Section:  .. / 0502-exploits  /

Page 4 of 5
<< 1 2 3 4 5 >> Files 75 - 100 of 108
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: EXPL-A-2005-001.txt
Description:
EXPL-A-2005-001 exploitlabs.com Advisory 030 - A vulnerability in Microsoft Outlook Web Access allows malicious attackers to redirect the login to any URL they wish.
Author:Donnie Werner
Homepage:http://exploitlabs.com
File Size:4716
Last Modified:Feb 22 22:05:22 2005
MD5 Checksum:1e5022304657de2626e4ce60781930ba

 ///  File Name: bxcp0297.txt
Description:
A lack of validation in BXCP 0.2.9.7 scripts allow for local php file inclusion and path disclosure.
Homepage:http://www.ofb-clan.de/
File Size:2243
Last Modified:Feb 22 22:02:02 2005
MD5 Checksum:f210a4663f728f759172302442fbe733

 ///  File Name: vpasp.txt
Description:
VP-ASP Shopping Cart version 5.x stores sensitive user data in .mdb files.
Author:fris
File Size:1840
Last Modified:Feb 22 21:59:21 2005
MD5 Checksum:10687fedbfae08a1525d1474c10cc001

 ///  File Name: linux-2.6.10.c
Description:
Linux v2.6.10 and below kernel exploit which allows non-privileged users to read kernel memory.
Author:Georgi Guninski
Homepage:http://www.guninski.com
Related File:where_do_you_want_billg_to_go_today_3.html
File Size:2763
Last Modified:Feb 18 09:32:42 2005
MD5 Checksum:f39502f31cc80538acad38883a2eb0ce

 ///  File Name: vbulletin-3.0.4-2.txt
Description:
vBulletin v3.0 through 3.0.4 remote command execution exploit, written in PHP. Takes advantage of a bug in forumdisplay.php.
Author:AL3NDALEEB
File Size:1881
Last Modified:Feb 18 09:08:23 2005
MD5 Checksum:fcdfb1e7e59b312e89ee3e3b65b0a189

 ///  File Name: vbulletin-3.0.4.txt
Description:
vBulletin v3.0.4 remote command execution exploit. Takes advantage of a bug in forumdisplay.php.
Author:AL3NDALEEB
File Size:646
Last Modified:Feb 18 09:06:30 2005
MD5 Checksum:c0c2369e86ad1420dfea60826e04ad87

 ///  File Name: XSS-Proxy_0_0_11.pl
Description:
This script is an XSS attack controller which allows an attacker to force a victim to read pages off a XSS vulnerable server and relay contents back to this controller. This process also provides client with new script commands.
Author:Anton Rager
File Size:19523
Last Modified:Feb 18 08:12:49 2005
MD5 Checksum:ba0be2050a128c0a827628b9f3422076

 ///  File Name: brightstor.c
Description:
The CA BrightStor ArcServe Discovery Service overflow exploit takes advantage of a vulnerability in the CA BrightStor Discovery Service which occurs when a large request is sent to UDP port 41524, triggering a stack overflow.
Author:Thor Doomen
File Size:2385
Related CVE(s):CAN-2005-0260
Last Modified:Feb 18 07:29:04 2005
MD5 Checksum:2a8650b78261f7d78d054919e396b362

 ///  File Name: cabrightstor_disco_servicepc.pm
Description:
CA BrightStor Discovery Service SERVICEPC Overflow for Win32, win2000, winxp, and win2003 which exploits a vulnerability in the TCP listener on port 45123. Affects all known versions of the BrightStor product. More information available here.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:4383
Last Modified:Feb 18 07:24:02 2005
MD5 Checksum:24691076d35d4bb512eadbea343374f2

 ///  File Name: cabrightstor_disco.pm
Description:
The CA BrightStor Discovery Service overflow exploit is a perl module exploits a vulnerability in the CA BrightStor Discovery Service which occurs when a large request is sent to UDP port 41524, triggering a stack overflow. Targets include Win32, win2000, winxp, and win2003. More information available here.
Author:Thoor Doomen
File Size:3715
Related CVE(s):CAN-2005-0260
Last Modified:Feb 18 07:18:59 2005
MD5 Checksum:b2bd9b3e6cf0a59af941b2e26e28e90a

 ///  File Name: ecl-eximspa.c
Description:
Exim <= 4.4.3 exploit for the SPA authentication vulnerability. Takes advantage of the spa_base64_to_bits() call.
Author:Yuri Gushin
File Size:7684
Last Modified:Feb 18 06:15:18 2005
MD5 Checksum:f69c4523245f9862570d6f589b1eeb95

 ///  File Name: mercuryboard.1.1.1.txt
Description:
Mercuryboard <= 1.1.1 remote sql injection exploit.
Author:Zeelock
File Size:221
Last Modified:Feb 18 06:11:24 2005
MD5 Checksum:9384f779a2199c9f460dbbcd5c742c30

 ///  File Name: my.phpforum.1.0.txt
Description:
MyPHPForum v1.0 remote sql injection exploit. Shows administrators name and password. MyPHP Forum is available here.
Author:GHC
File Size:528
Last Modified:Feb 18 06:10:08 2005
MD5 Checksum:5dec0049a91d5e376accb46ad63d52d9

 ///  File Name: cms.core.txt
Description:
CMS Core remote SQL injection exploit. CMS Core is available here.
Author:GHC
File Size:316
Last Modified:Feb 18 06:07:59 2005
MD5 Checksum:229fddbca1cb60c18695a06441a9f684

 ///  File Name: chipmunk.forum.txt
Description:
Chipmunk Forum remote SQL injection exploit. Chipmunk forum is available here.
Author:GHC
File Size:318
Last Modified:Feb 18 06:06:09 2005
MD5 Checksum:1ab624794739e610d9f3ac5f1e106018

 ///  File Name: php-nuke.7.4.c
Description:
PHP-Nuke v7.4 remote exploit which allows you to create new admin with relative passwd that you specify on the command line. Allows you to take administrative control of the webPortal. See here for more information.
Author:Silentium
Homepage:http://www.autistici.org/anacron.group-italy
File Size:4330
Last Modified:Feb 18 06:03:42 2005
MD5 Checksum:bad0a943bf16781d72fa5671cbab00e1

 ///  File Name: postnuke.postwrap.txt
Description:
Postnuke Postwrap remote command execution exploit. Includes information on finding vulnerable systems with google.
Homepage:http://www.albanianhaxorz.org
File Size:1081
Last Modified:Feb 18 05:15:17 2005
MD5 Checksum:0cb697ad4c75dda22556bedddae30ee1

 ///  File Name: 20050209.MS05009.windows.c
Description:
MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Windows. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.
Author:Atmaca
Homepage:http://www.atmacasoft.com
File Size:4605
Last Modified:Feb 18 05:11:03 2005
MD5 Checksum:1b8ae93a23416ee35fbca97f3bed227b

 ///  File Name: 20050209.MS05009.c
Description:
MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Linux. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.
Author:Atmaca
Homepage:http://www.atmacasoft.com
File Size:4708
Last Modified:Feb 18 05:04:01 2005
MD5 Checksum:681797dd22adfd33ba334cd66679cbb1

 ///  File Name: RaidenHTTPD.txt
Description:
RaidenHTTPD version 1.1.27 is susceptible to a directory traversal flaw where any file can be extracted from the disk partition where the httpd is installed.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1885
Last Modified:Feb 6 06:35:24 2005
MD5 Checksum:43f94e3e8371843f56deb595922201ea

 ///  File Name: foxmailDoS.txt
Description:
Foxmail server version 2.0 is susceptible to a boundary error condition in the MAIL FROM: directive. Sample denial of service exploit provided.
Author:xouyang
File Size:2783
Last Modified:Feb 6 06:33:09 2005
MD5 Checksum:53745a0a1a685d27bf8cee5bfc21f743

 ///  File Name: savant-explo.pl
Description:
Savant Web Server 3.1 remote buffer overflow exploit. Tested on Windows 2003 Server.
Homepage:http://www.x0n3-h4ck.org
File Size:3882
Last Modified:Feb 6 06:22:27 2005
MD5 Checksum:d43f10eb6f2f7530f361c1af4c80561a

 ///  File Name: p_exim.c
Description:
Remote proof of concept exploit for the buffer overflow vulnerability discovered in Exim 4.41 by iDEFENSE.
Author:pi3ki31ny
Homepage:http://pi3.int.pl
Related File:01.14.05.txt
File Size:4289
Last Modified:Feb 6 06:15:29 2005
MD5 Checksum:324ccf097d26867f28e4b63433a01a59

 ///  File Name: x_osh.pl
Description:
Operator Shell (osh) 1.7-12 local root exploit.
Author:Charles Stevenson aka core
File Size:7879
Last Modified:Feb 6 06:09:47 2005
MD5 Checksum:9b4e98143d6e94b1594d38293eede9a3

 ///  File Name: r57lite211.txt
Description:
LiteForum version 2.1.1 SQL injection exploit with one char bruteforce.
Author:1dt.w0lf
Homepage:http://www.rst.void.ru
File Size:2397
Last Modified:Feb 6 05:57:39 2005
MD5 Checksum:da93868e99ea5cdfc9f0d53edfc536c4