Section:  .. / 0409-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 56
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0409-exploits.tgz
Description:
Packet Storm new exploits for September, 2004.
File Size:1045479
Last Modified:Oct 1 18:32:39 2004
MD5 Checksum:2fb304d87dca78c323690298ac9d1a9e

 ///  File Name: flc_exp.c
Description:
Local exploit for flc versions 1.0.4 and below. Note that flc is not setuid by default and this is completely proof of concept. Tested on Slackware 10.0.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:5200
Last Modified:Sep 30 09:54:30 2004
MD5 Checksum:6bde4a3aa0db275b740ec679ab535911

 ///  File Name: mdaemon_rcpt.c
Description:
Remote denial of service proof of concept exploit that makes use of a buffer overflow in Mdaemon SMTP server version 6.5.1.
Author:D_BuG
File Size:3121
Last Modified:Sep 30 09:31:36 2004
MD5 Checksum:c739d6439f26297b8ad85526974ad8ab

 ///  File Name: mdaemon_imap.c
Description:
Remote proof of concept exploit for MDaemon IMAP server version 6.5.1 that makes use of an overflow in the LIST command.
Author:D_BuG
File Size:4183
Last Modified:Sep 30 09:30:27 2004
MD5 Checksum:70e53f1694ce2dc74788bb19d73ba65e

 ///  File Name: aspWebCalendar.txt
Description:
Both aspWebCalendar and aspWebAlbum are susceptible to SQL injection attacks.
Author:cybercide
File Size:2514
Last Modified:Sep 29 09:30:18 2004
MD5 Checksum:07b2490102b9e85da521cac1613b0434

 ///  File Name: actpboom.zip
Description:
Proof of concept exploit ActivePost Standard versions 3.1 and below that makes use of a denial of service flaw.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:activePost.txt
File Size:7145
Last Modified:Sep 29 09:25:27 2004
MD5 Checksum:81fde4a9ca937dcd9ff4d85f145b658f

 ///  File Name: x_hpux_11_swinstall.c
Description:
Local root exploit that makes use of a buffer overflow in the Software Distributor utilities for HP-UX.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:1515
Last Modified:Sep 29 08:12:14 2004
MD5 Checksum:bf7861c01af82d7529cd185de3d067c3

 ///  File Name: x_hpux_11i_nls_ping.c
Description:
Local format string exploit for /usr/sbin/ping under HP-UX.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:3350
Last Modified:Sep 29 08:10:19 2004
MD5 Checksum:7e1d1355b210a0d35793c8ab4027be3e

 ///  File Name: x_hpux_11i_nls_cu.c
Description:
Local format string exploit for /usr/bin/cu under HP-UX.
Author:watercloud
Homepage:http://www.xfocus.org
File Size:3336
Last Modified:Sep 29 08:09:21 2004
MD5 Checksum:b748cf28bffa5f4f981fde36ce42112c

 ///  File Name: JpegOfDeathAll.c
Description:
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes. This even-moreso enhanced version also has the ability add a user to the administrative group and can perform a file download.
Author:M4Z3R
File Size:24246
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:30:33 2004
MD5 Checksum:f7f34642b20f482a8ce7f619bb239501

 ///  File Name: JpgDownloader.c
Description:
Microsoft Windows JPEG GDI+ Overflow Download Shellcoded exploit.
Author:ATmaCA
Homepage:http://www.prohack.net
File Size:10617
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:27:15 2004
MD5 Checksum:aa804f40ffe756a77f4906e51432550e

 ///  File Name: JpegOfDeath.c
Description:
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes.
Author:John Bissell A.K.A. HighT1mes
File Size:19148
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:23:52 2004
MD5 Checksum:f782b4f39d2b36dae9a9c07dd5d1f11e

 ///  File Name: ms04-028-cmd.c
Description:
Microsoft Windows proof of concept JPEG GDI+ overflow shellcoded exploit that launches a local cmd.exe.
Author:FoToZ
File Size:7471
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:18:59 2004
MD5 Checksum:fbed06712fd1e70c91a66c5074f84768

 ///  File Name: sharexploit.c
Description:
GNU sharutils versions 4.2.1 and below local format string vulnerability proof of concept exploit.
Author:n4rk0tix
File Size:9144
Last Modified:Sep 29 06:11:25 2004
MD5 Checksum:9ecf1cbfab55330974d86f8b8bb291ea

 ///  File Name: popmsgboom.zip
Description:
Denial of service exploit for PopMessenger versions 1.60 that makes use of a flaw when handling dialog boxes in relation to illegal characters.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:popMessenger.txt
File Size:7025
Last Modified:Sep 29 05:57:36 2004
MD5 Checksum:fa8e6ccb5da245d2006d941cb65672f3

 ///  File Name: EmuliveVuln.txt
Description:
Emulive Server4 Commerce Edition Build 7560 suffers from a denial of service vulnerability and allows for unauthorized administrative access due to insufficient input verification.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3007
Last Modified:Sep 22 00:54:52 2004
MD5 Checksum:473a1647cd41c7d4d3c4eb2f29e8aa3d

 ///  File Name: ms04-028.sh
Description:
Proof of concept local exploit that creates a jpeg image to test for the buffer overrun vulnerability discovered under Microsoft Windows. Shellcode and valid addresses have been removed.
Author:perplexy
Related File:ms04-028.html
File Size:4464
Last Modified:Sep 22 00:34:10 2004
MD5 Checksum:78666a3a509861cea8ca1d0780d0d134

 ///  File Name: lotr3boom.zip
Description:
Remote denial of service exploit for Lords of the Realm III versions 1.01 and below that will crash the server.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:lotr3boom-adv.txt
File Size:6881
Last Modified:Sep 21 21:25:26 2004
MD5 Checksum:bb718b4f3b9b9ef2ccf38c6c95124664

 ///  File Name: mambo45.jose.txt
Description:
Mambo versions 4.5 and below are susceptible to cross site scripting and remote command execution flaws.
Author:Joxean Koret
File Size:3296
Last Modified:Sep 21 11:04:56 2004
MD5 Checksum:28348285c00be6936bce480a3500a65c

 ///  File Name: advisory-05-glFTPd.txt
Description:
The dupescan binary from glFTPd versions 2.00RC3 and below suffers from a stack overflow that can be exploited locally. Full exploit included.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:4328
Last Modified:Sep 21 10:09:39 2004
MD5 Checksum:373e7c82d4e8791105b347c2dc1e2f45

 ///  File Name: sudoedit.txt
Description:
Local exploit for sudo version 1.6.8p1 that makes use of a flaw in sudoedit.
Author:Angelo Rosiello
Homepage:http://www.rosiello.org/
Related File:sudo168.txt
File Size:3473
Last Modified:Sep 21 09:57:03 2004
MD5 Checksum:fdc1b829ba7147a4d81881f9024a77e2

 ///  File Name: mambo451.txt
Description:
Mambo versions 4.5.1 and below are susceptible to a SQL injection vulnerability.
Author:khoai
Homepage:http://www.xfrog.org
File Size:1035
Last Modified:Sep 21 09:43:39 2004
MD5 Checksum:283ff13906e0284c2fd5d25332a7eca4

 ///  File Name: zyxel650_dos.pl
Description:
ZyXEL Prestige 650HW-31 and 650R-11 DSL Router denial of service exploit.
Author:frid4y
File Size:820
Last Modified:Sep 21 09:37:20 2004
MD5 Checksum:4ddeb67d399010a73d714184f015d6b1

 ///  File Name: rsynxOSX.txt
Description:
RsyncX version 2.1, the frontend for rsync on OS X, fails to drop a group id of wheel and allows for arbitrary program execution.
Author:Matt Johnston
File Size:2503
Last Modified:Sep 21 05:24:26 2004
MD5 Checksum:aeee8859225c9e39d64b96750688797a

 ///  File Name: pigeonx.zip
Description:
Remote denial of service exploit for Pigeon versions 3.02.0143 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:pigeon302.txt
File Size:6372
Last Modified:Sep 21 02:22:24 2004
MD5 Checksum:c3f7120052e9f64d8c48787b8d6bbbb7