Section:  .. / 0404-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 50
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0404-exploits.tgz
Description:
Packet Storm new exploits for April, 2004.
File Size:136096
Last Modified:Jan 2 22:01:29 2005
MD5 Checksum:85f526a8ef74aa7fab235cec0a12d54a

 ///  File Name: reset.zip
Description:
This program will reset a TCP connection by guessing a valid sequence number.
Author:Aphex
Homepage:http://www.iamaphex.cjb.net
Related File:246929.html
File Size:14181
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 04:45:00 2004
MD5 Checksum:f4ab099f779083bfa1ce46e3cdfdea5d

 ///  File Name: sslbomb.c
Description:
Remote denial of service exploit for IIS SSL vulnerability documented in MS04-011.
Author:David Barroso Berrueta, Alfredo Andres Omella
Homepage:http://www.s21sec.com
File Size:12128
Last Modified:Apr 15 09:45:00 2004
MD5 Checksum:655b5cdfab95f087efd0af0e1cbf2d6c

 ///  File Name: RoseAttackv2.txt
Description:
Another program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.
Author:Chuck
Related File:Rose_Frag_Attack_Explained.txt
File Size:11786
Last Modified:Apr 28 07:12:15 2004
MD5 Checksum:c71f6be9ef9b5b7e9aaaa903c83d697c

 ///  File Name: p_xfree.c
Description:
XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.
Author:pi3
Homepage:http://www.pi3.int.pl
Related File:02.11.04.txt
File Size:11670
Last Modified:Apr 20 12:17:00 2004
MD5 Checksum:02f09f93f2adb9197f86c2140e23e6ee

 ///  File Name: SCSA028.txt
Description:
Security Corporation Security Advisory [SCSA-028]: Nuked-KlaN versions b1.4 and b1.5 allows for directory traversal attacks and global variable overwriting.
Author:Germain Randaxhe aka frog-man
Homepage:http://www.phpsecure.info
File Size:10380
Last Modified:Apr 17 13:01:00 2004
MD5 Checksum:9a1ed5e3d1ff8b9aeefee4487b9fa4e5

 ///  File Name: rootme.tar
Description:
Local root exploit for the Solaris vfs_getvfssw() Loadable Kernel Module Path vulnerability found by Immunity Security.
Author:Sam
Related File:solaris_kernel_vfs.sxw.pdf
File Size:10240
Last Modified:Apr 7 10:23:00 2004
MD5 Checksum:6d96d97f7cd6f65a60955ca1eab94875

 ///  File Name: 305monit.c
Description:
Monit versions 4.2 and below remote exploit that makes use of a buffer overflow in the handling of basic authentication. Binds a shell to port 31337.
Author:Nilanjan De, Abhisek Datta
Homepage:http://www.eos-india.net/
Related File:monit.txt
File Size:9183
Last Modified:Apr 12 06:55:00 2004
MD5 Checksum:ad1d48f1fac2fb76a281eade6259171e

 ///  File Name: tikiwiki181.txt
Description:
Tiki CMS/Groupware (aka TikiWiki) versions 1.8.1 and below suffer from path disclosure, cross site scripting, SQL injection, directory traversal, and arbitrary file upload vulnerabilities.
Author:JeiAr
File Size:8998
Last Modified:Apr 11 12:16:00 2004
MD5 Checksum:e695514d042cdecc0a42e45dcab558ce

 ///  File Name: umodpoc.zip
Description:
Proof of concept exploit for the Unreal engine developed by EpicGames which has a flaw with UMOD where it handles information from files without properly filtering for dangerous characters.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:unrealEngine2.txt
File Size:8523
Last Modified:Apr 22 18:03:00 2004
MD5 Checksum:babab0ce107edf023e98cb9facc781f6

 ///  File Name: emule4x.pl
Description:
eMule versions 0.42d and below remote exploit that makes use of the buffer overflow in the DecodeBase16() function. Tested against Windows XP SP1 and Windows 2000 SP4.
Author:kcope
Related File:emule-0.42d.txt
File Size:8196
Last Modified:Apr 11 20:25:00 2004
MD5 Checksum:1ce6c958dd2930cdd1a5efdc4ab262cb

 ///  File Name: THCIISSLame.c
Description:
THCIISSLame version 0.2 IIS 5 SSL remote root exploit. Uses a connect back shell.
Author:Johnny Cyberpunk
Homepage:http://www.thc.org/
File Size:6725
Last Modified:Apr 22 18:04:00 2004
MD5 Checksum:b10bb6ba9138a6d29c48e148b7207004

 ///  File Name: wz_ex.c
Description:
Proof of concept exploit for the WinZip32 MIME Parsing Overflow. Tested against WinZip 8.1 on Windows XP SP1 and Windows 2000 SP1. Instructions for use are included.
Author:snooq
Homepage:http://www.angelfire.com/linux/snooq/
Related File:02.27.04a.txt
File Size:6499
Last Modified:Apr 15 09:23:00 2004
MD5 Checksum:5fc351268d1bcf67459c35ae1510a996

 ///  File Name: RoseAttackv1.txt
Description:
Program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.
Author:Laurent Constantin
Related File:Rose_Frag_Attack_Explained.txt
File Size:6275
Last Modified:Apr 28 07:11:14 2004
MD5 Checksum:abe79cdc4e802902cbc75e03bd7f4406

 ///  File Name: igi2fs.zip
Description:
Proof of concept exploit that makes use of a format string bug in IGI 2: Covert Strike. Affected versions are 1.3 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:igi2.txt
File Size:5998
Last Modified:Apr 5 20:24:00 2004
MD5 Checksum:1c431b4877d8f8c8a450e93962d8f0a5

 ///  File Name: emptyconn.zip
Description:
Proof of concept exploit that causes a denial of service condition in RSniff.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:rsniff.txt
File Size:5802
Last Modified:Apr 9 14:23:00 2004
MD5 Checksum:5d496cff7e0fa3a67f0e145da67e0182

 ///  File Name: Kreset.pl
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Perl version.
Author:K-sPecial
Homepage:http://xzziroz.freeshell.org
Related File:SlippingInTheWindow_v1.0.doc
File Size:5576
Related CVE(s):CAN-2004-0230
Last Modified:Apr 25 19:05:00 2004
MD5 Checksum:35eafe0e58f3157a7d65afbb26e29c04

 ///  File Name: JetRoot_pl.txt
Description:
Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.
Author:FX
Homepage:http://www.phenoelit.de
Related File:HP_Web_Jetadmin_advisory.txt
File Size:5343
Last Modified:Apr 28 05:58:40 2004
MD5 Checksum:5cd19d9db75680df1b4b9a5cd6ca9642

 ///  File Name: billybastard.c
Description:
Local exploit that makes use of the flaw in lsass.exe. Binds a shell to port 31337.
Author:Hi_Tech_Assassin
File Size:5271
Last Modified:Apr 17 14:11:00 2004
MD5 Checksum:1f9222b74b939049559dc3333d823b31

 ///  File Name: waraxe-2004-SA022.txt
Description:
PostNuke 0.726 Phoenix is susceptible to multiple path disclosure and cross site scripting vulnerabilities.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:4922
Last Modified:Apr 22 11:37:00 2004
MD5 Checksum:26c15fd38d1d3b31e7aacd5170f5c586

 ///  File Name: Exch.pl
Description:
Kinesphere Corporation Exchange POP3 e-mail gateway remote exploit that makes use of a buffer overflow.
Author:securma massine
File Size:4629
Last Modified:Apr 19 17:45:00 2004
MD5 Checksum:6ab8a0b89d6c06af47d8d320cc7ab4ae

 ///  File Name: reset-tcp_rfc31337-compliant.c
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Some modifications done by J 'Swoop' Barber.
Author:Paul A. Watson
Homepage:http://www.terrorist.net
Related File:SlippingInTheWindow_v1.0.doc
File Size:4479
Related CVE(s):CAN-2004-0230
Last Modified:Apr 24 01:57:29 2004
MD5 Checksum:b89b0241199fd7937f1cc29a3a32e3af

 ///  File Name: phpnukeVideo.txt
Description:
PHP-Nuke Video Gallery Module version 0.1 Beta 5 is susceptible to full path disclosure and SQL injection attacks.
Author:DarkBicho
Homepage:http://www.darkbicho.tk
File Size:4374
Last Modified:Apr 28 06:01:47 2004
MD5 Checksum:54acb3d8866b74c2e6d1ec256608e9d9

 ///  File Name: waraxe-2004-SA021.txt
Description:
The phprofession 2.5 module for PostNuke is susceptible to path disclose, cross site scripting, and possible SQL injection attacks.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:3955
Last Modified:Apr 22 10:16:00 2004
MD5 Checksum:60a7eb530f31c704d7281ef37d66a91a

 ///  File Name: eXtremail2.c
Description:
Linux eXtremail versions 1.5.9 and below remote root exploit that makes use of a format string vulnerability in its logging mechanism.
Author:Luca Ercoli
Homepage:http://www.seeweb.com
Related File:eXtremail.txt
File Size:3939
Last Modified:Apr 25 17:46:00 2004
MD5 Checksum:eb165abefc04759a78ee48e3da5a316d