Section:  .. / 0410-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 60
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: iceexec.rar
Description:
Remote proof of concept exploit for Icecast versions 2.0.1 and below on win32 that downloads NCAT from elitehaven.net and spawns a shell on port 9999.
Homepage:http://www.delikon.de/
Related File:icecast201.txt
File Size:24207
Last Modified:Oct 7 06:18:04 2004
MD5 Checksum:74024e744247e3a3ed59c66dd5ccd79a

 ///  File Name: iceexec.zip
Description:
Remote proof of concept exploit for Icecast versions 2.0.1 and below on win32.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:icecast201.txt
File Size:7130
Last Modified:Oct 7 05:06:52 2004
MD5 Checksum:f4d0c6007f41ee72ae16a1869a4dcf64

 ///  File Name: iis.pl.txt
Description:
IIS 5 null pointer proof of concept exploit.
Author:Diabolic Crab
Homepage:http://www.digitalparadox.org
File Size:11048
Last Modified:Oct 26 05:33:45 2004
MD5 Checksum:23b1b5d7f0723ecce0391aef1ccf374a

 ///  File Name: libxmlSploit.c
Description:
Local exploit tested against libxml2-2.6.12 and libxml2-2.6.13 that makes use of libxml remotely exploitable buffer overflows.
Author:sean
File Size:6451
Last Modified:Oct 27 07:25:52 2004
MD5 Checksum:3f896e0895c275d9d12a6d912519e5ea

 ///  File Name: lithsec.zip
Description:
Remote proof of concept exploit for old games developed by Monolith that are susceptible to a buffer overflow which occurs when an attacker sends a secure Gamespy query followed by at least 68 chars.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:oldMonolith.txt
File Size:7942
Last Modified:Oct 13 09:02:29 2004
MD5 Checksum:a29ca3fcb7d4f6e8f9a85fa9d979f1a6

 ///  File Name: mailcarrier.txt
Description:
MailCarrier 2.51 SMTP EHLO / HELO buffer overflow exploit written in python that spawns a shell on port 101 of the target machine.
Author:muts
File Size:4606
Last Modified:Oct 27 07:44:56 2004
MD5 Checksum:d6dd28c628338cf2a4fd72d146a34c47

 ///  File Name: mangleme.tgz
Description:
mangleme is an automated broken HTML generator and browser tester, originally used to find dozens of security and reliability problems in all major Web browsers (Mozilla / Firefox / Netscape, Konqueror / Safari, MSIE, lynx, [e]links, w3m, elvis, etc), as reported on BUGTRAQ.
Author:Michal Zalewski
Homepage:http://lcamtuf.coredump.cx/mangleme/gallery/
File Size:3454
Last Modified:Oct 27 07:06:29 2004
MD5 Checksum:007232c9d9431f12d7c1d3dcbca3a5d6

 ///  File Name: monit402up.c
Description:
Monit 4.2 and below remote root exploit that uses a buffer overflow in the handling of Basic Authentication.
Author:rtk
Homepage:http://www.eos-india.net/
File Size:7385
Last Modified:Oct 26 04:14:42 2004
MD5 Checksum:7a4132a84597f6c603af1befbe8be559

 ///  File Name: moo3boom.zip
Description:
Proof of concept exploit for Master of Orion III versions 1.2.5 and below which suffer from buffer overflow and allocation errors.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:masterOrionIII.txt
File Size:7983
Last Modified:Oct 28 16:47:16 2004
MD5 Checksum:695b4909f8472b35ca8bc0a8296012b1

 ///  File Name: ms04-030_spl.pl
Description:
DoS exploit for Microsoft XML parsing flaw. This is an exploit for the issues described in MS04-30.
Author:incognito_ergo
File Size:745
Related OSVDB(s):10688
Related CVE(s):CAN-2003-0718
Last Modified:Oct 20 00:01:00 2004
MD5 Checksum:0f33d60d1b7d7b70dd4f0022207932b9

 ///  File Name: mssql.7.0.dos.c
Description:
Mssql 7.0 remote denial of service buffer overflow exploit. Affects Mssql 7.0 Service Pack sp0, sp1, sp2, and sp3. Stops the service "mssqlserver".
Author:securma massine
File Size:2062
Last Modified:Oct 1 06:59:20 2004
MD5 Checksum:e8c0985b3c6498ec6d29ec73f7f7a661

 ///  File Name: NotmuchG.pl.txt
Description:
Perl exploit for IPSwitch WhatsUp Gold version 8.03 that is susceptible to a remote buffer overflow. Tested on Win2k SP4. Successful exploitation binds a shell on port 28876.
Author:ET
Related File:08.25.04.txt
File Size:4559
Last Modified:Oct 13 05:14:47 2004
MD5 Checksum:0c39361862f209e73e6107bf06e50093

 ///  File Name: osx86_mmdfdeliver.c
Description:
MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.
Author:Ramon de Carvalho Valle
Related File:SCOSA-2004.7.txt
File Size:1756
Related CVE(s):CAN-2004-0510
Last Modified:Oct 26 04:40:58 2004
MD5 Checksum:fb00af86ece2ed6422cdbc89c50c5b4c

 ///  File Name: parachat55.txt
Description:
ParaChat server version 5.5 is susceptible to a directory traversal attack.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1473
Last Modified:Oct 7 05:10:33 2004
MD5 Checksum:5142f53be781a230176f5d818bb2bc62

 ///  File Name: phplinks2.txt
Description:
Further research into PHP Links shows that it is susceptible to a PHP inclusion flaw along with some SQL injection attacks.
Homepage:http://security.lss.hr
File Size:1499
Last Modified:Oct 13 05:38:50 2004
MD5 Checksum:5fbdc1927eda766638c56d56304c4870

 ///  File Name: phpPOC.txt
Description:
PHP proof of concept exploit that makes use of an arbitrary file upload flaw in PHP versions below 4.3.9 and 5.0.2.
Author:Stefano Di Paola
Homepage:http://www.wisec.it/news.php?lang=en
File Size:5110
Last Modified:Oct 1 17:28:43 2004
MD5 Checksum:82bbf54363bb3c8d4fb0c1e2add5924a

 ///  File Name: priv8icecast.pl
Description:
Remote root exploit for Icecast 2.0.1 on Windows. Makes use of an overflow that allows for remote command execution and provides a nice reverse shell.
Author:wsxz, Luigi Auriemma
Homepage:http://Priv8security.com
Related File:icecast201.txt
File Size:5027
Last Modified:Oct 7 06:14:49 2004
MD5 Checksum:2c6ef9142f73396f075b8c3bd9987c02

 ///  File Name: proftp-userdisc.c
Description:
Side-channel username verification against ProFTPd. Sends the USER command, and sees how long the server takes to respond, indicating whether the user exists or not. Obviously, this may produce false positives on slow network connections.
Author:Leon Juranic
Homepage:http://security.lss.hr/PoC/
File Size:1338
Last Modified:Oct 16 13:35:00 2004
MD5 Checksum:6f26f6bb5284cbaf5f0481ab785e6eae

 ///  File Name: proftpdEnum.c
Description:
Remote proof of concept exploit for the ProFTPD 1.2.x user enumeration vulnerability.
Author:Leon Juranic
Homepage:http://security.lss.hr/
Related File:proftpd12x.txt
File Size:1414
Last Modified:Oct 26 04:59:36 2004
MD5 Checksum:12d2ec09d0f44184074a9c66ba03c0ab

 ///  File Name: sacred_jpg.c
Description:
GDI+ buffer overrun exploit that builds a malicious .JPG file.
Author:Crypto
File Size:23491
Related CVE(s):CAN-2004-0200
Last Modified:Oct 7 05:03:19 2004
MD5 Checksum:4cd6913e57956a3bb37690712ce74cb3

 ///  File Name: Saleslogix-1-2004.txt
Description:
SaleLogix Server and Web Client suffer from bypass authentication, privilege escalation, SQL injection, information leak, arbitrary file creation, and directory traversal flaws.
Author:Carl Livitt
Homepage:http://www.agenda-security.co.uk
File Size:20010
Last Modified:Oct 26 05:24:42 2004
MD5 Checksum:c97ae65fc41ff409dd5b782d138e301e

 ///  File Name: serendipityPoC.txt
Description:
Serendipity 0.7-beta1 and below proof of concept SQL injection exploit that dumps the administrator's username and md5 password hash.
Author:aCiDBiTS
File Size:1871
Last Modified:Oct 1 18:31:03 2004
MD5 Checksum:fa4a99a6347d410345afafd3477bb084

 ///  File Name: shixxbof.zip
Description:
Proof of concept exploit that makes use of a buffer overflow vulnerability existing in Shixxnote 6.net.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:shixxnote6.txt
File Size:7121
Last Modified:Oct 25 00:21:38 2004
MD5 Checksum:97d686dc8f42aec7293a0fbc4c2a48cb

 ///  File Name: silentstorm.txt
Description:
The Silent Storm Portal versions 2.1 and 2.2 suffer from cross site scripting and unauthorized administrative access vulnerabilities due to a lack of variable sanitization.
Homepage:http://www.CyberSpy.Org
File Size:3360
Last Modified:Oct 7 06:01:46 2004
MD5 Checksum:85efc40646d41c9e25d281ceb0f1c1df

 ///  File Name: stackShell.txt
Description:
Example code of using shellcode to bypass stackguard.
Author:Vallez
File Size:11684
Last Modified:Oct 26 05:40:25 2004
MD5 Checksum:c62cb43d6cb74321761f3276b6908895