Section:  .. / 0504-exploits  /

Page 3 of 6
<< 1 2 3 4 5 6 >> Files 50 - 75 of 138
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: NotJustBrowsing.c
Description:
NotJustBrowsing 1.0.3 local password disclosure exploit.
Author:Kozan, ATmaCA
Homepage:http://www.netmagister.com
File Size:1787
Last Modified:May 27 05:20:20 2005
MD5 Checksum:b8b97ef4385caaf817bd6d09c05de3b4

 ///  File Name: MaxDB750023.c
Description:
MySQL MaxDB Webtool versions 7.5.00.23 and below remote stack overflow exploit.
Author:cybertronic
File Size:8737
Last Modified:May 27 05:18:47 2005
MD5 Checksum:cd4e3524d325145e70af818295bd7afd

 ///  File Name: RatBof.cpp
Description:
Internet Explorer content advisor exploit that is related to MS05-020.
Author:Andres Tarasco, Miguel Tarasco Acuna
Homepage:http://www.haxorcitos.com/
File Size:8679
Last Modified:May 27 05:16:33 2005
MD5 Checksum:cf0ff753894931c20f3c60077a8bcacf

 ///  File Name: yager524.txt
Description:
Yager versions 5.24 and below remote buffer overflow exploit.
Author:cybertronic
File Size:11068
Last Modified:May 27 05:12:13 2005
MD5 Checksum:c6e8301ac079758cc358cddccdcf96d8

 ///  File Name: msbv5120-xhacker.tar.gz
Description:
Motorola SBV5120 cable modem denial of service exploit v0.1.
Author:X-Hacker
File Size:7671
Last Modified:Apr 28 06:24:09 2005
MD5 Checksum:8fcb34b9de0660ee6d76d1a921e7b077

 ///  File Name: xtcpdump-isis-dos.c
Description:
Tcpdump v3.8.x/3.9.1 remote infinite loop denial of service exploit which takes advantage of the isis_print() function by sending a GRE packet.
Author:vade79
Homepage:http://fakehalo.us/
File Size:6903
Last Modified:Apr 27 09:08:47 2005
MD5 Checksum:a350bbe8a4a509d9a7ea62aee31f4411

 ///  File Name: xtcpdump-bgp-dos.c
Description:
Tcpdump v3.8.x and below remote denial of service exploit which causes tcpdump to go into an infinite loop when it processes an evil BGP packet. Works if TCP port 179 is not filtered.
Author:vade79
Homepage:http://fakehalo.us/
File Size:9854
Last Modified:Apr 27 09:04:44 2005
MD5 Checksum:7910a287be1c5dc61afe4be886bba8be

 ///  File Name: xtcpdump-ldp-dos.c
Description:
Tcpdump v3.8.3 and below remote denial of service exploit which causes tcpdump to go into an infinite loop when it processes an evil LDP packet.
Author:vade79
Homepage:http://fakehalo.us/
File Size:8022
Last Modified:Apr 27 08:59:41 2005
MD5 Checksum:3991741f125a8d4af45b16bccb9449a5

 ///  File Name: xtcpdump+ethr-rsvp-dos.c
Description:
Tcpdump v3.9.1 and below and Ethereal v0.10.10 and below remote denial of service exploit which takes advantage of a bug in rsvp_print().
Author:vade79
Homepage:http://fakehalo.us/
File Size:7185
Last Modified:Apr 27 08:56:05 2005
MD5 Checksum:e53d15334d77bab6ccbe7c0f187f5ca9

 ///  File Name: sumus_exploit.txt
Description:
Sumus, a Internet-based cardgame program, is vulnerable to a stack-based buffer-overflow in the server component.
File Size:16065
Last Modified:Apr 21 00:11:09 2005
MD5 Checksum:eaf54b1362348681b9d86ec29f77a1ca

 ///  File Name: all4www_homepagecreator.txt
Description:
All4WWW-Homepagecreator is vulnerable to a trivial file-inclusion attack, EVEN IF PHP is configured securely.
File Size:518
Last Modified:Apr 21 00:07:57 2005
MD5 Checksum:4b5f64c45cdfc03070ae6456e3f3d9f7

 ///  File Name: lgfreeze.mid
Description:
Example of malformed MIDI ringtone which can be used to cause a Denial of Service condition in LG-U8120 mobile phones.
Author:Luca Ercoli
Homepage:http://www.lucaercoli.it
Related File:lg8120_midi_dos.txt
File Size:65
Last Modified:Apr 21 00:02:21 2005
MD5 Checksum:7242ca0578f85229cc7affa3c306d0e3

 ///  File Name: predebug1.c
Description:
Example predebug code execution exploit, demonstrating how programmers being loaded into debuggers can attack the machine running the debugger. Example showing simple command execution.
Author:brett.moore
Homepage:http://www.security-assessment.com
Related File:PreDebug.pdf
File Size:717
Last Modified:Apr 20 23:19:49 2005
MD5 Checksum:325726bc63cc5a8f626fa768b126b5c3

 ///  File Name: predebug2.c
Description:
Example predebug code execution exploit, demonstrating how programmers being loaded into debuggers can attack the machine running the debugger.
Author:Brett Moore
Homepage:http://www.security-assessment.com
Related File:PreDebug.pdf
File Size:2431
Last Modified:Apr 20 23:17:32 2005
MD5 Checksum:907e08389bb6518f3a430653e9701216

 ///  File Name: plsql_multiplestatement_injection.t..>
Description:
Specialized exploit for cases where SQL injection is possible against a Oracle PL/SQL setup.
Author:Esteban Martinez Fayo
File Size:1996
Last Modified:Apr 19 22:27:17 2005
MD5 Checksum:e45da5398455857dcb6ca69306692fd2

 ///  File Name: oracle_sdo_code_size.c
Description:
Exploit for buffer overflow vulnerability in procedure MDSYS.MD2.SDO_CODE_SIZE within Oracle Database Server version 10.1.0.2 under Windows 2000 SP4.
Author:Esteban Martinez Fayo
File Size:1702
Related OSVDB(s):15559
Last Modified:Apr 19 22:20:25 2005
MD5 Checksum:7eb1cc643d279d60af99034d31251a25

 ///  File Name: adz_serendipity.pl
Description:
Serendipity 0.8beta4 beta.php SQL injection exploit.
Author:kre0n
Homepage:http://adz.void.ru
Related File:serendipity.txt
File Size:1656
Last Modified:Apr 19 22:13:26 2005
MD5 Checksum:3fb91f9270b546c0a65143f61330f813

 ///  File Name: dc_phpbb_xss_sql.txt
Description:
Multiple SQL injection and Cross-site Scripting issues in phpBB versions 1.52 and below. Example exloit URLs included in advisory.
Author:Diabolic Crab
Homepage:http://digitalparadox.org/
File Size:11201
Last Modified:Apr 19 22:03:07 2005
MD5 Checksum:dce346b3035978e6fc023bea3968340f

 ///  File Name: MSHTA_POC.c
Description:
Proof-of-Concept code to generate a file with an embedded CLSID, demonstrating how the issues detailed in the iDEFENSE "MSHTA" advisory, MS05-016, and other places, can be exploited.
Author:zwell
Related File:04.12.05d.txt
File Size:67444
Related OSVDB(s):15469
Related CVE(s):CAN-2005-0063
Last Modified:Apr 19 21:19:14 2005
MD5 Checksum:66526ae9cf6d8807e20d726865c4e389

 ///  File Name: msjet101.c
Description:
This is a slightly modified version of Stuart Pearson's original exploit for the malformed MDB parsing vulnerabilities in Microsoft Access.
Author:Nanika
Homepage:http://www.chroot.org
Related File:msjet40.txt
File Size:13214
Related OSVDB(s):15187
Last Modified:Apr 19 21:14:31 2005
MD5 Checksum:58309d996a709cef628983b1a7fb353a

 ///  File Name: msjet40.txt
Description:
Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll.
Author:Tal Zeltzer
Homepage:http://www.see-security.com
File Size:13106
Last Modified:Apr 19 08:47:28 2005
MD5 Checksum:8fbfb0d2fde9b9855da7d5229ae5341b

 ///  File Name: ie_dhtml_poc.txt
Description:
Proof-of-Concept exploit code for the MSIE DHTML object handling vulnerabilities (described in MS05-20).
Author:Berend-Jan Wever
Homepage:http://www.edup.tudelft.nl/~bjwever
Related File:04.12.05c.txt
File Size:2063
Related OSVDB(s):15465
Related CVE(s):CAN-2005-0553
Last Modified:Apr 19 00:08:59 2005
MD5 Checksum:4682b826fd776764dcb3dbc6ee5c81c8

 ///  File Name: eGroupWare_infoleak.txt
Description:
eGroupWare contains a bug where mail attachments could be sent to the wrong recipient by mistake, due to eGroupWare caching attachments after a user decides to cancel a message.
Author:Gerald Quakenbush
Homepage:http://www.mastermindsecuritygroup.com
File Size:2038
Last Modified:Apr 18 22:58:20 2005
MD5 Checksum:b47ae0f4b64381cf82e80f88cee4e95c

 ///  File Name: 101_WINS.cpp
Description:
Remote heap buffer overflow exploit for the Microsoft Windows Internet Name Service. Tested against Win2k SP4 Advanced Server English. This exploit can bind a shell to port 101 or will reverse a cmd shell back to a listener.
Author:class101
Homepage:http://www.hat-squad.com/
File Size:12044
Last Modified:Apr 18 22:45:38 2005
MD5 Checksum:b08e8dd6c1b44ec43827c25a4d9c7598

 ///  File Name: EXPL-A-2005-006.txt
Description:
XAMPP contains multiple vulnerabilities, including default usernames / passwords and Cross-site scripting issues. Example exploit URLs provided as part of advisory.
Author:Morning Wood
Homepage:http://exploitlabs.com
File Size:3902
Last Modified:Apr 18 22:41:13 2005
MD5 Checksum:6bba4395d9f460bc982e51b85993f88a