Section:  .. / 0502-exploits  /

Page 3 of 5
<< 1 2 3 4 5 >> Files 50 - 75 of 108
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: knetDoS104c.txt
Description:
Knet versions 1.04c and below are susceptible to a remote buffer overflow vulnerability that allows for execution of code. Exploit provided.
Author:CorryL
Homepage:http://x0n3-h4ck.org
File Size:3440
Last Modified:Feb 28 07:25:44 2005
MD5 Checksum:c9d2eb21aeeefd9b8a87f0393fc2cb12

 ///  File Name: zk-mercuryboard.txt
Description:
Mercury Board versions 1.1.1 and below suffer from SQL injection vulnerabilities. Detailed exploitation provided.
Author:Zeelock
File Size:3317
Last Modified:Feb 23 05:46:21 2005
MD5 Checksum:ea5cd4602ad6da405ef1b25a8896a7ff

 ///  File Name: cycladesReveal.txt
Description:
The Cyclades AlterPath Manager (APM) Console Server has design flaws that expose restricted consoles to unauthorized APM users, allow any APM user to obtain administrative privileges, and provide detailed system information to unauthorized users.
Homepage:http://www.cirt.net/
File Size:3109
Related OSVDB(s):14073,14074
Last Modified:Feb 26 20:16:24 2005
MD5 Checksum:b05be9d4fc5d8ff1dadf3875d69ea0d1

 ///  File Name: arkeia_type77_win32.pm
Description:
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Windows version.
Author:H.D. Moore
File Size:3052
Last Modified:Feb 25 09:40:56 2005
MD5 Checksum:9253160b8213ad70e54884cc654bb859

 ///  File Name: BibORB.txt
Description:
BibORB 1.3.2 is susceptible to SQL injection, cross site scripting, directory traversal, and arbitrary file upload vulnerabilities. Detailed exploitation provided.
Author:Patrick Hof
File Size:3003
Related CVE(s):CAN-2005-0251, CAN-2005-0252, CAN-2005-0253, CAN-2005-0254
Last Modified:Feb 25 07:46:50 2005
MD5 Checksum:b5b098e976524c0ef93d06569e9c35ec

 ///  File Name: uofpConfig.txt
Description:
An active-x control used to set up e-mail, nntp, and ldap accounts in Outlook Express for the University of Phoenix allows for later account manipulation.
Author:Adam Baldwin
Homepage:http://www.evilpacket.net
File Size:2947
Last Modified:Feb 1 08:17:04 2005
MD5 Checksum:db0a1420cd7f1250206bef809ab7935d

 ///  File Name: zeroboardXSS.txt
Description:
Zeroboard is susceptible to numerous cross site scripting and path disclosure vulnerabilities.
Homepage:http://www.albanianhaxorz.org
File Size:2932
Last Modified:Feb 26 00:21:51 2005
MD5 Checksum:0c047ab66780899e831d464528dd9a63

 ///  File Name: arkeia_type77_macos.pm
Description:
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Mac OSX version.
File Size:2819
Last Modified:Feb 25 09:39:18 2005
MD5 Checksum:e633555df138c51c1585e9108b8fd5e1

 ///  File Name: wwwfileshare.c
Description:
WWW File Share Pro version 2.72 local exploit that discloses passwords.
Author:Kozan
Homepage:http://www.netmagister.com
File Size:2805
Last Modified:Feb 26 05:38:25 2005
MD5 Checksum:1396bc6f92f6f687ac3638bf0c5582f4

 ///  File Name: foxmailDoS.txt
Description:
Foxmail server version 2.0 is susceptible to a boundary error condition in the MAIL FROM: directive. Sample denial of service exploit provided.
Author:xouyang
File Size:2783
Last Modified:Feb 6 06:33:09 2005
MD5 Checksum:53745a0a1a685d27bf8cee5bfc21f743

 ///  File Name: linux-2.6.10.c
Description:
Linux v2.6.10 and below kernel exploit which allows non-privileged users to read kernel memory.
Author:Georgi Guninski
Homepage:http://www.guninski.com
Related File:where_do_you_want_billg_to_go_today_3.html
File Size:2763
Last Modified:Feb 18 09:32:42 2005
MD5 Checksum:f39502f31cc80538acad38883a2eb0ce

 ///  File Name: eXeem021.c
Description:
eXeem version 0.21 local exploit that discloses passwords for proxy settings.
Author:Kozan
Homepage:http://www.netmagister.com
File Size:2691
Last Modified:Feb 26 05:30:56 2005
MD5 Checksum:1f56bd8c9fa4abdd53b03dc6288c2435

 ///  File Name: TCW690.txt
Description:
Thomson TCW690 POST password validation exploit. Tested with hardware version 2.1 and software version ST42.03.0a.
Author:MurDoK
File Size:2677
Last Modified:Feb 25 09:24:59 2005
MD5 Checksum:bd964a49fa754263fcf02921244b10a8

 ///  File Name: savant31FR.txt
Description:
Savant Web Server version 3.1 remote buffer overflow exploit with French Windows support.
Author:Mati Aharoni, Tal Zeltzer
File Size:2459
Last Modified:Feb 25 09:17:16 2005
MD5 Checksum:960585445b69fc2524ced5c90ba39a04

 ///  File Name: r57lite211.txt
Description:
LiteForum version 2.1.1 SQL injection exploit with one char bruteforce.
Author:1dt.w0lf
Homepage:http://www.rst.void.ru
File Size:2397
Last Modified:Feb 6 05:57:39 2005
MD5 Checksum:da93868e99ea5cdfc9f0d53edfc536c4

 ///  File Name: brightstor.c
Description:
The CA BrightStor ArcServe Discovery Service overflow exploit takes advantage of a vulnerability in the CA BrightStor Discovery Service which occurs when a large request is sent to UDP port 41524, triggering a stack overflow.
Author:Thor Doomen
File Size:2385
Related CVE(s):CAN-2005-0260
Last Modified:Feb 18 07:29:04 2005
MD5 Checksum:2a8650b78261f7d78d054919e396b362

 ///  File Name: paFAQBeta4.txt
Description:
paFAQ Beta4 is susceptible to numerous SQL injection attacks.
Author:Pi3cH
Homepage:http://www.PersianHacker.NET
File Size:2309
Last Modified:Feb 25 07:39:33 2005
MD5 Checksum:7dd0ec580bb4bda135d450b882024dd3

 ///  File Name: BrightStor.c
Description:
BrightStor ARCserve Backup buffer overflow proof of concept exploit.
Author:cybertronic
Related File:02.10.05-4.txt
File Size:2303
Last Modified:Feb 23 20:37:32 2005
MD5 Checksum:fd47a0f95d693b73cdbfff072b6324bf

 ///  File Name: kayakoXSS.txt
Description:
Kayako eSupport version 2.3.1 Support Tracker software is susceptible to a cross site scripting attack.
Author:Seth Alan Woolley
File Size:2292
Last Modified:Feb 25 06:11:08 2005
MD5 Checksum:96661ec6582410616dcf2455c16594ad

 ///  File Name: bxcp0297.txt
Description:
A lack of validation in BXCP 0.2.9.7 scripts allow for local php file inclusion and path disclosure.
Homepage:http://www.ofb-clan.de/
File Size:2243
Last Modified:Feb 22 22:02:02 2005
MD5 Checksum:f210a4663f728f759172302442fbe733

 ///  File Name: ieBypass.txt
Description:
Using magic DNS, the domain name in the Internet Explorer titlebar can be exploited to trick users into visiting a malicious pop-up window. The weakness has been confirmed in version 6.0 on a fully patched system running Windows XP with SP2 installed.
Author:bitlance winter
File Size:2220
Last Modified:Feb 26 01:18:01 2005
MD5 Checksum:d469b06a4e4051d3981c2a3efdaad2f6

 ///  File Name: paNews20b4.txt
Description:
paNews version 2.0b4 is susceptible a cross site scripting vulnerability.
Author:Pi3ch
Homepage:http://www.PersianHacker.NET
File Size:2019
Last Modified:Feb 25 07:14:38 2005
MD5 Checksum:d94e23aac2b88b24cb242a3d20706dc0

 ///  File Name: a2ps.c
Description:
Local exploit for a2ps. Proof of concept and not setuid by default.
Author:lizard
File Size:2014
Last Modified:Feb 25 09:07:23 2005
MD5 Checksum:410203b0f1ffa3874e26f0f793321f7c

 ///  File Name: ex_perl.c
Description:
Local root exploit for the PerlIO package that makes use of a flaw where manipulation of the filename set in PERLIO_DEBUG allows for local root compromise when using setuid perl.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com
Related File:DMA-2005-0131a.txt
File Size:1966
Related CVE(s):CAN-2005-0155
Last Modified:Feb 22 22:50:06 2005
MD5 Checksum:1d116bc66b003097ebe3fe27d6cf172e

 ///  File Name: savant31remote.txt
Description:
Remote exploit for a buffer overflow vulnerability Savant Web Server 3.1 that allows for remote code execution by sending a malformed HTTP request.
Author:Tal Zeltzer, Mati Aharoni
File Size:1917
Last Modified:Feb 2 07:23:19 2005
MD5 Checksum:948e5a0b5a0ca01811490bc1d5ab4f4d