Section:  .. / 0505-exploits  /

Page 6 of 6
<< 1 2 3 4 5 6 >> Files 125 - 149 of 149
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: firefox0day.php.txt
Description:
Mozilla Firefox 1.0.3 remote arbitrary code execution exploit. Note added by FrSIRT that offers clarity on its functionality.
File Size:2537
Last Modified:May 27 06:55:55 2005
MD5 Checksum:0943439407d32d8b0628d34dd7cefbd3

 ///  File Name: 4DWebStar.c
Description:
4D WebStar Tomcat plugin remote buffer overflow exploit.
Author:Braden Thomas
File Size:5445
Last Modified:May 27 06:54:15 2005
MD5 Checksum:e2cf5fa8857dacb2c45c9cb8ff37df3b

 ///  File Name: ethereal-SMB-DoS.c
Description:
Ethereal versions 0.10.10 and below SMB dissector remote denial of service exploit. Tested on 0.9.4 and 0.10.10.
Author:Nicob, vade79
File Size:7583
Last Modified:May 27 06:52:45 2005
MD5 Checksum:3ab2b3f2fbc4facb56d109e6506558d3

 ///  File Name: DataTracConsole.c
Description:
DataTrac Activity Console remote denial of service exploit.
Author:INFGP
File Size:3021
Last Modified:May 27 06:50:32 2005
MD5 Checksum:d49ad8f0b24b0147eb5e84628ab537d6

 ///  File Name: ZeroBoardWorm.c
Description:
Worm source code that exploits a vulnerability in ZeroBoard, allowing arbitrary PHP code injection.
File Size:19046
Last Modified:May 27 06:48:40 2005
MD5 Checksum:8ed557ad19d75fccb2a487fb5e13c0c4

 ///  File Name: dmail_expl.c
Description:
dSMTP mail server 3.1b remote root format string exploit for Linux.
Author:cybertronic
File Size:12471
Last Modified:May 27 06:46:50 2005
MD5 Checksum:8cff01f5e63991a47652b2b70e5f43e1

 ///  File Name: IMail.pl
Description:
I-Mail Commerce i-mail.cgi remote command execution exploit.
Author:SPABAM
File Size:3372
Last Modified:May 27 06:45:40 2005
MD5 Checksum:631284e89823c94457767eb25e742cd8

 ///  File Name: hosting061.txt
Description:
Hosting Controller versions 0.6.1 and below unauthenticated user registration exploit.
File Size:1664
Last Modified:May 27 06:44:03 2005
MD5 Checksum:1be4ab8d6be384bde9bb82d9238ddb69

 ///  File Name: hpuxFTPd112144.c
Description:
HP-UX ftpd versions 1.1.214.4 and below REST remote brute force exploit.
Author:phased
File Size:1893
Last Modified:May 27 06:42:41 2005
MD5 Checksum:847b9081f154787d62abd73b02b63645

 ///  File Name: globalscape_ftp_30.pm
Description:
GlobalScape Secure FTP server 3.0.2 Build 04.12.2005.1 buffer overflow exploit.
Author:muts
File Size:4038
Last Modified:May 27 06:40:01 2005
MD5 Checksum:92016a265433a228898f20cba8c8e01e

 ///  File Name: HS_WINS.cpp
Description:
Microsoft WINS remote operating system and service pack scanner.
Author:class101
Homepage:http://class101.org/
File Size:15461
Last Modified:May 27 06:38:30 2005
MD5 Checksum:739132900a7a83429858f19d37409e1b

 ///  File Name: arpusCE.pl
Description:
ARPUS ce local overflow exploit that achieves root privileges. Written in perl.
Author:Kevin Finisterre
File Size:727
Last Modified:May 27 06:17:18 2005
MD5 Checksum:a4eb37bd65ef52ff81506a1c246336ce

 ///  File Name: arpusCE.c
Description:
ARPUS ce local file overwrite exploit that makes use of a faulty exported DISPLAY.
Author:Kevin Finisterre
File Size:2622
Last Modified:May 27 06:15:58 2005
MD5 Checksum:6ba0f4488a75cada27f74aff626ede8c

 ///  File Name: ESRI9x.c
Description:
ESRI 9.x Arcgis local root format string exploit. Tested on Solaris 10.
Author:Kevin Finisterre, John H.
File Size:6736
Last Modified:May 27 06:12:44 2005
MD5 Checksum:d250611e1ce24040cbb19e2ac5585286

 ///  File Name: cryptoloop_exploit.tar
Description:
Demonstration of vulnerabilities in Linux's cryptoloop encrypted file system support. Cryptoloop is vulnerable to watermarking, where you can determine whether or not a known watermarked file is present within an encrypted filesystem, even with the key(s) for that filesystem.
Author:Jari Ruusu
Homepage:http://marc.theaimsgroup.com/?l=linux-kernel&m=107719798631935&w=2
File Size:10240
Last Modified:May 25 20:31:39 2005
MD5 Checksum:770e8c995dc7e6ad8286dc30f08da246

 ///  File Name: webapp-config-05182005.txt
Description:
Gentoo webapp-config prior to v1.10-r14 insecure temp file creation advisory and local root exploit. Requires that the root user installs, upgrades, or deletes a Gentoo provided web application with the webapp-config tool. More information available here.
Author:Eric Romang
Homepage:http://www.zataz.net/
File Size:3523
Last Modified:May 23 00:03:30 2005
MD5 Checksum:5bfc5eee34fea8c7adaa88174a9466fd

 ///  File Name: mfsa200539.txt
Description:
Mozilla Firefox sidebar code execution proof of concept exploit.
Homepage:http://www.frsirt.com
File Size:539
Last Modified:May 22 21:17:37 2005
MD5 Checksum:500ab62f0fe5d09d439b3d7eeef57a11

 ///  File Name: ecl-winipdos.c
Description:
Proof of concept denial of service exploit for windows that takes advantage of an off-by-one validation error in the IP options field.
Author:Yuri Gushin, Alex Behar
File Size:3670
Last Modified:May 22 20:00:20 2005
MD5 Checksum:5604a878fbe7d738535cd90f3a34d11c

 ///  File Name: dc_phpcoin.txt
Description:
phpCoin versions 1.2.2 and lower contain multiple SQL injection vulnerabilities. Example exploit URL included in advisory.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:5204
Last Modified:May 7 19:00:57 2005
MD5 Checksum:d5249a8881994826b4f915cb875750eb

 ///  File Name: dc_metacart_sqling.txt
Description:
Multiple SQL injection vulnerabilities in metacart2 for payflow. Example exploit URL included in advisory.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:1710
Last Modified:May 7 17:44:18 2005
MD5 Checksum:36ed40131025266df8227f13f7a39b67

 ///  File Name: dc_metabid_sqlinj.txt
Description:
Metabid contains multiple SQL injection vulnerabilities. Username / Password verification can be bypassed via SQL injection, and more issues exist. Advisory contains example exploit URL.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:1183
Last Modified:May 7 17:28:36 2005
MD5 Checksum:cf175e30c0afdd373d2ead33e631abcb

 ///  File Name: 7330ecart.pl
Description:
E-Cart remote command execution exploit. Executes a reverse shell using a buggy open() call in E-Cart.
Author:Emanuele Gentili
Related File:E-Cartv1.1_cmdexec.txt
File Size:2429
Last Modified:May 7 16:26:35 2005
MD5 Checksum:25108dd22eaa16d1702602c0954cc226

 ///  File Name: StorePortal2.63_sqlinj.txt
Description:
Store Portal 2.63 is vulnerable to SQL injection. Example exploit URL included in advisory.
Author:Diabolic Crab
Homepage:http://digitalparadox.org/
File Size:4066
Last Modified:May 7 16:14:58 2005
MD5 Checksum:d8a52a5b3ad9b0dccf64c6f771d81116

 ///  File Name: rfm10.c
Description:
06:59:15 2005 Remote File Manager version 1.0 denial of service exploit.
Author:INFGP
File Size:2479
Last Modified:May 27 ze:ro: zero
MD5 Checksum:d4a49db7651dea3422a841bff7bb2de2