Section:  .. / 0502-exploits  /

Page 1 of 5
<< 1 2 3 4 5 >> Files 1 - 25 of 108
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 0502-exploits.tgz
Description:
Packet Storm new exploits for February, 2005.
File Size:271917
Last Modified:Mar 1 02:30:08 2005
MD5 Checksum:ab1eb6fa04a25b510796e7b6bf18ac72

 ///  File Name: 20050209.MS05009.c
Description:
MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Linux. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.
Author:Atmaca
Homepage:http://www.atmacasoft.com
File Size:4708
Last Modified:Feb 18 05:04:01 2005
MD5 Checksum:681797dd22adfd33ba334cd66679cbb1

 ///  File Name: 20050209.MS05009.windows.c
Description:
MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Windows. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.
Author:Atmaca
Homepage:http://www.atmacasoft.com
File Size:4605
Last Modified:Feb 18 05:11:03 2005
MD5 Checksum:1b8ae93a23416ee35fbca97f3bed227b

 ///  File Name: 3CDaemon.c
Description:
3com 3CDaemon FTP unauthorized USER remote buffer overflow exploit that can bind a shell or reverse a shell back to a listener.
Author:class101
Homepage:http://class101.org/
File Size:26730
Last Modified:Feb 25 09:57:09 2005
MD5 Checksum:c3fed19b473c2219a2699220fa4e4a31

 ///  File Name: 3csploit.c
Description:
3CServer ftp server version 1.1 remote exploit that binds a shell to port 1180.
Author:mandragore
File Size:5856
Last Modified:Feb 22 23:19:39 2005
MD5 Checksum:5fc82b69964f3cc07f192e4fe0aa7cbb

 ///  File Name: a2ps.c
Description:
Local exploit for a2ps. Proof of concept and not setuid by default.
Author:lizard
File Size:2014
Last Modified:Feb 25 09:07:23 2005
MD5 Checksum:410203b0f1ffa3874e26f0f793321f7c

 ///  File Name: adpl33t.txt
Description:
ADP Elite invoice and purchasing systems allow for a user to circumvent their menuing system and drop into a shell.
Author:rootfiend
File Size:1135
Last Modified:Feb 26 00:25:44 2005
MD5 Checksum:5d339d904d508ef5b80004ae8b5874d2

 ///  File Name: advisory001.txt
Description:
A remote attacker can cause register.php punbb version 1.2.1 to execute arbitrary SQL statements by supplying malicious values to the language or email parameters.
Author:John Gumbel
File Size:983
Last Modified:Feb 28 06:49:14 2005
MD5 Checksum:49e3dec810dbe71cfb281699c1269f7d

 ///  File Name: advisory002.txt
Description:
Due to a flaw in punbb version 1.2.1, a remote attacker without an account can set the password of any user on the system to NULL, effectively shutting them out of the system.
Author:John Gumbel
File Size:1841
Last Modified:Feb 28 06:50:51 2005
MD5 Checksum:2fca37c706129ea7a3acd4dc2f838553

 ///  File Name: advisory003.txt
Description:
Improper handling of several arguments in the moderate.php code in punbb version 1.2.1 allows a malicious moderator to inject arbitrary SQL statements.
Author:John Gumbel
File Size:1610
Last Modified:Feb 28 06:52:15 2005
MD5 Checksum:0fa245da1da2ee450650915c291a331a

 ///  File Name: arkeia_type77_macos.pm
Description:
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Mac OSX version.
File Size:2819
Last Modified:Feb 25 09:39:18 2005
MD5 Checksum:e633555df138c51c1585e9108b8fd5e1

 ///  File Name: arkeia_type77_win32.pm
Description:
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Windows version.
Author:H.D. Moore
File Size:3052
Last Modified:Feb 25 09:40:56 2005
MD5 Checksum:9253160b8213ad70e54884cc654bb859

 ///  File Name: arksink2.c
Description:
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE.
File Size:12802
Last Modified:Feb 25 09:59:59 2005
MD5 Checksum:01618af7bd938309c21c07af52130c27

 ///  File Name: atronboom.zip
Description:
Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that causes crashes via big descriptor and claim_id fields.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:atron.txt
File Size:8429
Last Modified:Feb 23 07:41:15 2005
MD5 Checksum:2d83fe876973e70c03608ba6196749d4

 ///  File Name: atronfp.zip
Description:
Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that makes use of a fake players flaw.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:atron.txt
File Size:8334
Last Modified:Feb 23 07:43:20 2005
MD5 Checksum:361d07ec0bc9645b63ad6f3fc7b08fcb

 ///  File Name: avaya.cpp
Description:
Avaya IP Office Phone Manager exploit that attempts to extract sensitive data from the Windows registry.
Author:pagvac
File Size:1680
Last Modified:Feb 26 06:10:46 2005
MD5 Checksum:9666749b62f499e1f04e9084c391876b

 ///  File Name: awstats63.txt
Description:
Successful exploitation of an input validation vulnerability in scripts from AWStats versions 6.3 and below allows attackers to execute limited perl directives under the privileges of the web server and get sensitive information.
Homepage:http://www.ghc.ru
File Size:6421
Last Modified:Feb 24 18:07:37 2005
MD5 Checksum:f532d5ef89ffbf3f65e9587439ab6170

 ///  File Name: badblue.cpp
Description:
BadBlue webserver version 2.55 remote buffer overflow exploit. Tested under Windows 2000 Professional SP3/SP4 Spanish, Windows 2000 Server SP4 Spanish, and Windows XP SP1 Spanish.
Author:Andres Tarasco, Miguel
File Size:9136
Last Modified:Feb 28 07:33:03 2005
MD5 Checksum:5529b72cb5a1e55ee5a545eee55e8adc

 ///  File Name: badblue25.c
Description:
BadBlue webserver version 2.5 is susceptible to a remote buffer overflow vulnerability that allows for code execution. Full exploit provided.
Author:Andres Tarasco, class101
Homepage:http://Hat-Squad.com/
File Size:8310
Last Modified:Feb 28 07:29:16 2005
MD5 Checksum:b199afc5574630ee6ece67c8d1c7d8af

 ///  File Name: BibORB.txt
Description:
BibORB 1.3.2 is susceptible to SQL injection, cross site scripting, directory traversal, and arbitrary file upload vulnerabilities. Detailed exploitation provided.
Author:Patrick Hof
File Size:3003
Related CVE(s):CAN-2005-0251, CAN-2005-0252, CAN-2005-0253, CAN-2005-0254
Last Modified:Feb 25 07:46:50 2005
MD5 Checksum:b5b098e976524c0ef93d06569e9c35ec

 ///  File Name: bontagobof.zip
Description:
Bontago versions 1.1 and below remote exploit that makes use of a buffer overflow when a nickname longer than 512 bytes is sent.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:bontagobof-adv.txt
File Size:6914
Last Modified:Feb 26 01:30:54 2005
MD5 Checksum:fc1431f7ae6fa0b788010eb29472e4f7

 ///  File Name: brightstor.c
Description:
The CA BrightStor ArcServe Discovery Service overflow exploit takes advantage of a vulnerability in the CA BrightStor Discovery Service which occurs when a large request is sent to UDP port 41524, triggering a stack overflow.
Author:Thor Doomen
File Size:2385
Related CVE(s):CAN-2005-0260
Last Modified:Feb 18 07:29:04 2005
MD5 Checksum:2a8650b78261f7d78d054919e396b362

 ///  File Name: BrightStor.c
Description:
BrightStor ARCserve Backup buffer overflow proof of concept exploit.
Author:cybertronic
Related File:02.10.05-4.txt
File Size:2303
Last Modified:Feb 23 20:37:32 2005
MD5 Checksum:fd47a0f95d693b73cdbfff072b6324bf

 ///  File Name: bxcp0297.txt
Description:
A lack of validation in BXCP 0.2.9.7 scripts allow for local php file inclusion and path disclosure.
Homepage:http://www.ofb-clan.de/
File Size:2243
Last Modified:Feb 22 22:02:02 2005
MD5 Checksum:f210a4663f728f759172302442fbe733

 ///  File Name: cabrightstor_disco.pm
Description:
The CA BrightStor Discovery Service overflow exploit is a perl module exploits a vulnerability in the CA BrightStor Discovery Service which occurs when a large request is sent to UDP port 41524, triggering a stack overflow. Targets include Win32, win2000, winxp, and win2003. More information available here.
Author:Thoor Doomen
File Size:3715
Related CVE(s):CAN-2005-0260
Last Modified:Feb 18 07:18:59 2005
MD5 Checksum:b2bd9b3e6cf0a59af941b2e26e28e90a