Section:  .. / 0506-exploits  /

Page 4 of 4
<< 1 2 3 4 >> Files 75 - 89 of 89
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: Webhints.pl
Description:
Webhints version 1.03 and below remote command execution exploit. Written in Perl.
Author:Alpha_Programmer
File Size:2981
Last Modified:Jun 18 19:50:50 2005
MD5 Checksum:10cc7231571c4640de1485696c0c1152

 ///  File Name: winzipBO.c
Description:
WinZip command line local buffer overflow exploit. Tested with WinZip 8.1 on Win XP SP2 EN.
Author:ATmaCA, Kozan
File Size:2071
Last Modified:Jun 18 19:46:35 2005
MD5 Checksum:6d6c057db1a93df80a6ed4d08b8a8c5e

 ///  File Name: tcpdump-bgp-update-poc.c
Description:
tcpdump bgp_update_print() remote denial of service exploit.
Author:Frederic Raynal
File Size:8950
Last Modified:Jun 18 19:44:10 2005
MD5 Checksum:c21a37d2b7daae0b53cfa2f320379a37

 ///  File Name: invision.php.txt
Description:
Invision Power Board versions 2.0.3 and below Login.PHP SQL injection exploit.
File Size:2043
Last Modified:Jun 18 19:42:29 2005
MD5 Checksum:808f6d1f8c898d4ad21d833d2e3cafd8

 ///  File Name: wordpressSQL.txt
Description:
WordPress version 1.5.1.1 and below remote SQL injection exploit.
Author:Alberto Trivero
File Size:1338
Last Modified:Jun 18 19:40:47 2005
MD5 Checksum:41e46050f50df0e5bd4cd59fb2bc4d2a

 ///  File Name: ipswitch.c
Description:
IpSwitch IMAP server LOGON stack overflow exploit with connect back shellcode.
Author:nolimit, BuzzDee
File Size:9782
Last Modified:Jun 18 19:39:40 2005
MD5 Checksum:6ecb35c8bd2155074bc7c463ae6ffe34

 ///  File Name: KAV_exploit.cpp
Description:
Kaspersky AntiVirus 5.x klif.sys local privilege escalation exploit.
File Size:3540
Last Modified:Jun 18 19:36:57 2005
MD5 Checksum:96a73edffad4c31a2eca1da748582351

 ///  File Name: portalSQL.pl.txt
Description:
Portail PHP remote SQL injection exploit for versions below 1.3.
Author:Alberto Trivero
File Size:1312
Last Modified:Jun 18 19:31:08 2005
MD5 Checksum:7b85f5c15e18592ab9bb85ee9240a628

 ///  File Name: KCpnuke-xpl.pl
Description:
PostNuke versions 0.750 and below readpmsg.php SQL injection exploit.
Author:K-c0d3r
File Size:1539
Last Modified:Jun 18 19:29:08 2005
MD5 Checksum:29acbfc5d103d168f320291b2fc98026

 ///  File Name: epsxe-e.c
Description:
ePSXe version 1.6.0 and below nogui() local exploit.
Author:Qnix
File Size:1882
Last Modified:Jun 18 19:24:35 2005
MD5 Checksum:6370ed74f1cebe6583b53e9d959801c2

 ///  File Name: MIRC.PAS.HTML
Description:
MIRC 6.16 and 'generic Edit component' Win32 trick exploit.
Author:rgod
Homepage:http://rgod.altervista.org/
File Size:15994
Last Modified:Jun 18 19:22:41 2005
MD5 Checksum:36be2007dc016d57c10caed7b41990a0

 ///  File Name: tftp_exp.c
Description:
FutureSoft TFTP Server 2000 remote denial of service exploit.
Author:ATmaCA
File Size:4324
Last Modified:Jun 18 19:19:45 2005
MD5 Checksum:b8c0e4111b32bff70153dcc69b5a0679

 ///  File Name: spa-promail4.c
Description:
e-Post SPA-PRO Mail Solomon SPA-IMAP4S 4.01 service buffer overflow vulnerability bind shell exploit.
Homepage:http://www.security.org.sg/vuln/spa-promail4.html
File Size:7571
Last Modified:Jun 18 19:17:36 2005
MD5 Checksum:321b4d59b896be6c76e99ec7d9612738

 ///  File Name: gun-imapd.c
Description:
GNU Mailutils v0.5 through v0.6.90 remote format string exploit which allows unauthenticated users to attack the imap4d service and bind a shell to port 4096.
Author:qobaiashi
Related Exploit:0623"
File Size:5764
Last Modified:Jun 17 10:33:54 2005
MD5 Checksum:07e3e2bfead8e8d5d3aca3b27fbef847