Section:  .. / 0411-exploits  /

Page 1 of 4
<< 1 2 3 4 >> Files 1 - 25 of 77
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0411-exploits.tgz
Description:
Packet Storm new exploits for November, 2004.
File Size:229933
Last Modified:Jan 2 22:02:50 2005
MD5 Checksum:3fb9ef413eed6565c35700d6937a1ff3

 ///  File Name: swbfp.zip
Description:
Remote test exploit for Star Wars Battlefront versions 1.11 and below that checks for buffer overflow and memory access flaws.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:swbfp.txt
File Size:20635
Last Modified:Dec 11 20:52:13 2004
MD5 Checksum:87011dbb3c49943fe2adbe77eb7ab5b5

 ///  File Name: atari800.txt
Description:
Exploit for the Atari800 atari emulator. Allows for local privilege escalation to root six different ways.
Author:Adam Zabrocki
Homepage:http://www.pi3.int.pl
File Size:16729
Last Modified:Dec 11 21:04:51 2004
MD5 Checksum:ed16586d6fb2d85c7c96dabf3e66909f

 ///  File Name: binfmt_elf.txt
Description:
Five different flaws have been identified in the Linux ELF binary loader. Exploit included core dumps a non-readable but executable ELF file.
Author:Paul Starzetz
File Size:13503
Last Modified:Nov 12 04:57:59 2004
MD5 Checksum:89d38e2fe7148d28370803dcceda7a1d

 ///  File Name: HOD-kerio-firewall-DoS-expl.c
Description:
Denial of service exploit for Kerio Personal Firewall version 4.1.1 and below. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet.
Author:houseofdabus
Related File:eEye.kerio.txt
File Size:11858
Last Modified:Nov 12 21:39:21 2004
MD5 Checksum:2155470b61ae00f217da31c8c79a9285

 ///  File Name: coffeecupbof.txt
Description:
CoffeeCup Direct FTP 6.2.0.62 and CoffeeCup Free FTP 3.0.0.10 both suffer from an overflow that allows for arbitrary code execution. Exploit included that spawns a shell on port 5555.
Author:Komrade
Homepage:http://unsecure.altervista.org
File Size:11433
Last Modified:Dec 11 19:22:06 2004
MD5 Checksum:0e0db67aab85ed49f32a9859c5300151

 ///  File Name: proz_ex.c
Description:
Prozilla-1.3.6 remote client side stack overflow exploit, tested against current Gentoo, slackware, Debian, and suse.
Author:Serkan Akpolat
Homepage:http://deicide.siyahsapka.org
File Size:10859
Last Modified:Nov 24 05:23:06 2004
MD5 Checksum:9a0268a366aa17a0540e97e9a3beee8c

 ///  File Name: zipbrk.zip
Description:
This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.
Author:oc.192
File Size:10847
Related CVE(s):CAN-2004-0932, CAN-2004-0937
Last Modified:Nov 20 20:01:01 2004
MD5 Checksum:42e2e861784ebb52460984f688aed1ad

 ///  File Name: qwik_fmtstr_xpl.c
Description:
qwik_smtpd remote root format string exploit.
Author:Carlos Barros
Homepage:http://www.barrossecurity.com
File Size:10227
Last Modified:Nov 10 07:47:34 2004
MD5 Checksum:7f49b64e48f0b748c872b5bfcf26825d

 ///  File Name: sof2boom.zip
Description:
Remote proof of concept exploit for Soldier of Fortune II versions 1.0.3 gold and below that suffer from a typical sprintf() overflow.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:sof2boom.txt
File Size:10157
Last Modified:Dec 11 19:55:47 2004
MD5 Checksum:cc8c46b475c92d775136290efc2c773e

 ///  File Name: 101_slim.cpp
Description:
Remote buffer overflow exploit for SlimFTPd versions 3.15 and below. Binds a shell to port 101.
Author:class101
File Size:9879
Last Modified:Nov 12 05:06:30 2004
MD5 Checksum:3bd529c381a9d88fc5ed46d54c552c88

 ///  File Name: ZipMe!.cpp
Description:
Microsoft Windows Vulnerability in Compressed (zipped) Folders (MS04-034) proof of concept exploit. Tested on Windows XP SP0 Spanish and English. More information available here.
Author:Takaro
Homepage:http://Haxorcitos.com
File Size:9697
Last Modified:Nov 19 09:07:04 2004
MD5 Checksum:b46769dec05e15ac32380061ff02f09a

 ///  File Name: ssfakep.zip
Description:
Remote denial of service exploit for games using the Serious engine. Generates UDP packets that have fake players enter a room. The system fails to limit the amount of users that can enter.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:ssfakep.txt
File Size:9644
Last Modified:Dec 11 23:40:25 2004
MD5 Checksum:0ad8fba41b88800236ee2330ecee1271

 ///  File Name: orbzbof.zip
Description:
Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:orbzbof.txt
File Size:8963
Last Modified:Dec 12 00:17:42 2004
MD5 Checksum:a35a9e2f70a3186a2be48a01942794d8

 ///  File Name: wodftpcrash.txt
Description:
WodFtpDLX versions below 2.3.2.97 are susceptible to a classic buffer overflow attack. Denial of service exploit included.
Author:Komrade
Homepage:http://unsecure.altervista.org
File Size:8904
Last Modified:Dec 11 19:19:35 2004
MD5 Checksum:7f450c6c70ab44fd46130137dfaffb1f

 ///  File Name: 101_mini.cpp
Description:
Minishare versions 1.4.1 and below remote buffer overflow exploit that binds a shell to port 101.
Author:class101
File Size:8268
Last Modified:Nov 10 07:31:50 2004
MD5 Checksum:470aaf255d5cecbac310c94088f9fe4f

 ///  File Name: 602res.zip
Description:
Test exploit for 602 Lan Suite versions 2004.0.04.0909 and below which are susceptible to resource consumption and socket consumption attacks.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:602Lansuite.txt
File Size:8248
Last Modified:Nov 10 07:27:29 2004
MD5 Checksum:083477b9aed0b9ad0220f4e3ab66310d

 ///  File Name: phpnolimit.c
Description:
Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.
Author:Gyan Chawdhary
Related File:php_memory_limit_remote.txt
File Size:8196
Related CVE(s):CAN-2004-0594
Last Modified:Dec 11 22:49:10 2004
MD5 Checksum:7aadceaf9298a2f92f0e123e7baaf4af

 ///  File Name: halocboom.zip
Description:
Halo: Combat Evolved versions 1.05 and below remote denial of service exploit.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:halocboom.txt
File Size:8162
Last Modified:Dec 11 19:27:25 2004
MD5 Checksum:5257b93c92f2170e0d3e1cce4033571b

 ///  File Name: janados.zip
Description:
Remote denial of service exploit for Jana server 2 versions 2.4.4 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:janados.txt
File Size:7850
Last Modified:Dec 12 00:34:07 2004
MD5 Checksum:22ecc84b906bffd5bc9d5d101be7570f

 ///  File Name: icewarpWebmail528.txt
Description:
Merak Mail Server 7.5.2 with Icewarp Web Mail 5.2.8 is susceptible to various file maniuplation and cross site scripting flaws. Version 7.6.0 with Icewarp 5.3.0 is susceptible to two of these flaws.
Author:ShineShadow
File Size:7420
Last Modified:Nov 10 07:10:03 2004
MD5 Checksum:dd067576d99f6064b1f74c3ea4eab194

 ///  File Name: 000102advisory.txt
Description:
MailEnable Professional Edition version 1.52 and MailEnable Enterprise Edition version 1.01 both suffer from a remote buffer overflow in their IMAP service. Full exploit included.
Author:Nima Majidi, idespinner, class101
Homepage:http://www.hat-squad.com/
File Size:7305
Last Modified:Dec 11 22:51:22 2004
MD5 Checksum:102445417417101b51b8c9f52b3d0bd8

 ///  File Name: tweaky.pl
Description:
TWiki Release 01-Feb-2003 and below remote code execution exploit in perl.
Author:Roman Medina-Heigl Hernandez aka RoMaNSoFt
Homepage:http://www.rs-labs.com
File Size:6620
Related CVE(s):CAN-2004-1037
Last Modified:Nov 20 21:52:55 2004
MD5 Checksum:b739c6999441255807941107c5a1e500

 ///  File Name: nsg-advisory-08.txt
Description:
TipxD versions 1.1.1 and below suffer from a local format string vulnerability. Proof of concept local exploit included.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:6557
Last Modified:Nov 20 22:03:02 2004
MD5 Checksum:f59247ae7c9a0aee1868abb9434094bc

 ///  File Name: ex_MERCURY.c
Description:
Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.
Author:John H.
File Size:6470
Last Modified:Dec 12 00:26:19 2004
MD5 Checksum:df3670644acf63435dd9a77c428eb3cf