Section:
..
/ 0506-exploits /
Page 4 of 4
<<
1
2
3
4
>>
Files 75 - 89 of 89
Currently sorted by: Last Modified
Sort By:
File Name
,
File Size
///
File Name:
Webhints.pl
Description:
Webhints version 1.03 and below remote command execution exploit. Written in Perl.
Author:
Alpha_Programmer
File Size:
2981
Last Modified:
Jun 18 19:50:50 2005
MD5 Checksum:
10cc7231571c4640de1485696c0c1152
///
File Name:
winzipBO.c
Description:
WinZip command line local buffer overflow exploit. Tested with WinZip 8.1 on Win XP SP2 EN.
Author:
ATmaCA
, Kozan
File Size:
2071
Last Modified:
Jun 18 19:46:35 2005
MD5 Checksum:
6d6c057db1a93df80a6ed4d08b8a8c5e
///
File Name:
tcpdump-bgp-update-poc.c
Description:
tcpdump bgp_update_print() remote denial of service exploit.
Author:
Frederic Raynal
File Size:
8950
Last Modified:
Jun 18 19:44:10 2005
MD5 Checksum:
c21a37d2b7daae0b53cfa2f320379a37
///
File Name:
invision.php.txt
Description:
Invision Power Board versions 2.0.3 and below Login.PHP SQL injection exploit.
File Size:
2043
Last Modified:
Jun 18 19:42:29 2005
MD5 Checksum:
808f6d1f8c898d4ad21d833d2e3cafd8
///
File Name:
wordpressSQL.txt
Description:
WordPress version 1.5.1.1 and below remote SQL injection exploit.
Author:
Alberto Trivero
File Size:
1338
Last Modified:
Jun 18 19:40:47 2005
MD5 Checksum:
41e46050f50df0e5bd4cd59fb2bc4d2a
///
File Name:
ipswitch.c
Description:
IpSwitch IMAP server LOGON stack overflow exploit with connect back shellcode.
Author:
nolimit, BuzzDee
File Size:
9782
Last Modified:
Jun 18 19:39:40 2005
MD5 Checksum:
6ecb35c8bd2155074bc7c463ae6ffe34
///
File Name:
KAV_exploit.cpp
Description:
Kaspersky AntiVirus 5.x klif.sys local privilege escalation exploit.
File Size:
3540
Last Modified:
Jun 18 19:36:57 2005
MD5 Checksum:
96a73edffad4c31a2eca1da748582351
///
File Name:
portalSQL.pl.txt
Description:
Portail PHP remote SQL injection exploit for versions below 1.3.
Author:
Alberto Trivero
File Size:
1312
Last Modified:
Jun 18 19:31:08 2005
MD5 Checksum:
7b85f5c15e18592ab9bb85ee9240a628
///
File Name:
KCpnuke-xpl.pl
Description:
PostNuke versions 0.750 and below readpmsg.php SQL injection exploit.
Author:
K-c0d3r
File Size:
1539
Last Modified:
Jun 18 19:29:08 2005
MD5 Checksum:
29acbfc5d103d168f320291b2fc98026
///
File Name:
epsxe-e.c
Description:
ePSXe version 1.6.0 and below nogui() local exploit.
Author:
Qnix
File Size:
1882
Last Modified:
Jun 18 19:24:35 2005
MD5 Checksum:
6370ed74f1cebe6583b53e9d959801c2
///
File Name:
MIRC.PAS.HTML
Description:
MIRC 6.16 and 'generic Edit component' Win32 trick exploit.
Author:
rgod
Homepage:
http://rgod.altervista.org/
File Size:
15994
Last Modified:
Jun 18 19:22:41 2005
MD5 Checksum:
36be2007dc016d57c10caed7b41990a0
///
File Name:
tftp_exp.c
Description:
FutureSoft TFTP Server 2000 remote denial of service exploit.
Author:
ATmaCA
File Size:
4324
Last Modified:
Jun 18 19:19:45 2005
MD5 Checksum:
b8c0e4111b32bff70153dcc69b5a0679
///
File Name:
spa-promail4.c
Description:
e-Post SPA-PRO Mail Solomon SPA-IMAP4S 4.01 service buffer overflow vulnerability bind shell exploit.
Homepage:
http://www.security.org.sg/vuln/spa-promail4.html
File Size:
7571
Last Modified:
Jun 18 19:17:36 2005
MD5 Checksum:
321b4d59b896be6c76e99ec7d9612738
///
File Name:
gun-imapd.c
Description:
GNU Mailutils v0.5 through v0.6.90 remote format string exploit which allows unauthenticated users to attack the imap4d service and bind a shell to port 4096.
Author:
qobaiashi
Related Exploit:
0623"
File Size:
5764
Last Modified:
Jun 17 10:33:54 2005
MD5 Checksum:
07e3e2bfead8e8d5d3aca3b27fbef847