Section:  .. / 0408-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 55
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0408-exploits.tgz
Description:
Packet Storm new exploits for August, 2004.
File Size:134354
Last Modified:Sep 1 00:15:55 2004
MD5 Checksum:e3ace716b8302d22fb2b673989fa063a

 ///  File Name: Xines_Mine.c
Description:
Xine v0.99.2 remote stack overflow exploit. A overflow in all versions of xine-lib allow the vcd:// input source to execute arbitrary code, even if the file is .mp3, .mpeg, .mpg or .avi media. Fix available (currently only in the cvs xine-lib) here.
Author:c0ntex
Homepage:http://www.open-security.org
File Size:14809
Last Modified:Aug 10 01:54:35 2004
MD5 Checksum:668f275c96645dcec143700e91ca40dd

 ///  File Name: gaucho140poc.cpp.txt
Description:
Exploit that simulates POP3 server which sends a specially crafted email to a vulnerable Gaucho email client, triggering an overflow and binding a shell on port 2001. Version 1.4 build 145 is susceptible.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/
Related File:gaucho140.html
File Size:13688
Last Modified:Aug 27 00:23:57 2004
MD5 Checksum:c4c57886b7699669cec7822a1aa61409

 ///  File Name: freedom.c
Description:
Remote CVS exploit for versions 1.11.15 and below that makes use of the Argumentx error_prog_name double free heap overflow on RedHat 8.0.
Author:Gyan Chawdhary
Related File:092004.txt
File Size:11851
Related CVE(s):CAN-2004-0396
Last Modified:Aug 12 10:22:51 2004
MD5 Checksum:45a646b9d1ea639efc598b6a5d0a9c1b

 ///  File Name: painkex.zip
Description:
Test exploit for Painkiller versions 1.3.1 and below that makes use of a memory corruption flaw.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:painkiller131.txt
File Size:11053
Last Modified:Aug 26 21:25:27 2004
MD5 Checksum:ae28b5004823fe6e14ce53b57a383cf1

 ///  File Name: HOD-ms04022-task-expl.c
Description:
Microsoft Windows XP Task Scheduler (.job) universal exploit with portbind and connectback shellcode. Tested against Internet Explorer 6.0 (SP1), Explorer, and Windows XP SP0, SP1.
Author:houseofdabus
Related File:mstaskjob.txt
File Size:10591
Related CVE(s):CAN-2004-0212
Last Modified:Aug 5 06:12:48 2004
MD5 Checksum:1e8ccaa6b393fe143b5a7379b74844cb

 ///  File Name: isec-0016-procleaks.txt
Description:
A critical security vulnerability has been found in the Linux kernel code handling 64bit file offset pointers. Successful exploitation allows local users to have access to kernel memory. Kernel series affected are 2.4.26 and below and 2.6.7 and below. Full exploit provided.
Author:Paul Starzetz
Homepage:http://isec.pl/vulnerabilities/isec-0016-procleaks.txt
File Size:10200
Related CVE(s):CAN-2004-0415
Last Modified:Aug 5 08:20:29 2004
MD5 Checksum:84d0043e4136ab7bb3a0512bab553ed4

 ///  File Name: Imailpwdump.cpp
Description:
IpSwitch IMail Server versions 8.1 and below password decryption utility. This server uses the polyalphabetic Vegenere cipher to encrypt its user passwords. This encryption scheme is relatively easy to break.
Author:Adik
File Size:10140
Last Modified:Aug 18 02:44:02 2004
MD5 Checksum:354e62a6cba4b1329c0352f7595bb2dc

 ///  File Name: drop-root.c
Description:
Previously unreleased exploit that makes use of an old flaw in Dropbear SSH versions 0.34 and below. Binds a shell to port 10275.
Author:live
File Size:9963
Last Modified:Aug 4 09:30:07 2004
MD5 Checksum:b48a0a2f65aba10778714a65df8d75d5

 ///  File Name: gc2boom.zip
Description:
Proof of concept exploit that makes use of a denial of service vulnerability in Ground Control II: Operation Exodus versions 1.0.0.7 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:groundControl1007.txt
File Size:9647
Last Modified:Aug 31 02:56:29 2004
MD5 Checksum:a9f5b15d52ca8d7951bf47812a819cc8

 ///  File Name: pavukWebSpider.c
Description:
Exploit that makes use of the buffer overflow in the Digest authentication code of Pavuk 0.x.
Author:infamous42md
Related File:GLSA200407-19.txt
File Size:9323
Last Modified:Aug 7 22:38:03 2004
MD5 Checksum:d4cd6b4735eacd63019952f6e7d99828

 ///  File Name: servu3x.c
Description:
Serv-u local exploit that achieves SYSTEM privileges using an old known buffer overflow. Tested against version 5.1.0.0. Lower versions are also susceptible.
Author:at4r
File Size:8170
Last Modified:Aug 10 05:04:58 2004
MD5 Checksum:d85139f7a45caf74cc51eef3538fec88

 ///  File Name: hoagie_openftpd.c
Description:
Remote root exploit for Linux that makes use of a format string vulnerability in OpenFTPD versions up to 0.30.2.
Author:Andi
Homepage:http://www.void.at
Related File:VSA0402.txt
File Size:8136
Last Modified:Aug 5 06:38:48 2004
MD5 Checksum:127cca3422acd202783840765a9478b5

 ///  File Name: upnpboom.c
Description:
UPNP mass infector exploit.
Author:Anonymous
File Size:8078
Last Modified:Aug 9 23:45:41 2004
MD5 Checksum:89913b84303ba309853fdf491d28198c

 ///  File Name: openf.c
Description:
Remote root exploit for Linux that makes use of a format string vulnerability in OpenFTPD versions up to 0.30.2.
Author:infamous42md
Related File:VSA0402.txt
File Size:7625
Last Modified:Aug 5 06:56:03 2004
MD5 Checksum:a5f332a7351b6bd7276204346dd6af78

 ///  File Name: soxWAVFileBufferOverflowExploit.c
Description:
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.
Author:rave, Angelo Rosiello
Homepage:http://www.rosiello.org/
File Size:7362
Related CVE(s):CAN-2004-0557
Last Modified:Aug 4 09:42:17 2004
MD5 Checksum:21705b0d1b4c588532f4cde4b2dd90b4

 ///  File Name: gallery-php.txt
Description:
PHP based exploit for Gallery versions 1.4.4 and below that makes use of an arbitrary file upload flaw.
Author:acidbits
File Size:7122
Last Modified:Aug 26 20:11:45 2004
MD5 Checksum:05693fb275ee8e9d64e65892054a950b

 ///  File Name: bjd361exp.cpp
Description:
Proof of concept bindshell exploit code that makes use of a buffer overflow vulnerability found in BlackJumboDog FTP servers versions 3.6.1 and below.
Author:Chew Keong TAN
Homepage:http://www.security.org.sg/vuln/bjd361.html
File Size:7006
Last Modified:Aug 5 07:00:07 2004
MD5 Checksum:7aa6c564a8f8a4179a1251bd81efbfc7

 ///  File Name: c030224-001.txt
Description:
Corsaire Security Advisory - The ServerMask 2.0 product from Port80 fails to full obfuscate header fields as promoted in their functionality. Detailed exploitation given.
Homepage:http://www.corsaire.com/
File Size:6825
Related CVE(s):CAN-2003-0105
Last Modified:Aug 11 01:58:06 2004
MD5 Checksum:a35d9f1b242af70cec5e77bd6fea10f1

 ///  File Name: merak527.txt
Description:
Merak Webmail server version 5.2.7 has cross site scripting, full path disclosure, exposure of PHP files, and SQL injection vulnerabilities.
Homepage:http://www.criolabs.net
File Size:6690
Last Modified:Aug 19 08:49:48 2004
MD5 Checksum:d99db9f9afb9b41de3696570604d53af

 ///  File Name: priv8afp.pl
Description:
Remote root exploit for Mac OS X versions 10.3.3, 10.3.2, and 10.2.8 that makes use of the stack buffer overflow in the Apple Filing Protocol (AFP).
Author:wsxz
Homepage:http://priv8security.com/
Related File:a050304-1.txt
File Size:5635
Related CVE(s):CAN-2004-0430
Last Modified:Aug 13 09:07:53 2004
MD5 Checksum:bbbe1166882492c6bc1c08114608607a

 ///  File Name: qt_bmpslap.c
Description:
Heap overflow exploit for the qt BMP parsing bug foundd in versions 3.3.2.
Author:infamous42md
Related File:CESA-2004-004.txt
File Size:5509
Last Modified:Aug 24 09:08:09 2004
MD5 Checksum:5e8e6c1e1eec51f034ae2b8459d28bb4

 ///  File Name: axisFlaws.txt
Description:
Axis versions 2100, 2110, 2120, 2420, and 2130 Network Camera along with the 2400 and 2401 Video Servers are susceptible to passwd file retrieval vulnerabilities, unauthenticated admin user additions, and hardcoded login/password flaws.
Author:bashis
File Size:5432
Last Modified:Aug 24 09:31:14 2004
MD5 Checksum:3e83d84a0274030f1df56173ebf03200

 ///  File Name: musicDaemon.txt
Description:
MusicDaemon versions 0.0.3 and below suffer from a remote denial of service and flaw where /etc/shadow can be extracted. Exploit included.
Author:Tal0n
File Size:5205
Last Modified:Aug 24 10:22:26 2004
MD5 Checksum:d6c7ee7b0ef2783d63261d968b4b0338

 ///  File Name: hafiye.txt
Description:
Hafiye 1.0 has a terminal escape sequence injection vulnerability that can result in a denial of service and remote root compromise. Exploit included.
Author:Serkan Akpolat
Homepage:http://deicide.siyahsapka.org
File Size:4474
Last Modified:Aug 24 10:29:43 2004
MD5 Checksum:ba176c1917a8df85b3c7f22bfd54e958