Section:  .. / 0503-exploits  /

Page 1 of 6
<< 1 2 3 4 5 6 >> Files 1 - 25 of 142
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0503-exploits.tgz
Description:
Unavailable.
File Size:458184
Last Modified:Apr 14 07:15:26 2005
MD5 Checksum:24168bc14d84a4ab06a56a2778d222ec

 ///  File Name: Attack_5250_terminal_em.pdf
Description:
Attacking PC based 5250 terminal emulations from an iSeries server. Paper describing how insertion of commands inside an AS/400 application allows them to be executed as a command on the connected PC.
Author:Shalom Carmel
File Size:244309
Last Modified:Mar 24 07:06:05 2005
MD5 Checksum:aa3631c9ab82c8e8bbbb04089d368f08

 ///  File Name: phpbbexp.cpp
Description:
phpBB 2.0.12 admin_styles remote code injection exploit that shuffles back a shell.
Author:Malloc
Homepage:http://overdose.tcpteam.org/
File Size:20866
Last Modified:Mar 19 20:18:44 2005
MD5 Checksum:b40b363e8e37d46b805b7fbc59690447

 ///  File Name: ethereal-3g-a11.c
Description:
Ethereal 0.10.9 and below proof of concept remote root exploit that makes use of the CDMA2000 A11 protocol dissector stack overflow vulnerability.
Author:Diego Giagio
Related File:LSS-2005-03-04.txt
File Size:15760
Last Modified:Mar 17 08:49:01 2005
MD5 Checksum:5c468892fb19345852d7d2c6bf2ed0dd

 ///  File Name: unrealmagic.c
Description:
Cyrus IMAPd versions 2.2.4 through 2.2.8 remote exploit. Original flaw discovered by Stefan Esser.
Author:crash-x
Homepage:http://www.unl0ck.org/
File Size:12728
Related CVE(s):CAN-2004-1011, CAN-2004-1012, CAN-2004-1013
Last Modified:Mar 30 11:22:01 2005
MD5 Checksum:b925255b5f9ec763597486c1d7614a73

 ///  File Name: pwned.c
Description:
Local sys_uselib root exploit for the Linux 2.4 and 2.6 kernel series.
Author:sd
File Size:12653
Last Modified:Mar 22 17:08:32 2005
MD5 Checksum:61f5fec50d826adbfbbaa9de94068172

 ///  File Name: 101_SentLM.cpp
Description:
Sentinel License Manager version 7.2.0.2 exploit that makes use of stack overflow in the License service on UDP 5093.
Author:class101
Homepage:http://www.hat-squad.com/
Related File:sentinel7202.txt
File Size:12238
Last Modified:Mar 17 08:06:10 2005
MD5 Checksum:537bb287afdded57683f1d71fe7707af

 ///  File Name: goodtech.c
Description:
Remote exploit for GoodTech Telnet server versions below 5.0.7. This exploit can spawn a bindshell or launch a reverse shell.
Author:cybertronic
Related File:goodtechtelnet.txt
File Size:11456
Last Modified:Mar 22 06:46:06 2005
MD5 Checksum:59fd49d039156fcef30e5d275ee11a61

 ///  File Name: tripodXSS.txt
Description:
Tripod.com suffers from multiple cross site scripting flaws.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:10841
Last Modified:Mar 30 11:00:06 2005
MD5 Checksum:871f583080aca0b5d0f100628625877b

 ///  File Name: tincat2bof.zip
Description:
Proof of concept exploit for a remotely exploitable buffer overflow in the Tincat network library used in various games.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:tincat2bof.txt
File Size:10775
Last Modified:Mar 29 07:07:35 2005
MD5 Checksum:e35a68e27f1cc93387ac11089310ac07

 ///  File Name: p_wu.c
Description:
Exploit for wu-ftpd that makes use of the globbing denial of service flaw.
Author:pi3
Homepage:http://www.pi3.int.pl
File Size:10040
Last Modified:Mar 3 21:11:39 2005
MD5 Checksum:074375ec147f3f0171a811c271fa1758

 ///  File Name: exp2.php.txt
Description:
Proof of concept exploit that makes use of a library injection flaw in MySQL via the CREATE function. Version 4.1.10 and versions below and equal to 4.0.23 are affected.
Author:Stefano Di Paola
Homepage:http://www.wisec.it
Related File:mysqlCreateinject.txt
File Size:10023
Last Modified:Mar 15 16:28:45 2005
MD5 Checksum:0d778bbae9d865a9ba85379b9ed620fe

 ///  File Name: photopost50rc3.txt
Description:
PhotoPost 5.0RC3 is susceptible to SQL injection, arbitrary file upload, cross site scripting, and various manipulation flaws.
Author:Igor Franchuk
File Size:9568
Last Modified:Mar 15 16:42:40 2005
MD5 Checksum:f0f5aae8beaa16c5547ce21650869b4d

 ///  File Name: 101_cali.c
Description:
This exploit takes advantage of a stack overflow vulnerability in the CA License Server network service. Versions 1.61 and below are susceptible.
Author:class101
Homepage:http://class101.org
File Size:9525
Related CVE(s):CAN-2005-0581
Last Modified:Mar 12 14:44:24 2005
MD5 Checksum:1c41bb753f9fbfaceacd948f79cb654b

 ///  File Name: scrapboom.zip
Description:
Remote proof of concept exploit Scrapland versions 1.0 and below which suffer from a flaw where the server terminates prematurely when it errors.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:scrapboom.txt
File Size:8623
Last Modified:Mar 1 22:35:34 2005
MD5 Checksum:15689dd060b38e91833b0ed67ab7b03d

 ///  File Name: foxmail.txt
Description:
Foxmail server version 2.0 is susceptible to a boundary error condition in the handling of the USER command. Sample denial of service exploit provided.
Author:xouyang
File Size:8609
Last Modified:Mar 3 08:49:50 2005
MD5 Checksum:e8be228510f7c2585b6b62df01a61343

 ///  File Name: ca3dex.zip
Description:
Proof of concept exploit for Carsten's 3D Engine which suffers from a format string vulnerability allowing an attacker to execute remote code.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:ca3dex-adv.txt
File Size:8465
Last Modified:Mar 4 22:00:36 2005
MD5 Checksum:ca97dd0456a07e892943832667a928d3

 ///  File Name: squirrelSQL.txt
Description:
Squirrelcast PHP Shopping Cast is susceptible to SQL injection attacks. Sample exploitation details provided.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com
File Size:8426
Last Modified:Mar 30 11:45:25 2005
MD5 Checksum:568ffebf08ecc4d9abd2b3b1a6c4b296

 ///  File Name: krad.c
Description:
Local exploit for linux 2.6.11 and below. Kernel memory can be overwritten because of an integer overflow in sys_epoll_wait, and "misuse of __put_user in ep_send events".
Homepage:http://www.hysteria.sk/
File Size:8163
Last Modified:Mar 22 02:18:14 2005
MD5 Checksum:9c7322258789e9090b4be1bad608d58c

 ///  File Name: CProxyRemote.txt
Description:
Computalynx CProxy versions 3.3.x and 3.4.x are susceptible to denial of service and directory traversal attacks. Detailed exploitation provided.
Author:Kristof Philipsen
Homepage:http://www.ubizen.com
File Size:7683
Last Modified:Mar 3 09:09:48 2005
MD5 Checksum:05b98151b8be9c8567463fcbb2759c40

 ///  File Name: advRX250305.txt
Description:
OpenMosixView versions 1.5 and below are susceptible to multiple race conditions that allow for local filesystem compromise. Exploit provided.
Author:Gangstuck, Psirac
Homepage:http://www.rexotec.com/
File Size:7657
Last Modified:Mar 25 21:38:31 2005
MD5 Checksum:eba76616efb2ea4e09947708e43bc2e6

 ///  File Name: ZH2005-02SA.txt
Description:
Wine versions 2005021 and below are susceptible to an insecure /tmp file creation flaw.
Author:Giovanni Delvecchio
Homepage:http://www.zone-h.org/
File Size:7210
Last Modified:Mar 17 08:55:32 2005
MD5 Checksum:a6f69551c8e506eca50105a6e0c2ff44

 ///  File Name: timbuktu_userbrute.c
Description:
Timbuktu Pro Remote Control user enumeration program. Wordlist-based bruteforce tool that checks whether a given username exists on the target server or not, which is possible due to a difference in the error message returned when the username is invalid versus when the password is invalid.
Author:Conehead
File Size:6971
Last Modified:Mar 28 12:27:28 2005
MD5 Checksum:160f3e45e55a5354c371fafb59082f05

 ///  File Name: 0x666-ftpd.c
Description:
mtftp versions 0.0.3 and below remote root exploit.
Author:darkeagle
Homepage:http://www.unl0ck.org/
File Size:6860
Last Modified:Mar 30 11:18:35 2005
MD5 Checksum:3157bcd0790a55cc79fa53c28ebd5220

 ///  File Name: phpBB2012session.txt
Description:
phpBB 2.0.12 session handling exploit that allows for administrative compromise.
Author:PPC
File Size:6795
Last Modified:Mar 12 14:18:20 2005
MD5 Checksum:b5fac8b0f1a6f8e4e7a195394cc3dd5d