Section:  .. / 0504-exploits  /

Page 3 of 6
<< 1 2 3 4 5 6 >> Files 50 - 75 of 138
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: includer10.pl.txt
Description:
The Includer CGI versions 1.0 and below remote command execution exploit.
Homepage:http://nst.void.ru
File Size:2083
Last Modified:Apr 18 08:11:15 2005
MD5 Checksum:2e93df914fd652fa9315d146545f3cc0

 ///  File Name: includer10exec.pl.txt
Description:
Another remote command execution exploit for The Includer CGI versions 1.0 and below.
Author:K-C0d3r
File Size:2191
Last Modified:Apr 18 08:12:31 2005
MD5 Checksum:20977247bfa016015d65cb81872c0087

 ///  File Name: invision131sql.txt
Description:
Invision board versions 1.3.1 and below are susceptible to SQL injection attacks. Patch included.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:8173
Last Modified:Apr 18 10:07:26 2005
MD5 Checksum:b4da7f7d3221907b1c414f30a8e9ed48

 ///  File Name: jawsXSS.txt
Description:
JAWS 0.4 is susceptible to cross site scripting attacks.
Author:Paulino Calderon
Homepage:http://suckea.com/nah/
File Size:2640
Last Modified:Jun 1 06:14:43 2005
MD5 Checksum:248a4b1b25700ad4c3d338f553792343

 ///  File Name: jportal231.txt
Description:
JPortal is susceptible to SQL injection attacks that allows for administrative password retrieval.
Author:Marcin Krupowicz
File Size:1119
Last Modified:Apr 18 10:21:04 2005
MD5 Checksum:848909aa48710766596ba7a78739143f

 ///  File Name: kali.txt
Description:
Kali's tagboard allows for remote command execution.
Author:Am0s
File Size:350
Last Modified:Jun 1 07:23:13 2005
MD5 Checksum:32a500bb5ddcf5ac472ff6f7872782ee

 ///  File Name: KMiNT21.txt
Description:
A buffer overflow exists in KMiNT21 Software Golden FTP Server Pro version 2.52.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com
File Size:1625
Last Modified:Jun 23 10:38:44 2005
MD5 Checksum:bf3a9374bdef6708f95745e2dd16bd8f

 ///  File Name: koobi-cms423.txt
Description:
koobi-cms 4.2.3 is susceptible to SQL injection attacks.
Homepage:http://www.security-tmp.net.ru
File Size:1100
Last Modified:Jun 24 09:10:22 2005
MD5 Checksum:2d282b41826fd8de2c6834b8475f3ddd

 ///  File Name: lgfreeze.mid
Description:
Example of malformed MIDI ringtone which can be used to cause a Denial of Service condition in LG-U8120 mobile phones.
Author:Luca Ercoli
Homepage:http://www.lucaercoli.it
Related File:lg8120_midi_dos.txt
File Size:65
Last Modified:Apr 21 00:02:21 2005
MD5 Checksum:7242ca0578f85229cc7affa3c306d0e3

 ///  File Name: linkslinks.txt
Description:
A SQL injection vulnerability was found in the LinksLinks Pro module in phpBB 2.0.x systems.
Author:LovER BOY
Homepage:http://www.securitygurus.net
File Size:226
Last Modified:Apr 17 19:39:57 2005
MD5 Checksum:11b05824fee260193d4d731d17f2c873

 ///  File Name: linksys-WET11_pass-reset.txt
Description:
The Cisco Linksys WET11 is vulnerable to having the password reset simply by going to a known URL on the administrative interface recently after the systems administrator has logged in. It is not necessary to know the current password.
Author:Kristian Hermansen
Homepage:http://ht-technology.com
File Size:2908
Last Modified:Apr 17 21:20:06 2005
MD5 Checksum:6ca7f7cad061edc47ba030dc887e3176

 ///  File Name: litecommerceSQL.txt
Description:
LiteCommerce is susceptible to SQL injection attacks.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:6832
Last Modified:Apr 17 20:47:11 2005
MD5 Checksum:3c3e8d3df2d69eb598dfdff4f7524bfe

 ///  File Name: logicsBS2000.txt
Description:
Logics Software Filetransfer from BS2000 host to web client suffers from a file inclusion vulnerability.
Author:Roman Ramirez, Pedro Vinuales
File Size:3122
Last Modified:Apr 17 19:58:26 2005
MD5 Checksum:7bd65aa86e79f997ae8758e1b388e67e

 ///  File Name: mailenable_EHLO_DoS.pl
Description:
MailEnable EHLO unicode-address-interpretation exploit.
Author:CorryL
Homepage:http://www.x0n3-h4ck.org
Related File:mailenable_ehlo_dos.txt
File Size:2085
Related OSVDB(s):15232
Last Modified:Apr 17 20:32:53 2005
MD5 Checksum:596a587e196bdc3d5d42fac218c058d4

 ///  File Name: MaxDB750023.c
Description:
MySQL MaxDB Webtool versions 7.5.00.23 and below remote stack overflow exploit.
Author:cybertronic
File Size:8737
Last Modified:May 27 05:18:47 2005
MD5 Checksum:cd4e3524d325145e70af818295bd7afd

 ///  File Name: maxthon_arbitrary_read-write.html.t..>
Description:
Maxthon arbitrary-file read/write exploit example.
Author:Aviv Raff
Homepage:http://www.raffon.net/advisories/maxthon/nosecidpoc.html
Related File:maxthon_mulvulns.txt
File Size:980
Last Modified:Apr 17 22:19:07 2005
MD5 Checksum:1fdbca010994cb0c6184e491b57ca2bf

 ///  File Name: miranda_popupplus_overflow.txt
Description:
Miranda Instant Messenger with the PopUp Plus plugin is vulnerable to a simple, remotely executable buffer-overflow. Sending around 530 characters in an instant message will result in EIP getting overwritten. Version 2.0.3.8 is tested vulnerable, other versions may also be affected.
Author:m0fo
File Size:928
Last Modified:Apr 17 20:55:44 2005
MD5 Checksum:e373ec5a18e7c031ac7934b84675db30

 ///  File Name: modernBill.txt
Description:
ModernBill versions 4.3.0 and below suffer from file inclusion and cross site scripting vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2826
Last Modified:Apr 18 08:21:50 2005
MD5 Checksum:16d7f7f7e62e3aabd9da3f00e9d8c8a6

 ///  File Name: ms05-019.txt
Description:
using net::packet allows an attacker to take advantage of the MS05-019 vulnerability allowing remote command execution and denial of service.
Author:Gomor
Homepage:http://www.gomor.org
File Size:783
Last Modified:Jun 1 08:01:24 2005
MD5 Checksum:99feb8e6ee4c65f6fcdd410d777d08fd

 ///  File Name: MS05-021-PoC.pl
Description:
MS05-021 Exchange X-LINK2STATE exploit that makes use of a heap overflow in SvrAppendReceivedChunk function which is located in xlsasink.dll.
Author:Evgeny Pinchuk
File Size:2396
Last Modified:Jun 1 06:27:08 2005
MD5 Checksum:80e2b45f2fd0dd245f2c2c3514d686b5

 ///  File Name: msbv5120-xhacker.tar.gz
Description:
Motorola SBV5120 cable modem denial of service exploit v0.1.
Author:X-Hacker
File Size:7671
Last Modified:Apr 28 06:24:09 2005
MD5 Checksum:8fcb34b9de0660ee6d76d1a921e7b077

 ///  File Name: MSHTA_POC.c
Description:
Proof-of-Concept code to generate a file with an embedded CLSID, demonstrating how the issues detailed in the iDEFENSE "MSHTA" advisory, MS05-016, and other places, can be exploited.
Author:zwell
Related File:04.12.05d.txt
File Size:67444
Related OSVDB(s):15469
Related CVE(s):CAN-2005-0063
Last Modified:Apr 19 21:19:14 2005
MD5 Checksum:66526ae9cf6d8807e20d726865c4e389

 ///  File Name: msjet.c
Description:
Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll. Tested against Windows 2000 SP4, Windows XP SP0 and SP1.
Author:Stuart Pearson
Homepage:http://www.computerterrorism.com
File Size:11452
Last Modified:Apr 18 08:35:06 2005
MD5 Checksum:663c2608a9a6f30d1df12e35b9fa6c34

 ///  File Name: msjet101.c
Description:
This is a slightly modified version of Stuart Pearson's original exploit for the malformed MDB parsing vulnerabilities in Microsoft Access.
Author:Nanika
Homepage:http://www.chroot.org
Related File:msjet40.txt
File Size:13214
Related OSVDB(s):15187
Last Modified:Apr 19 21:14:31 2005
MD5 Checksum:58309d996a709cef628983b1a7fb353a

 ///  File Name: msjet40.txt
Description:
Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll.
Author:Tal Zeltzer
Homepage:http://www.see-security.com
File Size:13106
Last Modified:Apr 19 08:47:28 2005
MD5 Checksum:8fbfb0d2fde9b9855da7d5229ae5341b