Section:  .. / 0411-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 77
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: phpkitSQLXSS.txt
Description:
PHP KIT versions 1.6.03 through 1.6.1 suffer from SQL injection and cross site scripting vulnerabilities. Demonstration exploitation included.
Author:Steve
File Size:1263
Last Modified:Dec 11 19:13:41 2004
MD5 Checksum:a6c57e9918b15f57703753c4b8f197dd

 ///  File Name: lostmonGmail.txt
Description:
Gmail suffers from multiple vulnerabilities including denial of service and cross site scripting flaws.
Author:Lostmon
File Size:1668
Last Modified:Dec 11 19:12:16 2004
MD5 Checksum:fe1ee1fe5d98fbd5ed7cd9c0967cc22e

 ///  File Name: zyxelreset.txt
Description:
It is possible to reset a ZyXEL Prestige 650 HW router without any authentication.
Author:Francisco Canela
File Size:453
Last Modified:Dec 11 19:09:42 2004
MD5 Checksum:8b544d5f5b1fe8c8a2e41411ca72f09f

 ///  File Name: wchannelPriv.txt
Description:
Local user input handling vulnerabilities exist in WCI's TC-IDE Embedded Linux that allow local users with access to the tools provided with the system to spawn a root console, gaining full control over the running Linux operating system.
Author:Yuri Gushin, Alex Behar, Valentin Slalov
File Size:2091
Last Modified:Dec 11 19:04:53 2004
MD5 Checksum:35ed88030fee586dc75fd7aed730ad46

 ///  File Name: ipbSQL.txt
Description:
IPB Pro Arcade versions 1.x and 2.x are susceptible to SQL injection attacks. Exploitation included.
Author:axl daivy
File Size:647
Last Modified:Dec 11 19:03:28 2004
MD5 Checksum:a64714c0a7ef56e2584fa62a39ec3ced

 ///  File Name: b4b0-phpbb.tgz
Description:
PhpBB v1.0.0 - 2.0.10 remote exploit which takes advantage of a bug in admin_cash.php. Opens a back door on a tcp port.
Author:evilrabbi
File Size:1202
Last Modified:Nov 24 07:24:24 2004
MD5 Checksum:3f3f2f16c17761e910f11a2cb42cc9c0

 ///  File Name: ecl-channel.adv
Description:
Local user input handling vulnerabilities exist in WCI's TC-IDE Embedded Linux prior to v1.54 which allow local users with access to the tools provided with the system to spawn a root console, gaining full control over the running Linux operating system. In corporate environments where this product is being used, such vulnerabilities could cause disastrous effects, all users are encouraged to update to the latest firmware ASAP.
Author:ECL Team
File Size:2192
Last Modified:Nov 24 06:14:14 2004
MD5 Checksum:2eb22b307cc833cd042d1b49d8b116c4

 ///  File Name: mailtraq-update.txt
Description:
Mailtraq Version 2.6.1.1677 remote exploit which allows SYSTEM level access while using the Mailtraq administration console. Requires a Mailtraq admin account.
Author:Travis Schack
File Size:2841
Last Modified:Nov 24 05:42:17 2004
MD5 Checksum:427df7d3b6fffda815a1a52caea03bb8

 ///  File Name: proz_ex.c
Description:
Prozilla-1.3.6 remote client side stack overflow exploit, tested against current Gentoo, slackware, Debian, and suse.
Author:Serkan Akpolat
Homepage:http://deicide.siyahsapka.org
File Size:10859
Last Modified:Nov 24 05:23:06 2004
MD5 Checksum:9a0268a366aa17a0540e97e9a3beee8c

 ///  File Name: phpbb.php.txt
Description:
Remote command execution exploit for phpBB 2.0.10 that makes use of a flaw in the viewtopic.php code.
Author:How Dark, pokleyzz
Homepage:http://www.howdark.com
File Size:1481
Last Modified:Nov 20 23:55:49 2004
MD5 Checksum:f921925d25c8aefc535037fe9d34cefd

 ///  File Name: 20041119.IESP2Unpatched.html
Description:
Microsoft Internet Explorer (including IE for Windows XP SP2) is reported vulnerable to a file download security warning bypass. This unpatched flaw may be exploited to download a malicious executable file masqueraded as a HTML file. Full exploitation given. Original posted on k-otik.
Author:cyber flash
Homepage:http://www.k-otik.com/
Related File:sa13203.txt
File Size:5666
Last Modified:Nov 20 23:50:57 2004
MD5 Checksum:efd4da6639e3f50e0df00ddbd6efee64

 ///  File Name: aclient.txt
Description:
Altiris Deployment Solution 5.6 SP1 (Hotfix E) suffers from a privilege escalation flaw that allows for SYSTEM level access. Step by step exploitation given.
Author:Reed Arvin
File Size:870
Last Modified:Nov 20 23:30:46 2004
MD5 Checksum:1be9fdc191a6ebdcdd6f90985f998910

 ///  File Name: mailtraq.txt
Description:
A privilege escalation technique can be used to gain SYSTEM level access while using the Mailtraq administration console. Mailtraq Version 2.6.1.1677 is vulnerable.
Author:Reed Arvin
File Size:1383
Last Modified:Nov 20 23:25:31 2004
MD5 Checksum:570f63e06a088944b32ac1db1e0bb12f

 ///  File Name: slmail5x.txt
Description:
SLMail 5.x POP3 remote PASS buffer overflow exploit that binds a shell to port 4444. Tested on Windows 2000 SP4.
Author:muts
Homepage:http://www.whitehat.co.il
File Size:4234
Related CVE(s):CAN-2004-0942
Last Modified:Nov 20 23:24:03 2004
MD5 Checksum:2f39531126d87191b5ceaf073ca81878

 ///  File Name: dmsPOP3.txt
Description:
A buffer overflow exists in DMS POP3 Server for Windows 2000/XP 1.5.3 build 37 and prior versions. Demonstration exploit included.
Author:Reed Arvin
File Size:1648
Last Modified:Nov 20 23:21:49 2004
MD5 Checksum:d0b5cdae27042d688d59e55c6e8046ac

 ///  File Name: mp-invision.txt
Description:
An input validation vulnerability in Invision Power Board version 2.x allows a remote user the ability to conduct SQL injection attack.
Homepage:http://www.maxpatrol.com
File Size:2099
Last Modified:Nov 20 22:59:45 2004
MD5 Checksum:172eba93ee042464d0c8803a4e663fab

 ///  File Name: advRX181104.txt
Description:
Cscope 15.5 and possibly earlier versions may suffer from a race condition that allows for local compromise. Proof of concept exploits included.
Author:Gangstuck, Psirac
File Size:6051
Last Modified:Nov 20 22:50:41 2004
MD5 Checksum:4a0e0ab79fabe9230af9db9e474118cb

 ///  File Name: waraxe-2004-SA038.txt
Description:
The Event Calendar module for PHP-Nuke suffers from cross site scripting, path disclosure, SQL injection, and script insertion attacks.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:5700
Last Modified:Nov 20 22:38:21 2004
MD5 Checksum:39075f33edc60c02047b4706096f6897

 ///  File Name: nsg-advisory-08.txt
Description:
TipxD versions 1.1.1 and below suffer from a local format string vulnerability. Proof of concept local exploit included.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:6557
Last Modified:Nov 20 22:03:02 2004
MD5 Checksum:f59247ae7c9a0aee1868abb9434094bc

 ///  File Name: tweaky.pl
Description:
TWiki Release 01-Feb-2003 and below remote code execution exploit in perl.
Author:Roman Medina-Heigl Hernandez aka RoMaNSoFt
Homepage:http://www.rs-labs.com
File Size:6620
Related CVE(s):CAN-2004-1037
Last Modified:Nov 20 21:52:55 2004
MD5 Checksum:b739c6999441255807941107c5a1e500

 ///  File Name: GFHost.pl
Description:
GFHost PHP GMail remote command execution exploit that achieves webserver id privileges.
Author:spabam
File Size:3592
Last Modified:Nov 20 20:56:16 2004
MD5 Checksum:6cc47ad984586b88bfcd9274b36a902e

 ///  File Name: zipbrk.zip
Description:
This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.
Author:oc.192
File Size:10847
Related CVE(s):CAN-2004-0932, CAN-2004-0937
Last Modified:Nov 20 20:01:01 2004
MD5 Checksum:42e2e861784ebb52460984f688aed1ad

 ///  File Name: eudora62014.txt
Description:
Eudora 6.2.14 for Windows that was just released is still susceptible to an attachment spoofing vulnerability. Working exploit included.
Author:Paul Szabo
File Size:1815
Last Modified:Nov 20 19:53:13 2004
MD5 Checksum:e9515fc1cf11e9494efc450dd93f8140

 ///  File Name: IPSwitch-IMail-8.13-DELETE.pl
Description:
Remote exploit for the IPSwitch-IMail 8.13 stack overflow in the DELETE command. Successful exploitation binds a shell to port 4444.
Author:Muts, Zatlander
Homepage:http://www.whitehat.co.il/
File Size:4239
Last Modified:Nov 20 19:50:14 2004
MD5 Checksum:de63548e8c2828dfabc692609516742f

 ///  File Name: ZipMe!.cpp
Description:
Microsoft Windows Vulnerability in Compressed (zipped) Folders (MS04-034) proof of concept exploit. Tested on Windows XP SP0 Spanish and English. More information available here.
Author:Takaro
Homepage:http://Haxorcitos.com
File Size:9697
Last Modified:Nov 19 09:07:04 2004
MD5 Checksum:b46769dec05e15ac32380061ff02f09a