Section:  .. / 0409-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 56
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0409-exploits.tgz
Description:
Packet Storm new exploits for September, 2004.
File Size:1045479
Last Modified:Oct 1 18:32:39 2004
MD5 Checksum:2fb304d87dca78c323690298ac9d1a9e

 ///  File Name: BJDExploit.rar
Description:
Buffer overflow exploit for BlackJumboDog FTP server version 3.6.1 that opens up port 7777 allowing for an executable upload.
Author:Delikon
Homepage:http://www.delikon.de
File Size:894629
Last Modified:Sep 10 05:50:26 2004
MD5 Checksum:4fc6dee5800f93c254e636f16d9e3049

 ///  File Name: JpegOfDeathAll.c
Description:
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes. This even-moreso enhanced version also has the ability add a user to the administrative group and can perform a file download.
Author:M4Z3R
File Size:24246
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:30:33 2004
MD5 Checksum:f7f34642b20f482a8ce7f619bb239501

 ///  File Name: regulus.htm
Description:
Various vulnerabilities exist in Regulus 2.x that allow for an attacker to gain access to sensitive information and to bypass certain security restrictions.
Author:masud_libra
File Size:23922
Last Modified:Sep 14 23:07:53 2004
MD5 Checksum:a1c677c4c39a8a5a097c8909a1a39863

 ///  File Name: drizzit.c
Description:
AIM Away Message buffer overflow exploit. Affects AIM versions 5.5.3588, 5.5.3590 Beta, 5.5.3591, 5.5.3595 and others.
Author:John Bissell A.K.A. HighT1mes
File Size:19724
Last Modified:Sep 9 05:53:42 2004
MD5 Checksum:404fe625228d0d0b22c71e15c851fbcc

 ///  File Name: JpegOfDeath.c
Description:
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes.
Author:John Bissell A.K.A. HighT1mes
File Size:19148
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:23:52 2004
MD5 Checksum:f782b4f39d2b36dae9a9c07dd5d1f11e

 ///  File Name: sm00ny-courier_imap_fsx.c
Description:
courier-imap 3.0.2-r1 and below remote format string vulnerability exploit. Tested on FreeBSD 4.10-RELEASE with courier-imap-3.0.2.
Author:ktha
Related File:08.18.04.txt
File Size:10720
Related CVE(s):CAN-2004-0777
Last Modified:Sep 13 23:19:56 2004
MD5 Checksum:2be4977b3a40a417cf34df9469212028

 ///  File Name: JpgDownloader.c
Description:
Microsoft Windows JPEG GDI+ Overflow Download Shellcoded exploit.
Author:ATmaCA
Homepage:http://www.prohack.net
File Size:10617
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:27:15 2004
MD5 Checksum:aa804f40ffe756a77f4906e51432550e

 ///  File Name: haloboom.zip
Description:
Proof of concept denial of service exploit for Halo: Combat Evolved versions 1.4 and below which suffer from an off-by-one vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:halo14.txt
File Size:10124
Last Modified:Sep 10 21:08:52 2004
MD5 Checksum:a209bcdbf59c23cdf87a5de474779cb6

 ///  File Name: sharexploit.c
Description:
GNU sharutils versions 4.2.1 and below local format string vulnerability proof of concept exploit.
Author:n4rk0tix
File Size:9144
Last Modified:Sep 29 06:11:25 2004
MD5 Checksum:9ecf1cbfab55330974d86f8b8bb291ea

 ///  File Name: codboom.zip
Description:
Proof of concept exploit for Call of Duty versions 1.4 and below that makes use of a denial of service vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:CallOfDuty.txt
File Size:9101
Last Modified:Sep 9 09:39:36 2004
MD5 Checksum:a7c36f7261bb0e082d1376fa1c267feb

 ///  File Name: ms04-028-cmd.c
Description:
Microsoft Windows proof of concept JPEG GDI+ overflow shellcoded exploit that launches a local cmd.exe.
Author:FoToZ
File Size:7471
Related CVE(s):CAN-2004-0200
Last Modified:Sep 29 07:18:59 2004
MD5 Checksum:fbed06712fd1e70c91a66c5074f84768

 ///  File Name: jpegcompoc.zip
Description:
Proof of concept exploit for the recent JPEG buffer overrun vulnerability that crashes any Windows XP system that has not been patched for this flaw.
Homepage:http://www.gulftech.org/
Related File:ms04-028.html
File Size:7425
Related CVE(s):CAN-2004-0200
Last Modified:Sep 17 09:21:56 2004
MD5 Checksum:4ad5d8988446467319a2cc56f786cbfb

 ///  File Name: actpboom.zip
Description:
Proof of concept exploit ActivePost Standard versions 3.1 and below that makes use of a denial of service flaw.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:activePost.txt
File Size:7145
Last Modified:Sep 29 09:25:27 2004
MD5 Checksum:81fde4a9ca937dcd9ff4d85f145b658f

 ///  File Name: popmsgboom.zip
Description:
Denial of service exploit for PopMessenger versions 1.60 that makes use of a flaw when handling dialog boxes in relation to illegal characters.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:popMessenger.txt
File Size:7025
Last Modified:Sep 29 05:57:36 2004
MD5 Checksum:fa8e6ccb5da245d2006d941cb65672f3

 ///  File Name: lotr3boom.zip
Description:
Remote denial of service exploit for Lords of the Realm III versions 1.01 and below that will crash the server.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:lotr3boom-adv.txt
File Size:6881
Last Modified:Sep 21 21:25:26 2004
MD5 Checksum:bb718b4f3b9b9ef2ccf38c6c95124664

 ///  File Name: pigeonx.zip
Description:
Remote denial of service exploit for Pigeon versions 3.02.0143 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:pigeon302.txt
File Size:6372
Last Modified:Sep 21 02:22:24 2004
MD5 Checksum:c3f7120052e9f64d8c48787b8d6bbbb7

 ///  File Name: titanftp.c
Description:
Exploit that makes use of the heap overflow in Titan FTP server versions 3.21 and below.
Author:lion
Homepage:http://www.cnhonker.com/
Related File:TitanFTPheap.txt
File Size:5636
Last Modified:Sep 2 08:58:44 2004
MD5 Checksum:c6fe80918c327af4a9357f173c94bd9c

 ///  File Name: wftpdDoS.c
Description:
Denial of service exploit for WFTPD Pro Server 3.21.
Author:lion
Homepage:http://www.cnhonker.com
Related File:wftpdProDoS.txt
File Size:5539
Last Modified:Sep 2 09:09:18 2004
MD5 Checksum:86588d24b106f03f98a2a8a336703b67

 ///  File Name: flc_exp.c
Description:
Local exploit for flc versions 1.0.4 and below. Note that flc is not setuid by default and this is completely proof of concept. Tested on Slackware 10.0.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:5200
Last Modified:Sep 30 09:54:30 2004
MD5 Checksum:6bde4a3aa0db275b740ec679ab535911

 ///  File Name: trillian074i.txt
Description:
A buffer overflow vulnerability in the Trillian basic edition version 0.74i occurs in the MSN module when receiving a string of around 4096 bytes ending with a newline character from an MSN messenger server. This vulnerability is remotely exploitable but requires the use of a man-in-the-middle attack. Full exploit included.
Author:Komrade
Homepage:http://unsecure.altervista.org/security/trillian.htm
File Size:4815
Last Modified:Sep 10 07:08:33 2004
MD5 Checksum:2b6d704d8a017393ce34ec3c5e61eb93

 ///  File Name: getintranet.txt
Description:
getIntranet 2.x is susceptible to cross site scripting, SQL injection, script insertion, and multiple other attacks.
Homepage:http://www.criolabs.net/
File Size:4744
Last Modified:Sep 14 23:10:17 2004
MD5 Checksum:ba50543e08977504330d7c44c1be564c

 ///  File Name: ez.txt
Description:
Opening up more than 600 connections to Ezmeeting versions 3.4.0 causes the application to crash.
Author:dr_insane
File Size:4684
Last Modified:Sep 9 08:45:21 2004
MD5 Checksum:0ac05cfb7cd14644764767ed7376f15a

 ///  File Name: neb-private.c
Description:
Private version of the remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Support for Red Hat 7.1, 7.2, 7.3, SuSE 8.0, Debian, Slackware 8.0, 9.0.0, 9.1.0.
Author:nebunu
File Size:4635
Last Modified:Sep 9 09:30:59 2004
MD5 Checksum:2f55e2a170df94483898721fbaaa2a69

 ///  File Name: ms04-028.sh
Description:
Proof of concept local exploit that creates a jpeg image to test for the buffer overrun vulnerability discovered under Microsoft Windows. Shellcode and valid addresses have been removed.
Author:perplexy
Related File:ms04-028.html
File Size:4464
Last Modified:Sep 22 00:34:10 2004
MD5 Checksum:78666a3a509861cea8ca1d0780d0d134