Section:  .. / 0410-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 60 of 60
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: parachat55.txt
Description:
ParaChat server version 5.5 is susceptible to a directory traversal attack.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1473
Last Modified:Oct 7 05:10:33 2004
MD5 Checksum:5142f53be781a230176f5d818bb2bc62

 ///  File Name: iceexec.zip
Description:
Remote proof of concept exploit for Icecast versions 2.0.1 and below on win32.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:icecast201.txt
File Size:7130
Last Modified:Oct 7 05:06:52 2004
MD5 Checksum:f4d0c6007f41ee72ae16a1869a4dcf64

 ///  File Name: sacred_jpg.c
Description:
GDI+ buffer overrun exploit that builds a malicious .JPG file.
Author:Crypto
File Size:23491
Related CVE(s):CAN-2004-0200
Last Modified:Oct 7 05:03:19 2004
MD5 Checksum:4cd6913e57956a3bb37690712ce74cb3

 ///  File Name: serendipityPoC.txt
Description:
Serendipity 0.7-beta1 and below proof of concept SQL injection exploit that dumps the administrator's username and md5 password hash.
Author:aCiDBiTS
File Size:1871
Last Modified:Oct 1 18:31:03 2004
MD5 Checksum:fa4a99a6347d410345afafd3477bb084

 ///  File Name: zinfexploit.c
Description:
Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.
Author:delikon, Luigi Auriemma
Homepage:http://www.delikon.de/
File Size:4966
Last Modified:Oct 1 18:11:46 2004
MD5 Checksum:04b0fede58545ec6f3d333dc5701dbf6

 ///  File Name: phpPOC.txt
Description:
PHP proof of concept exploit that makes use of an arbitrary file upload flaw in PHP versions below 4.3.9 and 5.0.2.
Author:Stefano Di Paola
Homepage:http://www.wisec.it/news.php?lang=en
File Size:5110
Last Modified:Oct 1 17:28:43 2004
MD5 Checksum:82bbf54363bb3c8d4fb0c1e2add5924a

 ///  File Name: alexPHP.txt
Description:
The Alex PHP Guestbook suffers from a remote file inclusion vulnerability due to a lack of proper sanitization in it's chem_absolu variable.
Author:Nourredine Himeur aka LostNoobs
File Size:784
Last Modified:Oct 1 17:15:02 2004
MD5 Checksum:50681ffb30663115d47d0831fcee8800

 ///  File Name: chatmanx.zip
Description:
Remote denial of service exploit that makes use of a memory allocation flaw in Chatman versions 1.5.1 RC1 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:chatman151.txt
File Size:8533
Last Modified:Oct 1 16:58:27 2004
MD5 Checksum:8c96d31c3538cedc5a2eb018eb7fd74c

 ///  File Name: yahooPOPS.txt
Description:
Remote buffer overflows in both the POP3 and SMTP services of the YahooPOPs application can allow for arbitrary code execution. Exploit included.
Author:Behrang Fouladi, Nima Majidi
File Size:5547
Last Modified:Oct 1 16:20:52 2004
MD5 Checksum:f002a2cc9c2caf0a8929abe9b6f23386

 ///  File Name: mssql.7.0.dos.c
Description:
Mssql 7.0 remote denial of service buffer overflow exploit. Affects Mssql 7.0 Service Pack sp0, sp1, sp2, and sp3. Stops the service "mssqlserver".
Author:securma massine
File Size:2062
Last Modified:Oct 1 06:59:20 2004
MD5 Checksum:e8c0985b3c6498ec6d29ec73f7f7a661