Section:  .. / 0404-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 50
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: tcp_reset.c
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
Author:eazy
Related File:SlippingInTheWindow_v1.0.doc
File Size:3737
Related CVE(s):CAN-2004-0230
Last Modified:Apr 28 08:03:00 2004
MD5 Checksum:2edd0e1dafca116fdae393cd4f64c383

 ///  File Name: priv8lcd44.pl
Description:
Remote exploit that makes use of overflows in versions 0.4.4 and below of LCDproc's daemon.
Author:Adriano Lima
Homepage:http://www.priv8security.com
Related File:lcdproc.adv2
File Size:3717
Last Modified:Apr 9 06:55:00 2004
MD5 Checksum:7196f50ff2b0c806cf549add4c7278db

 ///  File Name: disconn.py
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Python version.
Author:Michael Gschwandtner
Homepage:http://anyplay.tznetz.com/exploits/disconn_py.html
Related File:SlippingInTheWindow_v1.0.doc
File Size:3491
Related CVE(s):CAN-2004-0230
Last Modified:Apr 28 05:49:14 2004
MD5 Checksum:46637e58111353af9ab2dffa5ac6e5a3

 ///  File Name: waraxe-2004-SA015.txt
Description:
NukeCalendar version 1.1.a, the PHP-Nuke Calendar Module, suffers from SQL injection, cross site scripting, and full path disclosure flaws.
Author:Janek Vind
Homepage:http://www.waraxe.us/index.php?modname=sa&id=15
File Size:3473
Last Modified:Apr 8 16:04:00 2004
MD5 Checksum:347eabc0fa516ae07eb0e9868b897d7c

 ///  File Name: kphone.stun.txt
Description:
KPhone versions 4.0.1 and below are vulnerable to a denial of service attack when receiving a malformed STUN response packet.
Author:Storm
File Size:3430
Last Modified:Apr 19 15:24:00 2004
MD5 Checksum:dad1d1036001f137bef211a08445b7ac

 ///  File Name: reset-tcp.c
Description:
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
Author:Paul A. Watson
Homepage:http://www.terrorist.net
Related File:SlippingInTheWindow_v1.0.doc
File Size:3373
Related CVE(s):CAN-2004-0230
Last Modified:Apr 24 01:56:17 2004
MD5 Checksum:109c83b293fa1cd19507c8d844936b19

 ///  File Name: gvexpl.tgz
Description:
Remote root proof of concept exploit for gv versions 3.5.8 and below. Binds a shell to port 65535. Makes use of an old vulnerability that does not have an exploit circulating for it.
Author:priestmaster
Homepage:http://www.priestmaster.org
Related File:gv-exploit.pdf
File Size:3090
Last Modified:Apr 18 12:33:00 2004
MD5 Checksum:41cdb7aa6c873e01ffd225c7bb8c3355

 ///  File Name: MSIE.printer.txt
Description:
Microsoft Internet Explorer 6.0 allows malicious Javascript to send documents to the printer without notifying the end user.
Author:Ben Garvey
Homepage:http://www.bengarvey.com
File Size:3042
Last Modified:Apr 13 00:45:00 2004
MD5 Checksum:4c4e790d243752c616023e9903017ffb

 ///  File Name: Abrior.txt
Description:
A lack of proper input validation on Abrior's Encore WebForum allows for remote command execution via Display.cgi.
Author:Schizoprenic, k159
Homepage:http://g-security.tk
File Size:3003
Last Modified:Apr 3 13:47:00 2004
MD5 Checksum:b729c60b75ed3166fd73e47cdd65d70e

 ///  File Name: Phorum347SQL.pl
Description:
Remote exploit that makes use of a SQL injection vulnerability in Phorum version 3.4.7.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
Related File:waraxe-2004-SA019.txt
File Size:2900
Last Modified:Apr 18 11:34:00 2004
MD5 Checksum:4ec2f69be6677d3a55d044b479749d1c

 ///  File Name: eudora61.pl
Description:
Eudora 6.1 still has attachment spoofing flaws along with a Nested MIME DoS vulnerability.
Author:Paul Szabo
File Size:2834
Last Modified:Apr 20 07:57:00 2004
MD5 Checksum:aee6853e3fb6b331288d903a8813c2da

 ///  File Name: ADA.image.txt
Description:
ADA Image Server (ImgSvr) 0.4 suffers from a buffer overflow via GET requests, directory traversal vulnerabilities, and a denial of service flaw.
Author:Dr. Insane
Homepage:Http://members.lycos.co.uk/r34ct/
File Size:2642
Last Modified:Apr 14 16:10:00 2004
MD5 Checksum:c9af293363595a0fcc1e638e861dfdfd

 ///  File Name: XMicro.backdoor2.txt
Description:
X-Micro WLAN 11b Broadband Routers versions 1.2.2, 1.2.2.3, 1.2.2.4, 1.6.0.0, and 1.6.0.1 all have a backdoor account of super with a password of super. 1.6.0.1 also has an account 1502 with a password of 1502 hardcoded.
Author:Gergely Risko
File Size:2454
Last Modified:Apr 16 12:31:00 2004
MD5 Checksum:2522c3d224054bfc979da26ee025c82d

 ///  File Name: XMicro.backdoor.txt
Description:
X-Micro WLAN 11b Broadband Routers versions 1.2.2 and 1.2.2.3 have a backdoor account of super with a password of super.
Author:Gergely Risko
File Size:1896
Last Modified:Apr 10 17:57:00 2004
MD5 Checksum:fb2348377074ae051bdf7d478b99ddd4

 ///  File Name: phpBBmod.txt
Description:
phpBB modified by PRzemo version 1.8 allows for arbitrary code execution due to improper filtering allowing for remote script inclusion.
Author:Officerrr
File Size:1871
Last Modified:Apr 19 16:30:00 2004
MD5 Checksum:56451f2f2af87fa042870c5de4688379

 ///  File Name: imgSvr.txt
Description:
Under its default, imgSvr version 0.4 allows some security checks to be bypassed allowing an attacker to see the contents of a web directory and see or download the files of a web directory.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1774
Last Modified:Apr 1 11:39:00 2004
MD5 Checksum:84b29a02de69b2b54da296623e927287

 ///  File Name: eaea.class.php.txt
Description:
Mambo OS versions 4.5 and 4.6 exploit written in PHP that insets an administrator user into the database.
Author:Yo_Soy
Homepage:http://www.raza-mexicana.org
Related File:mambo.txt
File Size:1647
Last Modified:Apr 22 05:06:00 2004
MD5 Checksum:4ecba7a08a0a8efe0a8826d3deec68e8

 ///  File Name: not_so_smartether.txt
Description:
Samsung SmartEther switches allow a remote attacker to login as admin without having a correct password. All that is required is that all of the characters that can fit in the buffer for the password be filled.
Author:Kyle Duren
File Size:1633
Last Modified:Apr 26 01:07:00 2004
MD5 Checksum:3960756959bce9934971104a4c4533b7

 ///  File Name: cobain-monit.pl
Description:
Monit versions 4.1 and below remote denial of service exploit. Tested on Mandrake 9.1.
Author:gsicht
Related File:monit.txt
File Size:1528
Last Modified:Apr 9 11:11:00 2004
MD5 Checksum:f0cc271a17471fcd8555602dc84764d5

 ///  File Name: gemitelv3.txt
Description:
Gemitel versions 3.5 and below allow for malicious file inclusion in its affich.php script. This vulnerability allows an attacker to forcibly execute arbitrary scripts from remote resources on the server.
Author:jaguar
Homepage:http://www.wulab.com
File Size:1492
Last Modified:Apr 17 14:52:00 2004
MD5 Checksum:0dfcf9d72eb05a0ab1ce7f892fe712ff

 ///  File Name: bgp-dosv2.pl
Description:
BGP proof of concept denial of service utility that sends out a RST flood to BGP connection providing the attacker has already gained knowledge of the source port and sequence number.
Author:Rich Compton
Related File:SlippingInTheWindow_v1.0.doc
File Size:1446
Related CVE(s):CAN-2004-0230
Last Modified:Apr 24 02:05:02 2004
MD5 Checksum:52fe0ea2108771280df6c0b70527aa60

 ///  File Name: SurgeLDAP10.txt
Description:
SurgeLDAP 1.0g suffers from a directory traversal vulnerability in the user.cgi script due to a lack of input validation.
Author:Dr. Insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:1414
Last Modified:Apr 14 16:23:00 2004
MD5 Checksum:114af6df8ed3c31a1fb8814675003e77

 ///  File Name: cdpexpl.tgz
Description:
Proof of concept demonstration exploit for cdp versions 0.4 and below.
Author:priestmaster
Homepage:http://www.priestmaster.org
File Size:1164
Last Modified:Apr 14 17:52:00 2004
MD5 Checksum:b7e4101c43e6efa314dee08047dee947

 ///  File Name: 0x3142-sq-chpasswd.c
Description:
Local root exploit for Squirrelmail's chpasswd utility. Tested on Suse 9. Original bug found by Matias Neiff.
Author:x314
Related File:chpasswd.txt
File Size:1154
Last Modified:Apr 20 12:36:00 2004
MD5 Checksum:19cd768af23b86e42a4d1f020bd43aeb

 ///  File Name: SPK-chpasswd.tgz
Description:
Local root exploit for Squirrelmail's chpasswd utility. Original bug found by Matias Neiff.
Author:SpikE
Related File:chpasswd.txt
File Size:1069
Last Modified:Apr 18 11:14:00 2004
MD5 Checksum:89576d98080ddfe977136d731fbd137d