Section:  .. / 0411-exploits  /

Page 1 of 4
<< 1 2 3 4 >> Files 1 - 25 of 77
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0411-exploits.tgz
Description:
Packet Storm new exploits for November, 2004.
File Size:229933
Last Modified:Jan 2 22:02:50 2005
MD5 Checksum:3fb9ef413eed6565c35700d6937a1ff3

 ///  File Name: janados.zip
Description:
Remote denial of service exploit for Jana server 2 versions 2.4.4 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:janados.txt
File Size:7850
Last Modified:Dec 12 00:34:07 2004
MD5 Checksum:22ecc84b906bffd5bc9d5d101be7570f

 ///  File Name: ex_MERCURY.c
Description:
Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.
Author:John H.
File Size:6470
Last Modified:Dec 12 00:26:19 2004
MD5 Checksum:df3670644acf63435dd9a77c428eb3cf

 ///  File Name: mercury.c
Description:
Mercury Mail 4.01 (Pegasus) IMAP remote buffer overflow exploit.
Author:Muts
Homepage:http://www.whitehat.co.il
File Size:1637
Last Modified:Dec 12 00:24:30 2004
MD5 Checksum:f016a7e00aaf8c91e97a3f1f0e9aa791

 ///  File Name: orbzbof.zip
Description:
Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:orbzbof.txt
File Size:8963
Last Modified:Dec 12 00:17:42 2004
MD5 Checksum:a35a9e2f70a3186a2be48a01942794d8

 ///  File Name: IPSWSFTP-exploit.c
Description:
Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.
Author:Noph0bia
Related File:wsftp503.txt
File Size:4385
Last Modified:Dec 12 00:14:41 2004
MD5 Checksum:bdf3611955ed2ad4e6a80a5a5b0adfa7

 ///  File Name: mdaemon72.txt
Description:
A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.
Author:Reed Arvin
File Size:878
Last Modified:Dec 11 23:58:08 2004
MD5 Checksum:ab98079c7abf569bb92b4d337713545b

 ///  File Name: ssfakep.zip
Description:
Remote denial of service exploit for games using the Serious engine. Generates UDP packets that have fake players enter a room. The system fails to limit the amount of users that can enter.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:ssfakep.txt
File Size:9644
Last Modified:Dec 11 23:40:25 2004
MD5 Checksum:0ad8fba41b88800236ee2330ecee1271

 ///  File Name: phpnews.txt
Description:
Simple remote exploit for the SQL injection vulnerability discovered in PHPNews.
Author:ruggine
Related File:sa13300.txt
File Size:1638
Last Modified:Dec 11 23:24:10 2004
MD5 Checksum:3542945d30741fed34e9faa2fc32c92a

 ///  File Name: phpbb2011.txt
Description:
phpBB versions below 2.0.11 suffer from addition SQL injection and directory traversal flaws.
Author:Zeelock
File Size:3717
Last Modified:Dec 11 23:15:27 2004
MD5 Checksum:3db6cdf08707e750aade88f2b48d5986

 ///  File Name: pntresmailer.txt
Description:
PnTresMailer code browser version 6.03 is susceptible to path disclosure and directory traversal attacks.
Author:John C.
File Size:1011
Last Modified:Dec 11 23:13:05 2004
MD5 Checksum:62590d39a08e1474f473776fb3efc8d7

 ///  File Name: 000102advisory.txt
Description:
MailEnable Professional Edition version 1.52 and MailEnable Enterprise Edition version 1.01 both suffer from a remote buffer overflow in their IMAP service. Full exploit included.
Author:Nima Majidi, idespinner, class101
Homepage:http://www.hat-squad.com/
File Size:7305
Last Modified:Dec 11 22:51:22 2004
MD5 Checksum:102445417417101b51b8c9f52b3d0bd8

 ///  File Name: phpnolimit.c
Description:
Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.
Author:Gyan Chawdhary
Related File:php_memory_limit_remote.txt
File Size:8196
Related CVE(s):CAN-2004-0594
Last Modified:Dec 11 22:49:10 2004
MD5 Checksum:7aadceaf9298a2f92f0e123e7baaf4af

 ///  File Name: ezshopper.txt
Description:
EZshopper is susceptible to a directory traversal attack. Exploitation included.
Author:Zero X
Homepage:
File Size:352
Last Modified:Dec 11 21:39:34 2004
MD5 Checksum:e2a9fe55accc25d065eb53bbcbb714c4

 ///  File Name: atari800.txt
Description:
Exploit for the Atari800 atari emulator. Allows for local privilege escalation to root six different ways.
Author:Adam Zabrocki
Homepage:http://www.pi3.int.pl
File Size:16729
Last Modified:Dec 11 21:04:51 2004
MD5 Checksum:ed16586d6fb2d85c7c96dabf3e66909f

 ///  File Name: swbfp.zip
Description:
Remote test exploit for Star Wars Battlefront versions 1.11 and below that checks for buffer overflow and memory access flaws.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:swbfp.txt
File Size:20635
Last Modified:Dec 11 20:52:13 2004
MD5 Checksum:87011dbb3c49943fe2adbe77eb7ab5b5

 ///  File Name: OpenDcHub-poc.zip
Description:
Proof of concept exploit for a buffer overflow vulnerability that exists in Open Dc Hub version 0.7.14.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
Related File:opendchub0714.txt
File Size:3255
Last Modified:Dec 11 20:25:30 2004
MD5 Checksum:e3de5e9b0a3845f37783964004b88ef8

 ///  File Name: winampm3u.c
Description:
Exploit for the Winamp vulnerability existing in versions 5.06 and below making use of the IN_CDDA.dll remote buffer overflow.
Related File:winamp505.txt
File Size:3318
Last Modified:Dec 11 20:20:03 2004
MD5 Checksum:b39f45ee690142f7e8e9e75f7fd5da0f

 ///  File Name: SSA-20041122-12.txt
Description:
STG Security Advisory: Due to an input validation flaw, Zwiki is vulnerable to cross site scripting attacks.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:1416
Last Modified:Dec 11 20:07:18 2004
MD5 Checksum:ee307c282c2b83d763b5b423918746e0

 ///  File Name: SSA-20041122-11.txt
Description:
STG Security Advisory: Due to an input validation flaw, JSPWiki is vulnerable to cross site scripting attacks.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:1396
Last Modified:Dec 11 20:06:28 2004
MD5 Checksum:cea8374c7e4fd06bbe51b34084d7006e

 ///  File Name: SSA-20041122-10.txt
Description:
STG Security Advisory: KorWeblog suffers from a directory traversal vulnerability that malicious attackers can get file lists of arbitrary directories.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:2642
Last Modified:Dec 11 20:05:22 2004
MD5 Checksum:bf3673a09ff52d676ea067fb60869653

 ///  File Name: sof2boom.zip
Description:
Remote proof of concept exploit for Soldier of Fortune II versions 1.0.3 gold and below that suffer from a typical sprintf() overflow.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:sof2boom.txt
File Size:10157
Last Modified:Dec 11 19:55:47 2004
MD5 Checksum:cc8c46b475c92d775136290efc2c773e

 ///  File Name: halocboom.zip
Description:
Halo: Combat Evolved versions 1.05 and below remote denial of service exploit.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:halocboom.txt
File Size:8162
Last Modified:Dec 11 19:27:25 2004
MD5 Checksum:5257b93c92f2170e0d3e1cce4033571b

 ///  File Name: coffeecupbof.txt
Description:
CoffeeCup Direct FTP 6.2.0.62 and CoffeeCup Free FTP 3.0.0.10 both suffer from an overflow that allows for arbitrary code execution. Exploit included that spawns a shell on port 5555.
Author:Komrade
Homepage:http://unsecure.altervista.org
File Size:11433
Last Modified:Dec 11 19:22:06 2004
MD5 Checksum:0e0db67aab85ed49f32a9859c5300151

 ///  File Name: wodftpcrash.txt
Description:
WodFtpDLX versions below 2.3.2.97 are susceptible to a classic buffer overflow attack. Denial of service exploit included.
Author:Komrade
Homepage:http://unsecure.altervista.org
File Size:8904
Last Modified:Dec 11 19:19:35 2004
MD5 Checksum:7f450c6c70ab44fd46130137dfaffb1f