Section:  .. / 0502-exploits  /

Page 1 of 5
<< 1 2 3 4 5 >> Files 1 - 25 of 108
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0502-exploits.tgz
Description:
Packet Storm new exploits for February, 2005.
File Size:271917
Last Modified:Mar 1 02:30:08 2005
MD5 Checksum:ab1eb6fa04a25b510796e7b6bf18ac72

 ///  File Name: elog_unix_win.c
Description:
ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat.
File Size:45943
Last Modified:Feb 23 06:39:59 2005
MD5 Checksum:5c049a4b66bdbcb76ddfbd9a81fce48c

 ///  File Name: 3CDaemon.c
Description:
3com 3CDaemon FTP unauthorized USER remote buffer overflow exploit that can bind a shell or reverse a shell back to a listener.
Author:class101
Homepage:http://class101.org/
File Size:26730
Last Modified:Feb 25 09:57:09 2005
MD5 Checksum:c3fed19b473c2219a2699220fa4e4a31

 ///  File Name: XSS-Proxy_0_0_11.pl
Description:
This script is an XSS attack controller which allows an attacker to force a victim to read pages off a XSS vulnerable server and relay contents back to this controller. This process also provides client with new script commands.
Author:Anton Rager
File Size:19523
Last Modified:Feb 18 08:12:49 2005
MD5 Checksum:ba0be2050a128c0a827628b9f3422076

 ///  File Name: sof2guidboom.zip
Description:
Proof of concept exploit for a denial of service flaw in Soldier of Fortune II versions 1.03 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:sof2guidboom.txt
File Size:16723
Last Modified:Feb 26 20:23:35 2005
MD5 Checksum:6b5ce84269c5f3dbf5a53e46c70a1a33

 ///  File Name: prozillaFormatString.c
Description:
Prozilla versions 1.3.7.3 and below format string exploit.
Author:Deicide from ElectronicSouls
File Size:13962
Last Modified:Feb 23 06:06:31 2005
MD5 Checksum:f923bc57501752fd758799055979f14f

 ///  File Name: ngircd_fsexp.c
Description:
Remote root format string exploit for ngIRCd versions 0.8.2 and below.
Author:CoKi
Homepage:http://www.nosystem.com.ar/
Related File:nsg-advisory-11.txt
File Size:13396
Last Modified:Feb 3 08:48:05 2005
MD5 Checksum:563de766ee162bd858177621dfe86665

 ///  File Name: arksink2.c
Description:
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE.
File Size:12802
Last Modified:Feb 25 09:59:59 2005
MD5 Checksum:01618af7bd938309c21c07af52130c27

 ///  File Name: cfengineRSA.c
Description:
cfengine RSA remote heap overflow exploit.
Author:jsk
File Size:12673
Last Modified:Feb 25 10:02:17 2005
MD5 Checksum:fd09b537a45ba6641e6050125c466781

 ///  File Name: painkkeybof.zip
Description:
Proof of concept exploit for Painkiller versions 1.35 and below which suffer from a buffer overflow overflow vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:painkkeybof.txt
File Size:12101
Last Modified:Feb 3 08:30:55 2005
MD5 Checksum:82addf6b1738140c5d9c6c64efd9c787

 ///  File Name: exwormshoutcast.c
Description:
SHOUTcast version 1.9.4 remote exploit. Tested on RedHat 90 and Fedora 1. Has connectback shellcode.
Author:exworm
File Size:11683
Last Modified:Feb 26 00:15:33 2005
MD5 Checksum:b7b06a33c0c111aef84cecd419d8fbc6

 ///  File Name: tcambof.zip
Description:
TrackerCam versions 5.12 and below remote buffer overflow exploit.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:tcambof.txt"
File Size:9817
Last Modified:Feb 25 23:49:01 2005
MD5 Checksum:001ec622d3dd7a4d4b2ceed5d1f0ba16

 ///  File Name: q3infoboom.zip
Description:
Proof of concept exploit for the Quake 3 engine making use of a flaw in the handling of big queries.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:q3infoboom.txt
File Size:9140
Last Modified:Feb 24 17:57:43 2005
MD5 Checksum:523c4fb6813b8d3288626d5713906bb9

 ///  File Name: badblue.cpp
Description:
BadBlue webserver version 2.55 remote buffer overflow exploit. Tested under Windows 2000 Professional SP3/SP4 Spanish, Windows 2000 Server SP4 Spanish, and Windows XP SP1 Spanish.
Author:Andres Tarasco, Miguel
File Size:9136
Last Modified:Feb 28 07:33:03 2005
MD5 Checksum:5529b72cb5a1e55ee5a545eee55e8adc

 ///  File Name: xprallyboom.zip
Description:
Remote denial of service exploit for Xpand Rally version 1.0.0.0 that makes use of a crash due to reading and writing on unallocated memory.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:xprallyboom.txt
File Size:8475
Last Modified:Feb 1 07:34:05 2005
MD5 Checksum:363db396f75138381f0d85aca3a47ef8

 ///  File Name: atronboom.zip
Description:
Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that causes crashes via big descriptor and claim_id fields.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:atron.txt
File Size:8429
Last Modified:Feb 23 07:41:15 2005
MD5 Checksum:2d83fe876973e70c03608ba6196749d4

 ///  File Name: atronfp.zip
Description:
Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that makes use of a fake players flaw.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:atron.txt
File Size:8334
Last Modified:Feb 23 07:43:20 2005
MD5 Checksum:361d07ec0bc9645b63ad6f3fc7b08fcb

 ///  File Name: badblue25.c
Description:
BadBlue webserver version 2.5 is susceptible to a remote buffer overflow vulnerability that allows for code execution. Full exploit provided.
Author:Andres Tarasco, class101
Homepage:http://Hat-Squad.com/
File Size:8310
Last Modified:Feb 28 07:29:16 2005
MD5 Checksum:b199afc5574630ee6ece67c8d1c7d8af

 ///  File Name: x_osh.pl
Description:
Operator Shell (osh) 1.7-12 local root exploit.
Author:Charles Stevenson aka core
File Size:7879
Last Modified:Feb 6 06:09:47 2005
MD5 Checksum:9b4e98143d6e94b1594d38293eede9a3

 ///  File Name: ecl-eximspa.c
Description:
Exim <= 4.4.3 exploit for the SPA authentication vulnerability. Takes advantage of the spa_base64_to_bits() call.
Author:Yuri Gushin
File Size:7684
Last Modified:Feb 18 06:15:18 2005
MD5 Checksum:f69c4523245f9862570d6f589b1eeb95

 ///  File Name: newspost.c
Description:
Newspost socket_getline() remote buffer overflow exploit.
Author:Cybertronic
Related File:glsa-200502-05.txt
File Size:7411
Last Modified:Feb 5 22:08:05 2005
MD5 Checksum:705f81e1d60d03b4620552a880e93804

 ///  File Name: bontagobof.zip
Description:
Bontago versions 1.1 and below remote exploit that makes use of a buffer overflow when a nickname longer than 512 bytes is sent.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:bontagobof-adv.txt
File Size:6914
Last Modified:Feb 26 01:30:54 2005
MD5 Checksum:fc1431f7ae6fa0b788010eb29472e4f7

 ///  File Name: awstats63.txt
Description:
Successful exploitation of an input validation vulnerability in scripts from AWStats versions 6.3 and below allows attackers to execute limited perl directives under the privileges of the web server and get sensitive information.
Homepage:http://www.ghc.ru
File Size:6421
Last Modified:Feb 24 18:07:37 2005
MD5 Checksum:f532d5ef89ffbf3f65e9587439ab6170

 ///  File Name: sileAWSxpl_v5.7-6.2.c
Description:
Remote pluginmode command execution exploit for AWStats versions 5.7 through 6.2.
Author:Silentium
Homepage:http://www.autistici.org/anacron-group-italy
File Size:6415
Last Modified:Feb 26 06:14:15 2005
MD5 Checksum:a3c1e41a10460242dd78ea43169acc88

 ///  File Name: shoutcastPoC.c
Description:
Proof of concept exploit for the Nullsoft SHOUTcast 1.9.4 File Request format string vulnerability.
Author:mandragore, Tomasz Trojanowski
File Size:6282
Last Modified:Feb 25 09:27:40 2005
MD5 Checksum:1cb6880586a6c02de8cb5a1ee8c24c4c