Section:  .. / 0410-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 60
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: advisory-07-nsg.txt
Description:
Proof of concept exploit for Socat versions 1.4.0.2 and below that makes use of a format string vulnerability.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:6043
Last Modified:Oct 27 04:08:22 2004
MD5 Checksum:8bb021b27d4f31ff6c9ba00a89a73505

 ///  File Name: 101_ypops.cpp
Description:
YahooPOPS version 1.6 and prior SMTP port buffer overflow exploit version 0.1. Binds a shell to port 101.
Author:class101, Behrang Fouladi
File Size:5809
Last Modified:Oct 13 10:09:57 2004
MD5 Checksum:0d5056eaf4d9cdc2944e37a93bdd4e78

 ///  File Name: yahooPOPS.txt
Description:
Remote buffer overflows in both the POP3 and SMTP services of the YahooPOPs application can allow for arbitrary code execution. Exploit included.
Author:Behrang Fouladi, Nima Majidi
File Size:5547
Last Modified:Oct 1 16:20:52 2004
MD5 Checksum:f002a2cc9c2caf0a8929abe9b6f23386

 ///  File Name: phpPOC.txt
Description:
PHP proof of concept exploit that makes use of an arbitrary file upload flaw in PHP versions below 4.3.9 and 5.0.2.
Author:Stefano Di Paola
Homepage:http://www.wisec.it/news.php?lang=en
File Size:5110
Last Modified:Oct 1 17:28:43 2004
MD5 Checksum:82bbf54363bb3c8d4fb0c1e2add5924a

 ///  File Name: priv8icecast.pl
Description:
Remote root exploit for Icecast 2.0.1 on Windows. Makes use of an overflow that allows for remote command execution and provides a nice reverse shell.
Author:wsxz, Luigi Auriemma
Homepage:http://Priv8security.com
Related File:icecast201.txt
File Size:5027
Last Modified:Oct 7 06:14:49 2004
MD5 Checksum:2c6ef9142f73396f075b8c3bd9987c02

 ///  File Name: zinfexploit.c
Description:
Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.
Author:delikon, Luigi Auriemma
Homepage:http://www.delikon.de/
File Size:4966
Last Modified:Oct 1 18:11:46 2004
MD5 Checksum:04b0fede58545ec6f3d333dc5701dbf6

 ///  File Name: mailcarrier.txt
Description:
MailCarrier 2.51 SMTP EHLO / HELO buffer overflow exploit written in python that spawns a shell on port 101 of the target machine.
Author:muts
File Size:4606
Last Modified:Oct 27 07:44:56 2004
MD5 Checksum:d6dd28c628338cf2a4fd72d146a34c47

 ///  File Name: NotmuchG.pl.txt
Description:
Perl exploit for IPSwitch WhatsUp Gold version 8.03 that is susceptible to a remote buffer overflow. Tested on Win2k SP4. Successful exploitation binds a shell on port 28876.
Author:ET
Related File:08.25.04.txt
File Size:4559
Last Modified:Oct 13 05:14:47 2004
MD5 Checksum:0c39361862f209e73e6107bf06e50093

 ///  File Name: ability.c
Description:
Ability FTP server 2.34 FTP STOR buffer overflow remote exploit that spawns a shell on port 4444 upon successful exploitation.
Author:muts
File Size:3682
Last Modified:Oct 27 05:40:11 2004
MD5 Checksum:cfbe27ffe3b1f3ea7ae63d764fa5d895

 ///  File Name: turboTraffic.txt
Description:
Turbo Traffic Trader Nitro version 1.0 is susceptible to multiple cross site scripting and SQL injection attacks. Full exploitation for the SQL injection attack provided.
Author:aCiDBiTS
File Size:3633
Last Modified:Oct 13 09:45:48 2004
MD5 Checksum:543cdce4567d644e22ab3543765d5ba4

 ///  File Name: ability-ftpd-exploit.tar.bz2
Description:
Remote root exploit for the STOR buffer overflow vulnerability in Code-Crafters Ability FTPd version 2.34. The EIP address only works on Windows 2000 SP4. Two shellcodes are included. One binds a shell and another streams a file and executes.
Author:David Jungerson
Related Exploit:ability.c"
File Size:3595
Last Modified:Oct 30 00:41:37 2004
MD5 Checksum:fcd37a5c404065719a1feb126f7c5db3

 ///  File Name: mangleme.tgz
Description:
mangleme is an automated broken HTML generator and browser tester, originally used to find dozens of security and reliability problems in all major Web browsers (Mozilla / Firefox / Netscape, Konqueror / Safari, MSIE, lynx, [e]links, w3m, elvis, etc), as reported on BUGTRAQ.
Author:Michal Zalewski
Homepage:http://lcamtuf.coredump.cx/mangleme/gallery/
File Size:3454
Last Modified:Oct 27 07:06:29 2004
MD5 Checksum:007232c9d9431f12d7c1d3dcbca3a5d6

 ///  File Name: silentstorm.txt
Description:
The Silent Storm Portal versions 2.1 and 2.2 suffer from cross site scripting and unauthorized administrative access vulnerabilities due to a lack of variable sanitization.
Homepage:http://www.CyberSpy.Org
File Size:3360
Last Modified:Oct 7 06:01:46 2004
MD5 Checksum:85efc40646d41c9e25d281ceb0f1c1df

 ///  File Name: dc_iwconfig.c
Description:
Local root exploit for /usr/sbin/iwconfig.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com
File Size:3262
Last Modified:Oct 26 05:36:10 2004
MD5 Checksum:555d29db0258393ea5dec03437dadbac

 ///  File Name: coldfusionmx61.txt
Description:
There is a vulnerability in ColdFusion MX 6.1 when a user can create a cold fusion template on a ColdFusion server with CreateObject or cfobject tags enabled.
Author:Eric Lackey
File Size:2826
Last Modified:Oct 7 06:44:53 2004
MD5 Checksum:1e8c513ba7c2a4621b1aa7faaa220e0d

 ///  File Name: yak212.txt
Description:
Yak! versions 2.1.2 and below suffer from remote directory traversal and arbitrary file upload vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:2572
Last Modified:Oct 26 04:43:53 2004
MD5 Checksum:9eb4caaf5b21af9837248f3c5bdde268

 ///  File Name: cht-security.txt
Description:
CoolPHP 1.0-stable is susceptible to cross site scripting, path disclosure, and directory traversal attacks.
Author:R00tCr4ck
Homepage:http://www.CyberSpy.Org
File Size:2362
Last Modified:Oct 26 04:55:05 2004
MD5 Checksum:ac658b34e75b8705189dd21e78417e1e

 ///  File Name: gosmart.txt
Description:
Multiple vulnerabilities were found in the GoSmart Message Board. A remote user can conduct SQL injection and cross site scripting attacks. Exploitation examples provided.
Author:Positive Technologies
Homepage:http://www.ptsecurity.com
File Size:2097
Last Modified:Oct 13 09:52:09 2004
MD5 Checksum:4e91f441bdeec979428455ee684755e9

 ///  File Name: w-agora.txt
Description:
Multiple vulnerabilities were found in the w-agora forum version 4.1.6a. A remote user can conduct SQL injection, HTTP response splitting and Cross site scripting attacks.
Homepage:http://www.maxpatrol.com
File Size:2073
Last Modified:Oct 7 05:56:46 2004
MD5 Checksum:262951fbdad40d4513cc706e29e4180a

 ///  File Name: mssql.7.0.dos.c
Description:
Mssql 7.0 remote denial of service buffer overflow exploit. Affects Mssql 7.0 Service Pack sp0, sp1, sp2, and sp3. Stops the service "mssqlserver".
Author:securma massine
File Size:2062
Last Modified:Oct 1 06:59:20 2004
MD5 Checksum:e8c0985b3c6498ec6d29ec73f7f7a661

 ///  File Name: serendipityPoC.txt
Description:
Serendipity 0.7-beta1 and below proof of concept SQL injection exploit that dumps the administrator's username and md5 password hash.
Author:aCiDBiTS
File Size:1871
Last Modified:Oct 1 18:31:03 2004
MD5 Checksum:fa4a99a6347d410345afafd3477bb084

 ///  File Name: carboncopy.txt
Description:
Altiris Carbon Copy Version 6.0.5257 allows for a user to browse to cmd.exe and spawn a shell as SYSTEM.
Author:KF
File Size:1809
Last Modified:Oct 27 05:26:46 2004
MD5 Checksum:1dbe8495ef844e3797ff6c95465c3dba

 ///  File Name: osx86_mmdfdeliver.c
Description:
MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.
Author:Ramon de Carvalho Valle
Related File:SCOSA-2004.7.txt
File Size:1756
Related CVE(s):CAN-2004-0510
Last Modified:Oct 26 04:40:58 2004
MD5 Checksum:fb00af86ece2ed6422cdbc89c50c5b4c

 ///  File Name: tridcomm13.txt
Description:
Tridcomm versions 1.3 and below suffer from both upload and download directory traversal attacks. Exploitation provided.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1669
Last Modified:Oct 13 07:43:23 2004
MD5 Checksum:83aeadcfca11fcc4b9de8a470b52d26c

 ///  File Name: blackboard.txt
Description:
BlackBoard version 1.5.1 is susceptible to full path disclosure and remote executable code inclusion.
Author:Cracklove
Homepage:http://ProxySky.com
File Size:1532
Last Modified:Oct 13 06:38:50 2004
MD5 Checksum:65e781fc819bc6cf64300ef109e3b604