what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 50 RSS Feed

Files

0404-exploits.tgz
Posted Jan 2, 2005
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for April, 2004.

tags | exploit
SHA-256 | 742d111c62091254ec064cab105727a130297b31c3e8a6d87832e94e88d4ef34
tcp_reset.c
Posted Apr 28, 2004
Authored by eazy

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.

tags | exploit, tcp, proof of concept
advisories | CVE-2004-0230
SHA-256 | 498554d722ef08c3079f480800919a02ffb8380999bd74b87840cccf1b571e52
RoseAttackv2.txt
Posted Apr 28, 2004
Authored by Chuck

Another program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows
SHA-256 | 1762446df8362dce6e172db2a60b849b2bc2e6fe8d05cc34f85b83cfd3bb51b5
RoseAttackv1.txt
Posted Apr 28, 2004
Authored by Laurent Constantin

Program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows
SHA-256 | 1affe79e6026e065c1e1f74743818f1905a9bd31d0c94f82f8de9b88e54adc91
phpnukeVideo.txt
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

PHP-Nuke Video Gallery Module version 0.1 Beta 5 is susceptible to full path disclosure and SQL injection attacks.

tags | exploit, php, sql injection
SHA-256 | fe3ff118560c7e9a4f76a80601322a0fa94b9f122ffbe84c9212355bc5ab8523
JetRoot_pl.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.

tags | exploit, remote, web, root
systems | linux, windows
SHA-256 | 2313f6c8c3680934ff278d70f97559a0358c9851c286921cd3a616b0ad3e2749
disconn.py
Posted Apr 28, 2004
Authored by Michael Gschwandtner | Site anyplay.tznetz.com

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Python version.

tags | exploit, tcp, proof of concept, python
advisories | CVE-2004-0230
SHA-256 | 80fbb1b75432221e765f2f7267fdcea0bd46642b06db40424528f8dc9503f573
not_so_smartether.txt
Posted Apr 25, 2004
Authored by Kyle Duren

Samsung SmartEther switches allow a remote attacker to login as admin without having a correct password. All that is required is that all of the characters that can fit in the buffer for the password be filled.

tags | exploit, remote
SHA-256 | afe2a7860a1e2e382e42f0ff2b3783ae8f7656865e91fbdfc36859ea6c6103ac
Kreset.pl
Posted Apr 25, 2004
Authored by K-sPecial | Site xzziroz.freeshell.org

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Perl version.

tags | exploit, perl, tcp, proof of concept
advisories | CVE-2004-0230
SHA-256 | 7b8da88a4b120e083cbeadb74aaf609c90eefcbba41d5d768d53613eda9c9800
eXtremail2.c
Posted Apr 25, 2004
Authored by Luca Ercoli | Site seeweb.com

Linux eXtremail versions 1.5.9 and below remote root exploit that makes use of a format string vulnerability in its logging mechanism.

tags | exploit, remote, root
systems | linux
SHA-256 | 6036e06b4c58e55a423903721dd48a2c313b1ab18a6383129e59eff5587ec24e
bgp-dosv2.pl
Posted Apr 24, 2004
Authored by Rich Compton

BGP proof of concept denial of service utility that sends out a RST flood to BGP connection providing the attacker has already gained knowledge of the source port and sequence number.

tags | exploit, denial of service, proof of concept
advisories | CVE-2004-0230
SHA-256 | 75724ddc4871b67567b3d2d9ff51b68836f03a08c024e4bc90e759626c5b7c21
reset-tcp_rfc31337-compliant.c
Posted Apr 23, 2004
Authored by Paul A. Watson | Site terrorist.net

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Some modifications done by J 'Swoop' Barber.

tags | exploit, tcp, proof of concept
advisories | CVE-2004-0230
SHA-256 | 11a7a7653ba15bc40afd9339cc9f0e30434a339fb299c237f1e64007169ff8b5
reset-tcp.c
Posted Apr 23, 2004
Authored by Paul A. Watson | Site terrorist.net

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.

tags | exploit, tcp, proof of concept
advisories | CVE-2004-0230
SHA-256 | 2d800d6c605ec72633700b84acf2706bfd9096969a1bf194fabef7a5ea6a6f69
SCSA028.txt
Posted Apr 22, 2004
Authored by frog-man | Site phpsecure.info

Security Corporation Security Advisory [SCSA-028]: Nuked-KlaN versions b1.4 and b1.5 allows for directory traversal attacks and global variable overwriting.

tags | exploit
SHA-256 | 61a637daf1513ba208db6fc8145428152db635c02705b2f1d85a0fcd7bb18c37
THCIISSLame.c
Posted Apr 22, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

THCIISSLame version 0.2 IIS 5 SSL remote root exploit. Uses a connect back shell.

tags | exploit, remote, shell, root
SHA-256 | 5ad43a71b7b21cf163e484398cd12888807b5ff949adbd1a23b2639a8c2f060f
umodpoc.zip
Posted Apr 22, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for the Unreal engine developed by EpicGames which has a flaw with UMOD where it handles information from files without properly filtering for dangerous characters.

tags | exploit, proof of concept
SHA-256 | acf47cd35c604868941f36761ff485936586e453b380f23a94c790cf4a995f84
waraxe-2004-SA022.txt
Posted Apr 22, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

PostNuke 0.726 Phoenix is susceptible to multiple path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2421cfda93e82828c31ba0e759ac8a875641a6177c67906a0428a997b7c95c75
waraxe-2004-SA021.txt
Posted Apr 22, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

The phprofession 2.5 module for PostNuke is susceptible to path disclose, cross site scripting, and possible SQL injection attacks.

tags | exploit, xss, sql injection
SHA-256 | f1afb06444f45b473086acaefc01e5542aee6857caf546dc7aeb916bde1b06e2
eaea.class.php.txt
Posted Apr 22, 2004
Authored by Yo_Soy | Site raza-mexicana.org

Mambo OS versions 4.5 and 4.6 exploit written in PHP that insets an administrator user into the database.

tags | exploit, php
SHA-256 | a2fc44f4482fa74b878d0564d7eb95973e10a36108e84d5af22116e7d3d80daa
reset.zip
Posted Apr 22, 2004
Authored by Aphex | Site iamaphex.cjb.net

This program will reset a TCP connection by guessing a valid sequence number.

tags | exploit, tcp
advisories | CVE-2004-0230
SHA-256 | ee4592a7693f13a974fc60191dc03c2bacb52cac2c5e420b304e87f7d2855c73
0x3142-sq-chpasswd.c
Posted Apr 20, 2004
Authored by x314

Local root exploit for Squirrelmail's chpasswd utility. Tested on Suse 9. Original bug found by Matias Neiff.

tags | exploit, local, root
systems | linux, suse
SHA-256 | 2b92773c507dec11bb83386fb30b5c4db547be150a75c00aec35583c53feee1b
p_xfree.c
Posted Apr 20, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.

tags | exploit, local, root
SHA-256 | 5f80619f3d14965d61bcf967f0b26ae2e5d1de37280e8076979c4872b7760af0
eudora61.pl
Posted Apr 20, 2004
Authored by Paul Szabo

Eudora 6.1 still has attachment spoofing flaws along with a Nested MIME DoS vulnerability.

tags | exploit, denial of service, spoof
SHA-256 | d3024ea6787aa72ecd301f863e452c672b83f691a325455dd8c7f5b291042e9a
Exch.pl
Posted Apr 19, 2004
Authored by Securma Massine

Kinesphere Corporation Exchange POP3 e-mail gateway remote exploit that makes use of a buffer overflow.

tags | exploit, remote, overflow
SHA-256 | aa21d34e23c056c9250ad35d4abf58eeff4391ebca64ff0ac12966a256d74237
phpBBmod.txt
Posted Apr 19, 2004
Authored by Officerrr

phpBB modified by PRzemo version 1.8 allows for arbitrary code execution due to improper filtering allowing for remote script inclusion.

tags | exploit, remote, arbitrary, code execution
SHA-256 | 8f915afa29d6d3113d81ad61be80a1976bff508961eda81a442555fabb47b0e4
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close