Section:  .. / 0504-exploits  /

Page 1 of 6
<< 1 2 3 4 5 6 >> Files 1 - 25 of 138
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0504-exploits.tgz
Description:
Packet Storm new exploits for April, 2005.
File Size:246342
Last Modified:Jul 8 09:54:20 2005
MD5 Checksum:20974c518b655fc32f5d889b2b1867c9

 ///  File Name: MSHTA_POC.c
Description:
Proof-of-Concept code to generate a file with an embedded CLSID, demonstrating how the issues detailed in the iDEFENSE "MSHTA" advisory, MS05-016, and other places, can be exploited.
Author:zwell
Related File:04.12.05d.txt
File Size:67444
Related OSVDB(s):15469
Related CVE(s):CAN-2005-0063
Last Modified:Apr 19 21:19:14 2005
MD5 Checksum:66526ae9cf6d8807e20d726865c4e389

 ///  File Name: duportal1.txt
Description:
DUportal Pro 3.4 suffers from numerous SQL injection flaws.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:58476
Last Modified:Jun 1 06:51:31 2005
MD5 Checksum:af3489ff2c839e3ff60e39c7eacd88f0

 ///  File Name: sumus_exploit.txt
Description:
Sumus, a Internet-based cardgame program, is vulnerable to a stack-based buffer-overflow in the server component.
File Size:16065
Last Modified:Apr 21 00:11:09 2005
MD5 Checksum:eaf54b1362348681b9d86ec29f77a1ca

 ///  File Name: duportal2.txt
Description:
DUportal 3.1.2 suffers from numerous SQL injection flaws.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:15139
Last Modified:Jun 1 06:52:12 2005
MD5 Checksum:0bdb92d01dacd0f41a5d94fdd1089813

 ///  File Name: netv-remhbof.c
Description:
BakBone NetVault versions 6.x and 7.x remote heap buffer overflow exploit. Binds a shell to port 101 and can also shuffle a reverse shell back.
Author:class101
Homepage:http://www.hat-squad.com/
Related File:bakboneOverflows.txt
File Size:15104
Last Modified:Apr 14 09:36:39 2005
MD5 Checksum:85a5a5f0dc7a870e723ef858c4841141

 ///  File Name: Snmppd.c
Description:
Snmppd SNMP proxy daemon remote format string exploit.
Author:cybertronic
Related File:snmppd_dos.txt
File Size:13662
Last Modified:May 27 06:00:10 2005
MD5 Checksum:7af8b2402d062b2c7f1e0e92eeb2b271

 ///  File Name: activeAuction.txt
Description:
Active Auction House suffers from multiple SQL injection and cross site scripting vulnerabilities.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:13417
Last Modified:Apr 17 20:10:49 2005
MD5 Checksum:f5ced6df3754921627785603cd23ca58

 ///  File Name: msjet101.c
Description:
This is a slightly modified version of Stuart Pearson's original exploit for the malformed MDB parsing vulnerabilities in Microsoft Access.
Author:Nanika
Homepage:http://www.chroot.org
Related File:msjet40.txt
File Size:13214
Related OSVDB(s):15187
Last Modified:Apr 19 21:14:31 2005
MD5 Checksum:58309d996a709cef628983b1a7fb353a

 ///  File Name: msjet40.txt
Description:
Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll.
Author:Tal Zeltzer
Homepage:http://www.see-security.com
File Size:13106
Last Modified:Apr 19 08:47:28 2005
MD5 Checksum:8fbfb0d2fde9b9855da7d5229ae5341b

 ///  File Name: HOD-icmp-attacks-poc.c
Description:
A denial of service vulnerability exists that could allow an attacker to send a specially crafted Internet Control Message Protocol (ICMP) message to an affected system. An attacker who successfully exploited this vulnerability could cause the affected system to reset existing TCP connections, reduce the throughput in existing TCP connections, or consume large amounts of CPU and memory resources. This exploit affects various Cisco, AIX, and Windows versions.
Author:houseofdabus
File Size:12651
Related CVE(s):CAN-2004-0790, CAN-2004-0791, CAN-2004-1060
Last Modified:Jun 1 06:54:46 2005
MD5 Checksum:8df0f9c74acb8a8d29a58b43f64a062c

 ///  File Name: 101_WINS.cpp
Description:
Remote heap buffer overflow exploit for the Microsoft Windows Internet Name Service. Tested against Win2k SP4 Advanced Server English. This exploit can bind a shell to port 101 or will reverse a cmd shell back to a listener.
Author:class101
Homepage:http://www.hat-squad.com/
File Size:12044
Last Modified:Apr 18 22:45:38 2005
MD5 Checksum:b08e8dd6c1b44ec43827c25a4d9c7598

 ///  File Name: PHPNuke76wl.txt
Description:
PHPNuke 7.6 is susceptible to multiple SQL injection vulnerabilities in the Web_Links module cXIb803.14.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com
File Size:11851
Last Modified:Apr 17 21:33:14 2005
MD5 Checksum:bdd5e09df50584c825c0b69ff51bf2b1

 ///  File Name: msjet.c
Description:
Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll. Tested against Windows 2000 SP4, Windows XP SP0 and SP1.
Author:Stuart Pearson
Homepage:http://www.computerterrorism.com
File Size:11452
Last Modified:Apr 18 08:35:06 2005
MD5 Checksum:663c2608a9a6f30d1df12e35b9fa6c34

 ///  File Name: dc_phpbb_xss_sql.txt
Description:
Multiple SQL injection and Cross-site Scripting issues in phpBB versions 1.52 and below. Example exloit URLs included in advisory.
Author:Diabolic Crab
Homepage:http://digitalparadox.org/
File Size:11201
Last Modified:Apr 19 22:03:07 2005
MD5 Checksum:dce346b3035978e6fc023bea3968340f

 ///  File Name: yager524.txt
Description:
Yager versions 5.24 and below remote buffer overflow exploit.
Author:cybertronic
File Size:11068
Last Modified:May 27 05:12:13 2005
MD5 Checksum:c6e8301ac079758cc358cddccdcf96d8

 ///  File Name: x0n3-h4ck_MailEnable_Imapd.c
Description:
MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.
Author:Expanders, CorryL
Homepage:http://www.x0n3-h4ck.org/
File Size:10809
Related OSVDB(s):15231
Last Modified:Apr 17 20:18:36 2005
MD5 Checksum:e464b98e77727cbd391a46b4ba4281f2

 ///  File Name: 0x82-meOw_linuxer_forever.c
Description:
GLD 1.4 remote overflow format string exploit that binds a shell to port 36864.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org
Related File:2005-0x82-026.txt
File Size:10620
Last Modified:Apr 18 10:28:04 2005
MD5 Checksum:e55ef2d56dc9463377fb00e6f3cac699

 ///  File Name: xtcpdump-bgp-dos.c
Description:
Tcpdump v3.8.x and below remote denial of service exploit which causes tcpdump to go into an infinite loop when it processes an evil BGP packet. Works if TCP port 179 is not filtered.
Author:vade79
Homepage:http://fakehalo.us/
File Size:9854
Last Modified:Apr 27 09:04:44 2005
MD5 Checksum:7910a287be1c5dc61afe4be886bba8be

 ///  File Name: clarolineVulns.txt
Description:
Multiple Cross site scripting, 10 SQL injection, 7 directory traversal and 4 remote file inclusion vulnerabilities have been found in Claroline versions 1.6 and below.
Homepage:http://fr.zone-h.org
File Size:9125
Last Modified:Jun 23 10:35:13 2005
MD5 Checksum:8e29ee128704bd3e0dffcb7734264b9e

 ///  File Name: mxXSSnSQL.txt
Description:
MX Shop 1.1.1 and MX Kart 1.1.2 are vulnerable to multiple SQL injection vulnerabilities.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:8828
Last Modified:Apr 14 08:30:17 2005
MD5 Checksum:c023423bd52fde7f1ab07565977c9d09

 ///  File Name: MaxDB750023.c
Description:
MySQL MaxDB Webtool versions 7.5.00.23 and below remote stack overflow exploit.
Author:cybertronic
File Size:8737
Last Modified:May 27 05:18:47 2005
MD5 Checksum:cd4e3524d325145e70af818295bd7afd

 ///  File Name: RatBof.cpp
Description:
Internet Explorer content advisor exploit that is related to MS05-020.
Author:Andres Tarasco, Miguel Tarasco Acuna
Homepage:http://www.haxorcitos.com/
File Size:8679
Last Modified:May 27 05:16:33 2005
MD5 Checksum:cf0ff753894931c20f3c60077a8bcacf

 ///  File Name: ie6fire.txt
Description:
Local file disclosure flaw that affects both Firefox and IE6. Sample exploitation provided.
Author:bitlance winter
File Size:8589
Last Modified:Jun 1 06:48:39 2005
MD5 Checksum:ae5698b5f8bf36f5f5c594c4595d09ff

 ///  File Name: exp_netftpd.py
Description:
Net-ftpd 4.2.2 user authentication buffer overflow exploit.
Author:Sergio Alvarez
File Size:8257
Last Modified:Jun 16 08:25:02 2005
MD5 Checksum:f03148bb367c463de2314565a133e725