exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 76 RSS Feed

Files

0411-exploits.tgz
Posted Jan 2, 2005
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for November, 2004.

tags | exploit
SHA-256 | 21544ae105ed5cb283e29d421cc87574a1d6adaccea11dc9f8f02d99c852662d
janados.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for Jana server 2 versions 2.4.4 and below.

tags | exploit, remote, denial of service
SHA-256 | a53eb7696fdc2332399b894e113d5bfe7a6f8f00ef949e0c5bdba3fc6cffd92f
ex_MERCURY.c
Posted Dec 11, 2004
Authored by John H.

Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.

tags | exploit, remote, overflow, imap
SHA-256 | 1992e2ec6ee91bec2e209f5d8942e15e93e225cd81bc0a56fc5540e11094d323
mercury.c
Posted Dec 11, 2004
Authored by Mati Aharoni | Site whitehat.co.il

Mercury Mail 4.01 (Pegasus) IMAP remote buffer overflow exploit.

tags | exploit, remote, overflow, imap
SHA-256 | 63374e92c80843538c8627f6b67f409bd9fb8bb850b2462fd9da4c9129f882a2
orbzbof.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.

tags | exploit, remote, overflow, proof of concept
SHA-256 | b7866a8811b382a054ae7fb62572e6e373eb33af3e44cfec542ed5f71f5dca85
IPSWSFTP-exploit.c
Posted Dec 11, 2004
Authored by NoPh0BiA

Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.

tags | exploit, remote, shell
SHA-256 | 0e9f16d2eb219cb6649d8a93058aceadd447cca259e088bba13b7e2bcf6a5f46
mdaemon72.txt
Posted Dec 11, 2004
Authored by Reed Arvin

A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.

tags | exploit, local
SHA-256 | 0bf2ceef32fcac791004f42845f98912b0a3b6b0da97801fcebb9b6068efaee7
ssfakep.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for games using the Serious engine. Generates UDP packets that have fake players enter a room. The system fails to limit the amount of users that can enter.

tags | exploit, remote, denial of service, udp
SHA-256 | 73f4dcb9226f5e9726827b4fbf00a53e50c64b329583482853dbd42a63d49d11
phpnews.txt
Posted Dec 11, 2004
Authored by ruggine

Simple remote exploit for the SQL injection vulnerability discovered in PHPNews.

tags | exploit, remote, sql injection
SHA-256 | c5de8860494ec9c6c1f6fd843c7a558b1fee55f076ab1a36f0363084f66befb4
phpbb2011.txt
Posted Dec 11, 2004
Authored by Zeelock

phpBB versions below 2.0.11 suffer from addition SQL injection and directory traversal flaws.

tags | exploit, sql injection
SHA-256 | 4d879cc6423df932290b6e1b7d9182c499c15eaf7502b726946c2a1b29356b16
pntresmailer.txt
Posted Dec 11, 2004
Authored by John Cobb

PnTresMailer code browser version 6.03 is susceptible to path disclosure and directory traversal attacks.

tags | exploit
SHA-256 | 0a17793363214eba0be0a9ddbc2c21299703b7751b93939842febb4de75a715c
000102advisory.txt
Posted Dec 11, 2004
Authored by class101, Nima Majidi, idespinner | Site hat-squad.com

MailEnable Professional Edition version 1.52 and MailEnable Enterprise Edition version 1.01 both suffer from a remote buffer overflow in their IMAP service. Full exploit included.

tags | exploit, remote, overflow, imap
SHA-256 | 32c6ae1f1b84066439bf30e3587f50ec5f207c7c74e794bbd4f1278e559265ab
phpnolimit.c
Posted Dec 11, 2004
Authored by Gyan Chawdhary

Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.

tags | exploit, php
advisories | CVE-2004-0594
SHA-256 | 2c97cd1c958eda9cb6b3a5a97720fabb55603f0d0d23e1c106b84fb552ebbcfa
ezshopper.txt
Posted Dec 11, 2004
Authored by Zero-X | Site excluded.org

EZshopper is susceptible to a directory traversal attack. Exploitation included.

tags | exploit
SHA-256 | cbdb0c2b9acdabdbc38e91ad21b569d3defbbf86aa3ad3d5253a0b43f04f7d69
atari800.txt
Posted Dec 11, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

Exploit for the Atari800 atari emulator. Allows for local privilege escalation to root six different ways.

tags | exploit, local, root
SHA-256 | 760cd8cf8696f135ffda0b2089c0d717801c12d775ac0adf04bfd86a5a846d7a
swbfp.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote test exploit for Star Wars Battlefront versions 1.11 and below that checks for buffer overflow and memory access flaws.

tags | exploit, remote, overflow
SHA-256 | 98ba6099180ba4bd950aa9286836fab845e0408239a0283b9977828da8575ced
OpenDcHub-poc.zip
Posted Dec 11, 2004
Authored by Donato Ferrante | Site autistici.org

Proof of concept exploit for a buffer overflow vulnerability that exists in Open Dc Hub version 0.7.14.

tags | exploit, overflow, proof of concept
SHA-256 | 8258ae931f345dbb3993fba33e50fa99806a19f8996a9b591ba1f150a0fb65d9
winampm3u.c
Posted Dec 11, 2004

Exploit for the Winamp vulnerability existing in versions 5.06 and below making use of the IN_CDDA.dll remote buffer overflow.

tags | exploit, remote, overflow
SHA-256 | 25fbcbea1f6cb52583688142fc6827f1aab748a864da9963e4213633a0d1f4bd
STG Security Advisory 2004-11-22.12
Posted Dec 11, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: Due to an input validation flaw, Zwiki is vulnerable to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 65b7e075dc354dda1b68af47357e8245716561c8adb622f8769142ea94fc9d0f
STG Security Advisory 2004-11-22.11
Posted Dec 11, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: Due to an input validation flaw, JSPWiki is vulnerable to cross site scripting attacks.

tags | exploit, xss
SHA-256 | ecd38f592043061846aa7d65232f39d632ae3aa0e137fb49d4c2e1f914db517d
STG Security Advisory 2004-11-22.10
Posted Dec 11, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: KorWeblog suffers from a directory traversal vulnerability that malicious attackers can get file lists of arbitrary directories.

tags | exploit, arbitrary
SHA-256 | 71700686df5b1678bd4503f868982180d543ec54e0c9d59cc2e37c275e95716e
sof2boom.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Soldier of Fortune II versions 1.0.3 gold and below that suffer from a typical sprintf() overflow.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 8c1f38ba19234cca1350bb97214735995b65a3407cba5859c48514f728863627
halocboom.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Halo: Combat Evolved versions 1.05 and below remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 0d3cef695d9fdc47fdfd95ee798dad5deadd30a99fcef14209bc6b476fb3f98e
coffeecupbof.txt
Posted Dec 11, 2004
Authored by Komrade | Site unsecure.altervista.org

CoffeeCup Direct FTP 6.2.0.62 and CoffeeCup Free FTP 3.0.0.10 both suffer from an overflow that allows for arbitrary code execution. Exploit included that spawns a shell on port 5555.

tags | exploit, overflow, arbitrary, shell, code execution
SHA-256 | c9c0e8b484d3a06402a6c82a42672cbd98ac77e8c0eda4fe6e231b78eb1cc7da
wodftpcrash.txt
Posted Dec 11, 2004
Authored by Komrade | Site unsecure.altervista.org

WodFtpDLX versions below 2.3.2.97 are susceptible to a classic buffer overflow attack. Denial of service exploit included.

tags | exploit, denial of service, overflow
SHA-256 | 195769a65ca00316eed591f6fcee2829057831d8d052f6c924409e82b66d029c
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close