Section:  .. / 0502-exploits  /

Page 3 of 5
<< 1 2 3 4 5 >> Files 50 - 75 of 108
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: knetDoS104c.txt
Description:
Knet versions 1.04c and below are susceptible to a remote buffer overflow vulnerability that allows for execution of code. Exploit provided.
Author:CorryL
Homepage:http://x0n3-h4ck.org
File Size:3440
Last Modified:Feb 28 07:25:44 2005
MD5 Checksum:c9d2eb21aeeefd9b8a87f0393fc2cb12

 ///  File Name: linux-2.6.10.c
Description:
Linux v2.6.10 and below kernel exploit which allows non-privileged users to read kernel memory.
Author:Georgi Guninski
Homepage:http://www.guninski.com
Related File:where_do_you_want_billg_to_go_today_3.html
File Size:2763
Last Modified:Feb 18 09:32:42 2005
MD5 Checksum:f39502f31cc80538acad38883a2eb0ce

 ///  File Name: mercuryboard.1.1.1.txt
Description:
Mercuryboard <= 1.1.1 remote sql injection exploit.
Author:Zeelock
File Size:221
Last Modified:Feb 18 06:11:24 2005
MD5 Checksum:9384f779a2199c9f460dbbcd5c742c30

 ///  File Name: my.phpforum.1.0.txt
Description:
MyPHPForum v1.0 remote sql injection exploit. Shows administrators name and password. MyPHP Forum is available here.
Author:GHC
File Size:528
Last Modified:Feb 18 06:10:08 2005
MD5 Checksum:5dec0049a91d5e376accb46ad63d52d9

 ///  File Name: ncpfsLocal.txt
Description:
Local exploit for ncpfs that gain access to /etc/shadow entries.
Author:super
File Size:566
Last Modified:Feb 1 07:29:56 2005
MD5 Checksum:aff82830e848d46b8d8e1a291f2c2a60

 ///  File Name: newspost.c
Description:
Newspost socket_getline() remote buffer overflow exploit.
Author:Cybertronic
Related File:glsa-200502-05.txt
File Size:7411
Last Modified:Feb 5 22:08:05 2005
MD5 Checksum:705f81e1d60d03b4620552a880e93804

 ///  File Name: ngircd_fsexp.c
Description:
Remote root format string exploit for ngIRCd versions 0.8.2 and below.
Author:CoKi
Homepage:http://www.nosystem.com.ar/
Related File:nsg-advisory-11.txt
File Size:13396
Last Modified:Feb 3 08:48:05 2005
MD5 Checksum:563de766ee162bd858177621dfe86665

 ///  File Name: osCommerceXSS.txt
Description:
osCommerce 2.2-MS2 is susceptible to a cross site scripting attack.
Author:John Cobb
Homepage:http://www.nobytes.com
File Size:619
Last Modified:Feb 25 06:28:15 2005
MD5 Checksum:64d47ce49116b3f7a09aef197309c308

 ///  File Name: p_exim.c
Description:
Remote proof of concept exploit for the buffer overflow vulnerability discovered in Exim 4.41 by iDEFENSE.
Author:pi3ki31ny
Homepage:http://pi3.int.pl
Related File:01.14.05.txt
File Size:4289
Last Modified:Feb 6 06:15:29 2005
MD5 Checksum:324ccf097d26867f28e4b63433a01a59

 ///  File Name: paFAQBeta4.txt
Description:
paFAQ Beta4 is susceptible to numerous SQL injection attacks.
Author:Pi3cH
Homepage:http://www.PersianHacker.NET
File Size:2309
Last Modified:Feb 25 07:39:33 2005
MD5 Checksum:7dd0ec580bb4bda135d450b882024dd3

 ///  File Name: painkkeybof.zip
Description:
Proof of concept exploit for Painkiller versions 1.35 and below which suffer from a buffer overflow overflow vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:painkkeybof.txt
File Size:12101
Last Modified:Feb 3 08:30:55 2005
MD5 Checksum:82addf6b1738140c5d9c6c64efd9c787

 ///  File Name: paNews20b4.txt
Description:
paNews version 2.0b4 is susceptible a cross site scripting vulnerability.
Author:Pi3ch
Homepage:http://www.PersianHacker.NET
File Size:2019
Last Modified:Feb 25 07:14:38 2005
MD5 Checksum:d94e23aac2b88b24cb242a3d20706dc0

 ///  File Name: paNews_v2.0b4.txt
Description:
paNews version 2.0b4 is susceptible to remote php code injection.
Homepage:http://nst.e-nex.com/
File Size:1133
Last Modified:Feb 26 01:19:41 2005
MD5 Checksum:0768931e700ec992ba71b15aa8732b4a

 ///  File Name: pdsploit.pl
Description:
PerlDesk version 1.x remote SQL injection exploit.
Author:deluxe89, Astovidatu
Homepage:http://www.security-project.org/
File Size:1624
Last Modified:Feb 22 22:16:20 2005
MD5 Checksum:dcac1b92f57460cdc18ed76445a176fb

 ///  File Name: PeerFTP_5.c
Description:
PeerFTP_5 local password disclosure exploit.
Author:Kozan, ATmaCA
Homepage:http://www.netmagister.com
File Size:3919
Last Modified:Feb 25 09:45:46 2005
MD5 Checksum:6177674b657c57c14c45ce2162f2fc02

 ///  File Name: php-fusion.txt
Description:
php-fusion 4.x has a bypass vulnerability where a remote attacker can view any thread.
Author:TheGreatOne2176
File Size:708
Last Modified:Feb 23 04:14:24 2005
MD5 Checksum:30260b02cb67509898db9655337352fc

 ///  File Name: php-nuke.7.4.c
Description:
PHP-Nuke v7.4 remote exploit which allows you to create new admin with relative passwd that you specify on the command line. Allows you to take administrative control of the webPortal. See here for more information.
Author:Silentium
Homepage:http://www.autistici.org/anacron.group-italy
File Size:4330
Last Modified:Feb 18 06:03:42 2005
MD5 Checksum:bad0a943bf16781d72fa5671cbab00e1

 ///  File Name: phpMyAdmin261.txt
Description:
phpMyAdmin versions 2.6.1 and below suffer from remote file inclusion and cross site scripting flaws. Detailed exploitation given.
Author:Maksymilian Arciemowicz
File Size:3611
Last Modified:Feb 26 20:20:05 2005
MD5 Checksum:943aaf73594eaf3a6329bd1ea8d69e72

 ///  File Name: pmachineExec.txt
Description:
A lack of variable sanitizing in PMachine online publishing tools allows for remote command execution as the webserver uid.
Author:kcope
File Size:5857
Last Modified:Feb 26 00:20:24 2005
MD5 Checksum:c2e223e491811c7bf3c697ec5aaaab3b

 ///  File Name: postnuke.postwrap.txt
Description:
Postnuke Postwrap remote command execution exploit. Includes information on finding vulnerable systems with google.
Homepage:http://www.albanianhaxorz.org
File Size:1081
Last Modified:Feb 18 05:15:17 2005
MD5 Checksum:0cb697ad4c75dda22556bedddae30ee1

 ///  File Name: prozillaFormatString.c
Description:
Prozilla versions 1.3.7.3 and below format string exploit.
Author:Deicide from ElectronicSouls
File Size:13962
Last Modified:Feb 23 06:06:31 2005
MD5 Checksum:f923bc57501752fd758799055979f14f

 ///  File Name: q3infoboom.zip
Description:
Proof of concept exploit for the Quake 3 engine making use of a flaw in the handling of big queries.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:q3infoboom.txt
File Size:9140
Last Modified:Feb 24 17:57:43 2005
MD5 Checksum:523c4fb6813b8d3288626d5713906bb9

 ///  File Name: r57lite211.txt
Description:
LiteForum version 2.1.1 SQL injection exploit with one char bruteforce.
Author:1dt.w0lf
Homepage:http://www.rst.void.ru
File Size:2397
Last Modified:Feb 6 05:57:39 2005
MD5 Checksum:da93868e99ea5cdfc9f0d53edfc536c4

 ///  File Name: RaidenHTTPD.txt
Description:
RaidenHTTPD version 1.1.27 is susceptible to a directory traversal flaw where any file can be extracted from the disk partition where the httpd is installed.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1885
Last Modified:Feb 6 06:35:24 2005
MD5 Checksum:43f94e3e8371843f56deb595922201ea

 ///  File Name: rna_bof.rgs
Description:
Proof of concept exploit that makes use of an integer overflow in RealArcade versions 1.2.0.994 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:rna_adv.txt
File Size:681
Last Modified:Feb 23 05:08:37 2005
MD5 Checksum:6325f487e6d6c41caecd50db3709d8a0