Section:  .. / 0411-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 77
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: HOD-kerio-firewall-DoS-expl.c
Description:
Denial of service exploit for Kerio Personal Firewall version 4.1.1 and below. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet.
Author:houseofdabus
Related File:eEye.kerio.txt
File Size:11858
Last Modified:Nov 12 21:39:21 2004
MD5 Checksum:2155470b61ae00f217da31c8c79a9285

 ///  File Name: hppsc2510.txt
Description:
The HP PSC 2510 runs an FTP daemon that is not configurable and allows anyone to upload a file to be printed without any authentication.
Author:Justin Rush
File Size:680
Last Modified:Nov 13 01:00:44 2004
MD5 Checksum:9b0747282dd6250fc93d6d79edfff70e

 ///  File Name: icewarpWebmail528.txt
Description:
Merak Mail Server 7.5.2 with Icewarp Web Mail 5.2.8 is susceptible to various file maniuplation and cross site scripting flaws. Version 7.6.0 with Icewarp 5.3.0 is susceptible to two of these flaws.
Author:ShineShadow
File Size:7420
Last Modified:Nov 10 07:10:03 2004
MD5 Checksum:dd067576d99f6064b1f74c3ea4eab194

 ///  File Name: InternetExploiter.html.gz
Description:
InternetExploiter.html is a remote exploit for the IE IFRAME html tag buffer overflow vulnerability which binds a shell to tcp port 28876. Tested against IE 6.0 on Win XP SP1 and IE 6.0 on Win2k.
Author:Berend-Jan Wever
File Size:2444
Last Modified:Nov 4 03:12:23 2004
MD5 Checksum:bf16e05027e12afc00e3f08f4cc13f9b

 ///  File Name: ipbSQL.txt
Description:
IPB Pro Arcade versions 1.x and 2.x are susceptible to SQL injection attacks. Exploitation included.
Author:axl daivy
File Size:647
Last Modified:Dec 11 19:03:28 2004
MD5 Checksum:a64714c0a7ef56e2584fa62a39ec3ced

 ///  File Name: IPSwitch-IMail-8.13-DELETE.pl
Description:
Remote exploit for the IPSwitch-IMail 8.13 stack overflow in the DELETE command. Successful exploitation binds a shell to port 4444.
Author:Muts, Zatlander
Homepage:http://www.whitehat.co.il/
File Size:4239
Last Modified:Nov 20 19:50:14 2004
MD5 Checksum:de63548e8c2828dfabc692609516742f

 ///  File Name: IPSWSFTP-exploit.c
Description:
Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.
Author:Noph0bia
Related File:wsftp503.txt
File Size:4385
Last Modified:Dec 12 00:14:41 2004
MD5 Checksum:bdf3611955ed2ad4e6a80a5a5b0adfa7

 ///  File Name: iptablesDoS.c
Description:
Proof of concept denial of service exploit for iptables versions below 2.6.8 that makes use of an integer overflow in the logging functionality.
Author:Felix Zhou
File Size:3886
Related CVE(s):CAN-2004-0816
Last Modified:Nov 5 05:27:25 2004
MD5 Checksum:79ef4a5bdf0cc12b669100a8e9a7c411

 ///  File Name: janados.zip
Description:
Remote denial of service exploit for Jana server 2 versions 2.4.4 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:janados.txt
File Size:7850
Last Modified:Dec 12 00:34:07 2004
MD5 Checksum:22ecc84b906bffd5bc9d5d101be7570f

 ///  File Name: lostmonGmail.txt
Description:
Gmail suffers from multiple vulnerabilities including denial of service and cross site scripting flaws.
Author:Lostmon
File Size:1668
Last Modified:Dec 11 19:12:16 2004
MD5 Checksum:fe1ee1fe5d98fbd5ed7cd9c0967cc22e

 ///  File Name: mailtraq-update.txt
Description:
Mailtraq Version 2.6.1.1677 remote exploit which allows SYSTEM level access while using the Mailtraq administration console. Requires a Mailtraq admin account.
Author:Travis Schack
File Size:2841
Last Modified:Nov 24 05:42:17 2004
MD5 Checksum:427df7d3b6fffda815a1a52caea03bb8

 ///  File Name: mailtraq.txt
Description:
A privilege escalation technique can be used to gain SYSTEM level access while using the Mailtraq administration console. Mailtraq Version 2.6.1.1677 is vulnerable.
Author:Reed Arvin
File Size:1383
Last Modified:Nov 20 23:25:31 2004
MD5 Checksum:570f63e06a088944b32ac1db1e0bb12f

 ///  File Name: mdaemon72.txt
Description:
A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.
Author:Reed Arvin
File Size:878
Last Modified:Dec 11 23:58:08 2004
MD5 Checksum:ab98079c7abf569bb92b4d337713545b

 ///  File Name: mercury.c
Description:
Mercury Mail 4.01 (Pegasus) IMAP remote buffer overflow exploit.
Author:Muts
Homepage:http://www.whitehat.co.il
File Size:1637
Last Modified:Dec 12 00:24:30 2004
MD5 Checksum:f016a7e00aaf8c91e97a3f1f0e9aa791

 ///  File Name: mp-invision.txt
Description:
An input validation vulnerability in Invision Power Board version 2.x allows a remote user the ability to conduct SQL injection attack.
Homepage:http://www.maxpatrol.com
File Size:2099
Last Modified:Nov 20 22:59:45 2004
MD5 Checksum:172eba93ee042464d0c8803a4e663fab

 ///  File Name: mp-ldu.txt
Description:
MaxPatrol Advisory - Land Down Under version 701 suffers from multiple SQL injection vulnerabilities and a path disclosure flaw.
Homepage:http://www.maxpatrol.com/
File Size:1995
Last Modified:Nov 2 02:20:36 2004
MD5 Checksum:fe76194db83bf381c91dca9983e9611e

 ///  File Name: msieLocalFile.txt
Description:
Microsoft Internet Explorer permits an attacker the ability to verify the existence of local files via Active Scripting.
Author:Benjamin Tobias Franz
File Size:3117
Last Modified:Nov 10 07:29:32 2004
MD5 Checksum:57f08cd8371ea7a5d9868b89d23e26df

 ///  File Name: nsg-advisory-08.txt
Description:
TipxD versions 1.1.1 and below suffer from a local format string vulnerability. Proof of concept local exploit included.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:6557
Last Modified:Nov 20 22:03:02 2004
MD5 Checksum:f59247ae7c9a0aee1868abb9434094bc

 ///  File Name: OpenDcHub-poc.zip
Description:
Proof of concept exploit for a buffer overflow vulnerability that exists in Open Dc Hub version 0.7.14.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
Related File:opendchub0714.txt
File Size:3255
Last Modified:Dec 11 20:25:30 2004
MD5 Checksum:e3de5e9b0a3845f37783964004b88ef8

 ///  File Name: orbzbof.zip
Description:
Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:orbzbof.txt
File Size:8963
Last Modified:Dec 12 00:17:42 2004
MD5 Checksum:a35a9e2f70a3186a2be48a01942794d8

 ///  File Name: phpbb.php.txt
Description:
Remote command execution exploit for phpBB 2.0.10 that makes use of a flaw in the viewtopic.php code.
Author:How Dark, pokleyzz
Homepage:http://www.howdark.com
File Size:1481
Last Modified:Nov 20 23:55:49 2004
MD5 Checksum:f921925d25c8aefc535037fe9d34cefd

 ///  File Name: phpbb2011.txt
Description:
phpBB versions below 2.0.11 suffer from addition SQL injection and directory traversal flaws.
Author:Zeelock
File Size:3717
Last Modified:Dec 11 23:15:27 2004
MD5 Checksum:3db6cdf08707e750aade88f2b48d5986

 ///  File Name: phpbugtraq.txt
Description:
PHP Bug Traq 0.9.1 is susceptible to SQL injection attacks.
Author:How Dark
Homepage:http://www.howdark.com/
File Size:4542
Last Modified:Nov 13 05:10:14 2004
MD5 Checksum:ac683be3267fd8d8a84233ffd5009310

 ///  File Name: phpkitSQLXSS.txt
Description:
PHP KIT versions 1.6.03 through 1.6.1 suffer from SQL injection and cross site scripting vulnerabilities. Demonstration exploitation included.
Author:Steve
File Size:1263
Last Modified:Dec 11 19:13:41 2004
MD5 Checksum:a6c57e9918b15f57703753c4b8f197dd

 ///  File Name: phpnews.txt
Description:
Simple remote exploit for the SQL injection vulnerability discovered in PHPNews.
Author:ruggine
Related File:sa13300.txt
File Size:1638
Last Modified:Dec 11 23:24:10 2004
MD5 Checksum:3542945d30741fed34e9faa2fc32c92a