Section:  .. / 0506-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 89
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: goodtechDoS.txt
Description:
GoodTech SMTP Server for Windows NT/2000/XP version 5.14 is susceptible to a denial of service vulnerability.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/
File Size:1444
Last Modified:Jun 20 08:59:15 2005
MD5 Checksum:865e9cb2d4c6232438f6ab88a1e22c39

 ///  File Name: gun-imapd.c
Description:
GNU Mailutils v0.5 through v0.6.90 remote format string exploit which allows unauthenticated users to attack the imap4d service and bind a shell to port 4096.
Author:qobaiashi
Related Exploit:0623"
File Size:5764
Last Modified:Jun 17 10:33:54 2005
MD5 Checksum:07e3e2bfead8e8d5d3aca3b27fbef847

 ///  File Name: hostingController.txt
Description:
Hosting Controller suffers from a cross site scripting flaw.
Author:Action Spider
File Size:2961
Last Modified:Jul 1 07:03:06 2005
MD5 Checksum:08cab0f5b3506af6f9266f460bc84b7b

 ///  File Name: IAeMailServer_DOS.pl.txt
Description:
A denial of service vulnerability exists in the True North Software IA eMailServer Corporate Edition version 5.2.2. Build: 1051. Input to the IMAP4 LIST command is not properly checked. Perl exploit provided.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/
File Size:1752
Last Modified:Jun 29 10:36:31 2005
MD5 Checksum:49463a1e24a79a951d044d3dadaa0090

 ///  File Name: ieCrash-javaprxy.txt
Description:
A heap corruption vulnerability exists in the javaprxy.dll in Internet Explorer 6. Sample denial of service exploit included.
Author:sk0L, Martin Eiszner
Homepage:http://www.sec-consult.com
File Size:3011
Last Modified:Jul 1 07:27:59 2005
MD5 Checksum:ca5d482698e5f9c6feeab50732b88227

 ///  File Name: igallery33.txt
Description:
i-Gallery versions 3.3 and below suffer from a directory traversal vulnerability and cross site scripting flaws.
Author:Seyed Hamid Kashfi
Homepage:http://www.hat-squad.com/
File Size:2351
Last Modified:Jun 23 09:20:50 2005
MD5 Checksum:3f1cc193ca9ed14b18f053dc22bc804c

 ///  File Name: imTRBBS.txt
Description:
Original imTRBBS versions 1.02 and below allow for remote command execution due to a lack of properly sanitized input in im_trbbs.cgi.
Author:blahplok
File Size:550
Last Modified:Jul 1 07:33:39 2005
MD5 Checksum:e2f1f4aed623bf85112f072bdb54fbc4

 ///  File Name: Infradig60.txt
Description:
Infradig Systems Inframail Advantage Server Edition 6.0 suffers from multiple buffer overflows. Sample denial of service exploits included.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/
File Size:3364
Last Modified:Jul 1 06:57:21 2005
MD5 Checksum:9ffd0b4310c54c96ad38236984614c66

 ///  File Name: invision.php.txt
Description:
Invision Power Board versions 2.0.3 and below Login.PHP SQL injection exploit.
File Size:2043
Last Modified:Jun 18 19:42:29 2005
MD5 Checksum:808f6d1f8c898d4ad21d833d2e3cafd8

 ///  File Name: invisionGallery.txt
Description:
Invision Gallery versions prior to 1.3.1 suffer from cross site scripting and SQL injection vulnerabilities. Exploitation details included.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2637
Last Modified:Jun 21 06:18:26 2005
MD5 Checksum:3b8ddfba4788851d9a14d7edf5f601f1

 ///  File Name: invisionXSSSQL.txt
Description:
Invision Blog versions prior to 1.1.2 Final suffer from cross site scripting and SQL injection vulnerabilities. Exploitation details provided.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2486
Last Modified:Jun 21 06:16:12 2005
MD5 Checksum:4abe7b5b770fc7b66017269ee1c645cb

 ///  File Name: ipdatalook.txt
Description:
IP-DATALOOK versions 1.3 and below local denial of service exploit.
Author:basher13
Homepage:http://infamous.2hell.com
File Size:4035
Last Modified:Jun 26 08:54:04 2005
MD5 Checksum:6647d59cdb87b50fed488336655dca48

 ///  File Name: ipswitch.c
Description:
IpSwitch IMAP server LOGON stack overflow exploit with connect back shellcode.
Author:nolimit, BuzzDee
File Size:9782
Last Modified:Jun 18 19:39:40 2005
MD5 Checksum:6ecb35c8bd2155074bc7c463ae6ffe34

 ///  File Name: KAV_exploit.cpp
Description:
Kaspersky AntiVirus 5.x klif.sys local privilege escalation exploit.
File Size:3540
Last Modified:Jun 18 19:36:57 2005
MD5 Checksum:96a73edffad4c31a2eca1da748582351

 ///  File Name: KCcol-xpl.pl
Description:
Perl version of the Claroline e-Learning version 1.6 and below remote password hash extraction SQL injection exploit.
Author:K-C0d3r
File Size:1457
Last Modified:Jun 21 07:09:54 2005
MD5 Checksum:0ac46af2ede123a753211fce255eebfe

 ///  File Name: KCpnuke-xpl.pl
Description:
PostNuke versions 0.750 and below readpmsg.php SQL injection exploit.
Author:K-c0d3r
File Size:1539
Last Modified:Jun 18 19:29:08 2005
MD5 Checksum:29acbfc5d103d168f320291b2fc98026

 ///  File Name: ldsoWhoops.txt
Description:
ld.so from Solaris 9 and 10 does not check the LD_AUDIT environment variable when running setuid and setgid binaries, allowing a malicious party to run arbitrary code with elevated privileges.
Author:Przemyslaw Frasunek
File Size:1718
Last Modified:Jun 29 10:44:26 2005
MD5 Checksum:02b0fa3de66ae2c25e511bb747ec86a9

 ///  File Name: lokiSQL.txt
Description:
The Loki download manager is susceptible to SQL injection attacks.
Author:hack_912
File Size:342
Last Modified:Jun 20 09:20:18 2005
MD5 Checksum:9caea66bc21bc83d132af820079d3a1d

 ///  File Name: lpanelClient.txt
Description:
Lpanel versions 1.59 and below allows any logged in user to view any client invoice information.
File Size:3226
Last Modified:Jun 18 22:21:02 2005
MD5 Checksum:937b3d42221d3db972fc3559c9677eb6

 ///  File Name: lpanelPlain.txt
Description:
Lpanel versions 1.59 and below suffer from a cross site scripting flaw in viewticket.php.
File Size:4574
Last Modified:Jun 18 22:16:03 2005
MD5 Checksum:69f921c83ba44dd826cf73ae57650a6c

 ///  File Name: M4DR007-07SA.txt
Description:
Cross site scripting, HTTP Response splitting, and SQL injection vulnerabilities exist in ASP Nuke versions 0.80 and below.
Author:Alberto Trivero
File Size:5676
Last Modified:Jun 29 10:28:39 2005
MD5 Checksum:0cd8b64d7f6e4e78b1a45cd1bfff8a67

 ///  File Name: M4DR007.pl
Description:
Webhints version 1.0.3 and below remote command execution exploit.
Author:madroot security group
Homepage:http://www.madroot.edu.ms
File Size:3435
Last Modified:Jun 18 19:54:35 2005
MD5 Checksum:32992be26b1fbf11cbba43868935c102

 ///  File Name: mambo4521.php.txt
Description:
Mambo 4.5.2.1 + MySQL 4.1 fetch password hash exploit.
Author:pokleyzz
File Size:5961
Last Modified:Jun 18 20:01:57 2005
MD5 Checksum:3b64e18e2b44aaf09e9d4cdf94494f94

 ///  File Name: mast.txt
Description:
MAST RunAsP.exe version 3.5.1 suffers from a local privilege escalation vulnerability.
Author:traxx
File Size:1344
Last Modified:Jun 21 06:39:57 2005
MD5 Checksum:a82c309e523a3fc714770b3a124244c2

 ///  File Name: memfs.c
Description:
Proof of concept exploit for a memory disclosure vulnerability that exists in FUSE versions below 2.3.0.
Author:Sven Tantau
Homepage:http://www.sven-tantau.de/
Related File:fuseDisclose.txt
File Size:2432
Last Modified:Jun 18 22:34:46 2005
MD5 Checksum:1eefaaa038bfe2e407174f6a8de7c306