Section:  .. / 0506-exploits  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 89
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: MIRC.PAS.HTML
Description:
MIRC 6.16 and 'generic Edit component' Win32 trick exploit.
Author:rgod
Homepage:http://rgod.altervista.org/
File Size:15994
Last Modified:Jun 18 19:22:41 2005
MD5 Checksum:36be2007dc016d57c10caed7b41990a0

 ///  File Name: mssmb_poc.c
Description:
Windows SMB client transaction response handling exploit that makes use of the flaw detailed in MS05-011.
Author:cybertronic
Homepage:http://www.livejournal.com/users/cybertronic/
File Size:37312
Related CVE(s):CAN-2005-0045
Last Modified:Jun 24 07:36:10 2005
MD5 Checksum:7b7b92ef6de49bb01c9943401145c68e

 ///  File Name: nokia-bt-cx.pl.txt
Description:
Nokia remote restart Bluetooth nickname exploit.
Author:QNIX
File Size:1393
Last Modified:Jun 29 10:38:18 2005
MD5 Checksum:fd481422d913224ffc22db92933ccc97

 ///  File Name: NsT-phpBBDoS.c
Description:
phpBB versions 2.0.15 and below denial of service exploit that makes use of a flaw that relates to registering multiple users. C version of the exploit.
Author:HaCkZaTaN
File Size:7726
Last Modified:Jun 23 09:48:01 2005
MD5 Checksum:7f83013c968358ef1bcad6e2a9bb7c86

 ///  File Name: NsT-phpBBDoS.pl.txt
Description:
phpBB versions 2.0.15 and below denial of service exploit that makes use of a flaw that relates to registering multiple users. Perl version of the exploit.
Author:HaCkZaTaN
File Size:5166
Last Modified:Jun 23 09:49:58 2005
MD5 Checksum:c9f86c6b6367e8730d942a48b9378e1a

 ///  File Name: p33r-b33r.c
Description:
PeerCast versions 0.1211 and below HTTP Requests remote format string exploit.
Author:Darkeagle
Homepage:http://unl0ck.org
File Size:3942
Last Modified:Jun 21 07:56:17 2005
MD5 Checksum:00f67cfea4ab785ecf052066a2de5a86

 ///  File Name: pafaq.pl.txt
Description:
paFaq version 1.0 Beta 4 add administrator proof of concept exploit.
Author:James Bercegay
Homepage:http://www.gulftech.org/
Related Exploit:paFaq10beta4.txt"
File Size:1697
Last Modified:Jun 21 07:24:50 2005
MD5 Checksum:e4b23110de0d22452069c17a74f0f323

 ///  File Name: paFaq10beta4.txt
Description:
paFaq version 1.0 Beta 4 suffers from SQL injection and remote command execution vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
Related Exploit:pafaq.pl.txt"
File Size:4727
Last Modified:Jun 21 07:24:00 2005
MD5 Checksum:c5a17775ac9f8c3830caec2f48aa4d7b

 ///  File Name: paFileDB113.pl.txt
Description:
PHP Arena paFileDB version 1.1.3 and below remote change password exploit.
Author:Alpha_Programmer
File Size:2686
Last Modified:Jun 18 20:06:03 2005
MD5 Checksum:85f6d340620484ad76ed616d26f4782c

 ///  File Name: paFiledb31vuln.txt
Description:
paFileDB versions 3.1 and below suffer from multiple cross site scripting, SQL injection, and local file inclusion vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:5745
Last Modified:Jun 21 06:48:48 2005
MD5 Checksum:65b8166812623165efdbd97fd9d7fccc

 ///  File Name: peercast.c
Description:
peercast version 1211 and below format string vulnerability exploit. FreeBSD version.
Author:Siim Poder
File Size:6274
Last Modified:Jul 1 07:24:44 2005
MD5 Checksum:3ac111ba31587f6a38794505bfe7480b

 ///  File Name: phpbb2_0_15.pl.txt
Description:
php 2.0.15 remote command execution exploit for viewtopic.php.
Author:dab
Homepage:http://www.digitalsec.net
File Size:1598
Last Modified:Jul 1 08:17:25 2005
MD5 Checksum:23b500675fdc94044a614e8292017bf9

 ///  File Name: phpCMS12x.txt
Description:
phpCMS 1.2.x suffers from an arbitrary file inclusion vulnerability.
Author:sk0L
Homepage:http://www.sec-consult.com
File Size:2245
Last Modified:Jun 18 21:48:52 2005
MD5 Checksum:5b8843c1fddc0a8fcffeb227365117e5

 ///  File Name: phpforum11.txt
Description:
Phpforum McGallery version 1.1 suffers from a directory traversal vulnerability.
Author:d_bug
File Size:657
Last Modified:Jun 21 06:57:05 2005
MD5 Checksum:c2aeb62cbb91fe79e5d6ca5260055752

 ///  File Name: pico33.txt
Description:
Pico Server (pServ) versions 3.3 and below suffer from directory traversal, remote command execution, and heap overflow vulnerabilities.
Author:Raphael Rigo
File Size:3680
Last Modified:Jun 21 06:25:08 2005
MD5 Checksum:6dfe54e5edc36347d81bed1e11f3ec80

 ///  File Name: portalSQL.pl.txt
Description:
Portail PHP remote SQL injection exploit for versions below 1.3.
Author:Alberto Trivero
File Size:1312
Last Modified:Jun 18 19:31:08 2005
MD5 Checksum:7b85f5c15e18592ab9bb85ee9240a628

 ///  File Name: prowebExec.txt
Description:
Community Link Pro Web Editor's Login.cgi script allows for remote code execution. Details on proper exploitation provided.
Author:spher3, mozako
Homepage:http://www.badroot.org/
File Size:1538
Last Modified:Jul 1 08:08:42 2005
MD5 Checksum:6fcf91a8d8b18dd115cf86f026958166

 ///  File Name: r57frb.pl
Description:
Forum Russian Board 4.2 Full remote command execution exploit which takes advantage of a bug in style_edit.php. Tested against Unix and Windows.
Author:RST/GHC
Homepage:http://rst.void.ru
File Size:4434
Last Modified:Jun 23 01:01:10 2005
MD5 Checksum:2032590c942efe08588f72b5e356ad76

 ///  File Name: r57mambo.pl
Description:
Mambo <= 4.5.2.1, MySQL => 4.1 exploit which injects SQL into the rating_count variable.
Author:RST/GHC
Homepage:http://rst.void.ru
File Size:7366
Last Modified:Jun 23 00:51:52 2005
MD5 Checksum:94824de4346157e8d1560f85e15c8b55

 ///  File Name: r57mercury.pl
Description:
MercuryBoard versions 1.1.4 and below remote SQL injection exploit.
Author:RST/GHC
Homepage:http://rst.void.ru/
File Size:3839
Last Modified:Jun 23 09:15:12 2005
MD5 Checksum:8c4f150082c0f6eff5d752ddc287a647

 ///  File Name: r57wp.pl
Description:
WordPress versions 1.5.1.1 and below SQL injection exploit that makes use of a bug in users.php to add a new admin user.
Author:RST/GHC
Homepage:http://rst.void.ru/
File Size:3582
Last Modified:Jun 23 09:13:29 2005
MD5 Checksum:ca93b5c505d9448b6472a9fb2bd3a80b

 ///  File Name: rakzero.zip
Description:
Proof of concept exploit for the denial of service flaws discovered in Raknet network library versions 2.33 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:rakzero.txt
File Size:6265
Last Modified:Jun 18 22:04:49 2005
MD5 Checksum:a8b80b6898ae7cfe6828e6e466281d68

 ///  File Name: spa-promail4.c
Description:
e-Post SPA-PRO Mail Solomon SPA-IMAP4S 4.01 service buffer overflow vulnerability bind shell exploit.
Homepage:http://www.security.org.sg/vuln/spa-promail4.html
File Size:7571
Last Modified:Jun 18 19:17:36 2005
MD5 Checksum:321b4d59b896be6c76e99ec7d9612738

 ///  File Name: tcpdump-bgp-update-poc.c
Description:
tcpdump bgp_update_print() remote denial of service exploit.
Author:Frederic Raynal
File Size:8950
Last Modified:Jun 18 19:44:10 2005
MD5 Checksum:c21a37d2b7daae0b53cfa2f320379a37

 ///  File Name: tftp_exp.c
Description:
FutureSoft TFTP Server 2000 remote denial of service exploit.
Author:ATmaCA
File Size:4324
Last Modified:Jun 18 19:19:45 2005
MD5 Checksum:b8c0e4111b32bff70153dcc69b5a0679