Section:  .. / 0503-exploits  /

Page 3 of 6
<< 1 2 3 4 5 6 >> Files 50 - 75 of 141
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: HRG008.txt
Description:
sendpm.php in PBLang 4.63 allows logged in users to view password hashes of other users.
Author:Raven
Homepage:http://www.Hackerlounge.com
File Size:2852
Last Modified:Mar 3 08:11:58 2005
MD5 Checksum:30b5b4ca76976e21a6f6a5a6181208bc

 ///  File Name: HRG009.txt
Description:
A flaw in PBLang 4.63 allows logged in users to delete another user's PM.
Author:Raven
Homepage:http://www.Hackerlounge.com
File Size:2395
Last Modified:Mar 3 08:12:49 2005
MD5 Checksum:33ca2b9e8c8e5709390dfceaf4a503eb

 ///  File Name: includercgi.txt
Description:
The Includer is susceptible to a classic directory traversal flaw.
Author:cout
File Size:908
Last Modified:Mar 22 06:51:49 2005
MD5 Checksum:f00b6976e57e90bcad4e40829c7116f4

 ///  File Name: includerExec.txt
Description:
The Includer is susceptible to a remote command execution flaw.
Author:Francisco Alisson
File Size:275
Last Modified:Mar 15 05:19:50 2005
MD5 Checksum:3de883cdaf8d1cffca5cc39f71c749fb

 ///  File Name: invision203.txt
Description:
Invision Power Board version 2.0.3 is susceptible to cross site scripting attacks.
Author:hoang yen
File Size:1940
Last Modified:Mar 30 10:44:56 2005
MD5 Checksum:50b26457115de6ae46e31dd967810418

 ///  File Name: iso9660handler.txt
Description:
Linux kernel versions up to and including 2.6.11 has various bugs in the ISO9660 filesystem handler code that can cause denial of service conditions. Script included that tests for this.
Author:Michal Zalewski
Homepage:http://lcamtuf.coredump.cx/
File Size:2834
Last Modified:Mar 22 07:04:30 2005
MD5 Checksum:fb79fae45422b5b0d2f4483d0c1516ee

 ///  File Name: kayakoXSS2.txt
Description:
Kayako eSupport version 2.3 is susceptible to multiple cross site scripting attacks.
Author:James Bercegay
File Size:1784
Last Modified:Mar 24 06:43:25 2005
MD5 Checksum:e178ffb3f374a8a65248e81119eff5f2

 ///  File Name: kernel26lowmem.txt
Description:
An integer overflow flaw exists in sys_epoll_wait in the Linux kernel 2.6 series in versions equal to or below 2.6.11. Sample exploitation provided.
Author:Georgi Guninski
File Size:2060
Last Modified:Mar 15 07:15:05 2005
MD5 Checksum:46cd73464c9edcec833e5046efbddce9

 ///  File Name: knowledgeBuilder.txt
Description:
KnowledgeBuilder from ActiveCampaign Inc. is susceptible to a remote file inclusion flaw.
Author:Dominus_Vis
File Size:327
Last Modified:Mar 17 07:33:45 2005
MD5 Checksum:607d9b336b229869f16df6d9fddebd21

 ///  File Name: krad.c
Description:
Local exploit for linux 2.6.11 and below. Kernel memory can be overwritten because of an integer overflow in sys_epoll_wait, and "misuse of __put_user in ep_send events".
Homepage:http://www.hysteria.sk/
File Size:8163
Last Modified:Mar 22 02:18:14 2005
MD5 Checksum:9c7322258789e9090b4be1bad608d58c

 ///  File Name: lameSeries60NokiaDoS.pl
Description:
This is a very simple exploit for a very stupid bug in Nokia/Symbian Series60 bluetooth device-name handling: basically, if your bluetooth device name contains a single newline character, a Nokia Series60 device which sees it will be extremely unhappy and go on strike. The attached "exploit" creates a file with a newline. Which you must then copy to your own device manually. All in only around 60 lines of Perl. However, securityfocus added this "exploit" to their archives, so why shouldn't we add it to ours as well?
Author:q-nix
File Size:1721
Last Modified:Mar 25 18:05:55 2005
MD5 Checksum:0e93465e98290633c9d072a499afd739

 ///  File Name: limehack.pl
Description:
Limewire directory traversal exploit. Exploits bug in versions 4.1.2 - 4.5.6, inclusive.
Author:Marco van Berkum
Homepage:http://jammerjoh.xs4all.nl
Related Exploit:limewire480.txt"
File Size:2198
Last Modified:Mar 27 12:26:18 2005
MD5 Checksum:dfa8a4ee0a01e7310d4c9ee1e46e77c3

 ///  File Name: limewire480.txt
Description:
Limewire versions prior to 4.8.0 suffer from various flaws including arbitrary file access and directory traversal attacks.
Author:Kevin Walsh
File Size:3359
Last Modified:Mar 17 09:19:17 2005
MD5 Checksum:8f27a7837a63c605639fc2f799846d9a

 ///  File Name: luxman_ex2.pl
Description:
LuxMan 0.41-19.1 local root exploit that makes use of a buffer overflow.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related File:DMA-2005-0310a.txt
File Size:1526
Related CVE(s):CAN-2005-0385
Last Modified:Mar 17 09:10:56 2005
MD5 Checksum:0094b1891f80cdef312e7f98c37199ba

 ///  File Name: mailenable.tar.gz
Description:
Denial of service exploit that makes use of a format string vulnerability in MailEnable Standard Edition 1.8.
Author:Mati Aharoni
Homepage:http://www.see-security.com
File Size:603
Last Modified:Mar 22 07:00:01 2005
MD5 Checksum:d359cd11dc5351aa169b3cce17f5410c

 ///  File Name: mixedSQL.txt
Description:
PostNuke phpBB versions 1.2 and below are susceptible to the same SQL injection vulnerabilities originally found in phpBB itself. Detailed exploitation provided.
Author:Jocanor
File Size:1717
Last Modified:Mar 2 05:04:12 2005
MD5 Checksum:6d17681fb94d24e54bece66ba8c55279

 ///  File Name: ms04038.c
Description:
Exploit for Internet Explorer (mshtml.dll) that makes use of a buffer overflow when parsing Cascading Style Sheets (CSS) files. This code creates a .css file that exploits the flaw. Reported in MS04-038.
Author:Mansoor to shooq
File Size:1894
Last Modified:Mar 15 07:22:10 2005
MD5 Checksum:983f2cfe531be8432cd1b2b03a811652

 ///  File Name: obsdDoS.c
Description:
OpenBSD 2.0 through 3.6 remote denial of service exploit that makes use of a timestamp flaw that causes the system to crash.
Homepage:http://rst.void.ru
File Size:4201
Last Modified:Mar 15 07:56:41 2005
MD5 Checksum:2a0e7e21417d754e4b88fbea3b9d9775

 ///  File Name: oracleXSS10g.txt
Description:
The Oracle Reports Server 10.g (9.0.4.3.3) is susceptible to cross site scripting attacks in an example jsp.
Author:Paolo
File Size:394
Last Modified:Mar 25 06:23:55 2005
MD5 Checksum:daab618212007a31361ddc2208b57c02

 ///  File Name: osCommerce2.txt
Description:
osCommerce versions 2.x suffer from a directory traversal attack that allows for access to directories outside of the webroot. Besides using the download action, the read action is also usable.
Author:Megasky
File Size:246
Last Modified:Mar 24 06:46:58 2005
MD5 Checksum:bba5fef32c2d3ad380a12417f41d46de

 ///  File Name: p_wu.c
Description:
Exploit for wu-ftpd that makes use of the globbing denial of service flaw.
Author:pi3
Homepage:http://www.pi3.int.pl
File Size:10040
Last Modified:Mar 3 21:11:39 2005
MD5 Checksum:074375ec147f3f0171a811c271fa1758

 ///  File Name: pabox20.txt
Description:
PaBox version 2.0 is susceptible to cross site scripting attacks via a variable that gets user defined and later used in an IMG tag.
Author:Rift
File Size:1358
Last Modified:Mar 17 08:30:27 2005
MD5 Checksum:a2cfd3c7026dab0f4cca68d6ef8f39a5

 ///  File Name: pafileDB31.txt
Description:
paFileDB versions 3.1 and below are susceptible cross site scripting and SQL injection attacks.
Author:sp3x
Homepage:http://www.securityreason.com
File Size:3968
Last Modified:Mar 17 07:47:30 2005
MD5 Checksum:4cfe80b15c174a8a1d3d9f0972dfb206

 ///  File Name: paFileDB31.txt
Description:
paFileDB versions 3.1 and below suffer from cross site scripting and path disclosure flaws.
Author:sp3x
File Size:5730
Last Modified:Mar 15 06:13:30 2005
MD5 Checksum:b5dec74179f24061018b880f2bc2f335

 ///  File Name: panews.txt
Description:
paNews version 2.0b4 is susceptible to SQL injection and remote code execution attacks. Written in Spanish. Detailed exploitation provided.
Author:FraMe
Homepage:http://www.kernelpanik.org
File Size:5232
Last Modified:Mar 1 23:11:27 2005
MD5 Checksum:36960591e314e91ab210afc48367ac1b