Section:  .. / 0503-exploits  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 141
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: socialMPN.txt
Description:
Simple exploit to test for the file inclusion bug in SocialMPN.
Author:y3dips
File Size:1093
Last Modified:Mar 15 05:21:01 2005
MD5 Checksum:2701e7621e0f2296e6048c23c0314705

 ///  File Name: includerExec.txt
Description:
The Includer is susceptible to a remote command execution flaw.
Author:Francisco Alisson
File Size:275
Last Modified:Mar 15 05:19:50 2005
MD5 Checksum:3de883cdaf8d1cffca5cc39f71c749fb

 ///  File Name: phpFM.py.txt
Description:
PHP Form Mail script versions 2.3 and below arbitrary file inclusion proof of concept exploit.
Author:Filip Groszynski, mozako
File Size:1529
Last Modified:Mar 12 15:00:06 2005
MD5 Checksum:7026ad2d00437b60280e41a4477bb5e8

 ///  File Name: phpfusionXSS.txt
Description:
php-fusion is susceptible to a cross site scripting attack. Detailed exploitation explained.
Author:FireSt0rm
File Size:1014
Last Modified:Mar 12 14:57:21 2005
MD5 Checksum:608e2fc3d17ae084e2013e13c8eb1a0e

 ///  File Name: 101_cali.c
Description:
This exploit takes advantage of a stack overflow vulnerability in the CA License Server network service. Versions 1.61 and below are susceptible.
Author:class101
Homepage:http://class101.org
File Size:9525
Related CVE(s):CAN-2005-0581
Last Modified:Mar 12 14:44:24 2005
MD5 Checksum:1c41bb753f9fbfaceacd948f79cb654b

 ///  File Name: aztec-sploit.c
Description:
Forum-Aztek version 4.0 myadmin.php remote database dumping exploit.
Author:sirius black
Homepage:http://lotfree.next-touch.com
File Size:2594
Last Modified:Mar 12 14:40:56 2005
MD5 Checksum:3b2183b32dd8a9db3e347bc39973d9c7

 ///  File Name: windos.c
Description:
Windows Server 2003 and XP SP2 remote denial of service exploit. Tested under OpenBSD 3.6 at WinXP SP 2.
Author:Dejan Levaja, blf
Homepage:http://rst.void.ru/
File Size:3412
Last Modified:Mar 12 14:33:50 2005
MD5 Checksum:129840210f9ea044fcaf6ce091df7708

 ///  File Name: phpBB2012session.txt
Description:
phpBB 2.0.12 session handling exploit that allows for administrative compromise.
Author:PPC
File Size:6795
Last Modified:Mar 12 14:18:20 2005
MD5 Checksum:b5fac8b0f1a6f8e4e7a195394cc3dd5d

 ///  File Name: formmail23.txt
Description:
Form Mail versions 2.3 and below suffer from a remote file inclusion flaw.
Author:Filip Groszynski
File Size:1399
Last Modified:Mar 7 07:47:20 2005
MD5 Checksum:94a44fe2bb187a0b870debe33a7b9a17

 ///  File Name: dcl15.txt
Description:
Download Center Lite (DCL) versions 1.5 and below are susceptible to remote file inclusion.
Author:Filip Groszynski
File Size:1369
Last Modified:Mar 7 07:39:33 2005
MD5 Checksum:6d07e272a4aa94584a5d3dd9d76afa7c

 ///  File Name: browserDisclose.txt
Description:
Multiple browsers suffer from a sensitive information disclosure flaw. Proof of concept exploitation included.
Author:bitlance winter, Mr. Upken
Homepage:http://xxx.upken.jp/report/ieup/
File Size:5286
Last Modified:Mar 7 07:32:01 2005
MD5 Checksum:5c1f473f56be5c55cffdfb88d30db573

 ///  File Name: calicserv_getconfig.pm
Description:
This module exploits an vulnerability in the CA License Server network service. This is a simple stack overflow and just one of many serious problems with this software.
Author:Thor Doomen
Related Exploit:calicclnt_getconfig.pm"
File Size:5698
Related CVE(s):CAN-2005-0581
Last Modified:Mar 5 09:14:20 2005
MD5 Checksum:5d5717adee8004068faf13819201da0d

 ///  File Name: calicclnt_getconfig.pm
Description:
This module exploits a vulnerability in the CA License Client service. This exploit will only work if your IP address will resolve to the target system. This can be accomplished on a local network by running the nmbd service that comes with Samba. If you are running this exploit from Windows and do not filter udp port 137, this should not be a problem (if the target is on the same network segment). Due to the bugginess of the software, you are only allowed one connection to the agent port before it starts ignoring you. If it was not for this issue, it would be possible to repeatedly exploit this bug.
Author:Thor Doomen
Related Exploit:calicserv_getconfig.pm"
File Size:5887
Related CVE(s):CAN-2005-0581
Last Modified:Mar 5 09:11:21 2005
MD5 Checksum:5f30efcc5644f136b804b24acf550c1c

 ///  File Name: trackercam_phparg_overflow.pm
Description:
This module exploits a simple stack overflow in the TrackerCam web server. All current versions of this software are vulnerable to a large number of security issues. This module abuses the directory traversal flaw to gain information about the system and then uses the PHP overflow to execute arbitrary code.
Author:H.D. Moore
Related File:tcambof.txt
File Size:5760
Related CVE(s):CAN-2005-0478
Last Modified:Mar 5 09:02:38 2005
MD5 Checksum:d1d59e296d7230da0e457966cb682f6d

 ///  File Name: typo3sql.txt
Description:
TYPO3 SQL injection proof of concept exploit.
Author:James
Homepage:http://www.gulftech.org/
File Size:1514
Last Modified:Mar 5 08:51:40 2005
MD5 Checksum:0ecd774f10bc2467c580ca5171f14eff

 ///  File Name: ca3dex.zip
Description:
Proof of concept exploit for Carsten's 3D Engine which suffers from a format string vulnerability allowing an attacker to execute remote code.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:ca3dex-adv.txt
File Size:8465
Last Modified:Mar 4 22:00:36 2005
MD5 Checksum:ca97dd0456a07e892943832667a928d3

 ///  File Name: phpbb2013.txt
Description:
phpBB 2.0.13 fails to properly sanitize some variables in the usercp_register.php script.
Author:Paisterist
Homepage:http://neosecurityteam.tk/
File Size:3755
Last Modified:Mar 4 05:48:18 2005
MD5 Checksum:9a3e536fd600d5c387014b661b44afbf

 ///  File Name: foros32.txt
Description:
FOROS version 3.2 allows for account compromise by changing the username and forumid in a cookie to someone else's.
Author:Black Angel
File Size:879
Last Modified:Mar 4 05:39:12 2005
MD5 Checksum:0719f7a4d7744c6076f3ed3194c1aacc

 ///  File Name: phpN.py.txt
Description:
PHP News version 1.2.4 remote file inclusion exploit.
Author:mozako, Filip Groszynski
Related Exploit:phpnews124.txt"
File Size:1481
Last Modified:Mar 4 03:57:38 2005
MD5 Checksum:f9e7a7e9570696f231c4cde4e982c27d

 ///  File Name: p_wu.c
Description:
Exploit for wu-ftpd that makes use of the globbing denial of service flaw.
Author:pi3
Homepage:http://www.pi3.int.pl
File Size:10040
Last Modified:Mar 3 21:11:39 2005
MD5 Checksum:074375ec147f3f0171a811c271fa1758

 ///  File Name: awstats_shell.c
Description:
Awstats remote exploit that allows for remote command execution on the host with privileges of the httpd process. Versions 5.7 through 6.2 are affected.
Author:omin0us
Homepage:http://dtors.ath.cx
Related File:01.17.05-AW.txt
File Size:6123
Last Modified:Mar 3 21:08:53 2005
MD5 Checksum:013f1d4f9dea1eb5306233d718365dc9

 ///  File Name: trillian.py
Description:
Trillian Basic 3.0 PNG image processing buffer overflow exploit.
Author:Tal zeltzer
Homepage:http://www.see-security.com
File Size:3319
Last Modified:Mar 3 21:06:02 2005
MD5 Checksum:c15e3a70fdf8683431153ccd1b3868b8

 ///  File Name: CProxyRemote.txt
Description:
Computalynx CProxy versions 3.3.x and 3.4.x are susceptible to denial of service and directory traversal attacks. Detailed exploitation provided.
Author:Kristof Philipsen
Homepage:http://www.ubizen.com
File Size:7683
Last Modified:Mar 3 09:09:48 2005
MD5 Checksum:05b98151b8be9c8567463fcbb2759c40

 ///  File Name: goldenFTP192.txt
Description:
Golden FTP server version 1.92 suffers from a buffer overflow when more than 284 characters is entered in the Username field at logon. As EIP can be overwritten, it is possible to execute arbitrary code in systems running this version of the daemon.
Author:Carlos Ulver
Homepage:http://www.debarry2.com.br/carlos
File Size:1821
Last Modified:Mar 3 09:06:12 2005
MD5 Checksum:bed2eb002971805d613a3305ca538276

 ///  File Name: AuraCMS.txt
Description:
Aura CMS version 1.5 is susceptible to full path disclosure and cross site scripting flaws.
Author:y3dips
Homepage:http://y3dips.echo.or.id/
File Size:3506
Last Modified:Mar 3 09:01:48 2005
MD5 Checksum:613f6bea3eaa31c8ca70c2705acd0a5b