fd97ea9b

 ///  File Name: WebAdmin302.txt
Description:
Alt-N WebAdmin, the web application used to administer MDaemon and RelayFax, is susceptible to cross site scripting, html injection, and unauthenticated account modification vulnerabilities. Versions 3.0.2 and below are susceptible.
Author:David Alonso Perez
File Size:2634
Last Modified:Jan 29 09:37:08 2005
MD5 Checksum:b3c073f533c811a3079686b8142631ff

 ///  File Name: InternetExploiter3.2.zip
Description:
InternetExploiter 3, .ANI-file Animation header length stack based buffer overflow exploit for Internet Explorer. Uses Cascading Style Sheets to load a malicious animated cursor. Runs a bindshell on port 28876.
Author:Berend-Jan Wever
Homepage:http://www.edup.tudelft.nl/~bjwever/
Related File:AD_LAB-04005.txt
File Size:2565
Last Modified:Jan 15 23:53:42 2005
MD5 Checksum:466f587227c9ddbf8f3e34710b089c84