Section:  .. / 0408-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 55 of 55
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: wpquiz.txt
Description:
wpquiz versions 2.60b8 and below have some administrative scripts unprotected and accessible by the world on a default install. Due to this, anyone can easily obtain administrative rights.
Author:Jonathan Tough
File Size:1824
Last Modified:Aug 5 06:23:46 2004
MD5 Checksum:89d9db3e0cd88869b0448a2620d556c3

 ///  File Name: HOD-ms04022-task-expl.c
Description:
Microsoft Windows XP Task Scheduler (.job) universal exploit with portbind and connectback shellcode. Tested against Internet Explorer 6.0 (SP1), Explorer, and Windows XP SP0, SP1.
Author:houseofdabus
Related File:mstaskjob.txt
File Size:10591
Related CVE(s):CAN-2004-0212
Last Modified:Aug 5 06:12:48 2004
MD5 Checksum:1e8ccaa6b393fe143b5a7379b74844cb

 ///  File Name: evil_song.py
Description:
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below. Tested under Slackware 9.1.
Author:Serkan Akpolat
Homepage:http://deicide.siyahsapka.org
Related Exploit:soxWAVFileBufferOverflowExploit.c "
File Size:1477
Related CVE(s):CAN-2004-0557
Last Modified:Aug 5 06:05:59 2004
MD5 Checksum:52a6a4fb57782c46637bac03296b797e

 ///  File Name: soxWAVFileBufferOverflowExploit.c
Description:
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.
Author:rave, Angelo Rosiello
Homepage:http://www.rosiello.org/
File Size:7362
Related CVE(s):CAN-2004-0557
Last Modified:Aug 4 09:42:17 2004
MD5 Checksum:21705b0d1b4c588532f4cde4b2dd90b4

 ///  File Name: drop-root.c
Description:
Previously unreleased exploit that makes use of an old flaw in Dropbear SSH versions 0.34 and below. Binds a shell to port 10275.
Author:live
File Size:9963
Last Modified:Aug 4 09:30:07 2004
MD5 Checksum:b48a0a2f65aba10778714a65df8d75d5