Section:  .. / 0604-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 59
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: w3wp-remote-dos.zip
Description:
w3wp remote DoS exploit due to improper reference of STA COM components in ASP.NET.
Author:Debasis Mohanty
Homepage:http://hackingspirits.com/
File Size:112243
Last Modified:Apr 6 20:35:47 2006
MD5 Checksum:237a0e4e08ad63aef0158acf40a477ae

 ///  File Name: libxine-PoC.pl
Description:
Libxine versions 1.14 and below MPEG stream buffer overflow proof of concept exploit.
Author:Federico L. Bossi Bonin
File Size:35283
Last Modified:Apr 30 06:53:25 2006
MD5 Checksum:ecfaa7d99c321245838047a4abc6b374

 ///  File Name: invvy-v2.pl
Description:
Invision Power Board 2.1.5 remote code execution exploit.
Author:Javier Olascoaga
Homepage:http://www.digitalsec.es/
File Size:11655
Last Modified:Apr 28 16:53:22 2006
MD5 Checksum:fb97144f7f18d89a32b5119c5f9df68a

 ///  File Name: php121im_14_sql_xpl
Description:
PHP121 Instant Messenger versions less than or equal to 1.4 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:9114
Last Modified:Apr 14 02:34:57 2006
MD5 Checksum:c00a00973c2cb86344288665904fb60a

 ///  File Name: fenice.c
Description:
Fenice - Open Media Streaming Server remote BOF exploit
Author:c0d3r
File Size:8724
Last Modified:Apr 26 09:10:27 2006
MD5 Checksum:5981750e77bd79d72f52447225412f18

 ///  File Name: PCPINChat-5.0.4.txt
Description:
PCPIN Chat versions less than or equal to 5.0.4 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7798
Last Modified:Apr 28 00:17:59 2006
MD5 Checksum:635b404ed19c960df6e376bb8db8bbfe

 ///  File Name: phplist_2102_incl_xpl
Description:
PHPList versions less that or equal to 2.10.2 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:7430
Last Modified:Apr 11 08:42:34 2006
MD5 Checksum:7b9a6d5867fb33a881e3ae9f2d937f98

 ///  File Name: PHPList-2.10.2
Description:
PHPList versions less than or equal to 2.10.2 remote command execution exploit. Requires register_globals to be on.
Author:rgod
File Size:7409
Last Modified:Apr 14 02:27:09 2006
MD5 Checksum:9706f79e9be15885de674e3b2caea147

 ///  File Name: ietest.html.txt
Description:
POC for the Internet Explorer Modal Dialog Issue: A malicious user could create content that would request the user to click an object or press a sequence of keys. By delivering a security prompt during this process, the site could subvert the prompting and obtain permission for actions that were not necessarily authorized.
Author:Matthew Murphy
File Size:7202
Last Modified:Apr 28 16:48:38 2006
MD5 Checksum:61e232351a27c299047e672cc590d23c

 ///  File Name: phpsurveyor_0995_xpl
Description:
PHPSurveyor versions less than or equal to 0.995 save.php/surveyid remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7106
Last Modified:Apr 28 00:19:39 2006
MD5 Checksum:2107ac047716ab96fd8d77388c0d8aad

 ///  File Name: phpmychat_015dev_xpl
Description:
PHPMyChat "SYS enter" remote command execution exploit patched to work on the 0.14.6dev to 0.15.0dev branch.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6307
Last Modified:Apr 6 21:24:10 2006
MD5 Checksum:b0a0a679030dd2a4f98c333789b927c2

 ///  File Name: PHPAlbum-0.3.2.3
Description:
PHP Album versions less than or equal to 0.3.2.3 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6305
Last Modified:Apr 19 23:29:16 2006
MD5 Checksum:a77c4a51f9e173b94244b8a2c9431e7b

 ///  File Name: phpmychat_0145_xpl
Description:
PHPMyChat less than or equal to 0.14.5 "SYS enter" remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5801
Last Modified:Apr 6 21:21:02 2006
MD5 Checksum:c092bfdea11e03ca72cf74524f25a423

 ///  File Name: AngelineCMS0.8.1.txt
Description:
Exploit for AngelineCMS 0.8.1 remote php include vulnerability in loadkernel.php.
Author:M.Hasran Addahroni
Homepage:http://www.echo.or.id
File Size:5306
Last Modified:Apr 11 03:19:05 2006
MD5 Checksum:b58c4ce7b452387b824722119ad5018b

 ///  File Name: adv28-K-159-2006.txt
Description:
Clever Copy versions less than or equal to 3.0 allows one of its configuration files to be read remotely, resulting in critical information disclosure. Exploit included.
Author:eufrato
Homepage:http://advisories.echo.or.id
File Size:5096
Last Modified:Apr 12 19:56:39 2006
MD5 Checksum:509703859e9cfdb8fe028e0863c43e8f

 ///  File Name: simplog_092_incl_xpl
Description:
Simplog versions less than or equal to 0.9.2 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5086
Last Modified:Apr 12 06:10:29 2006
MD5 Checksum:0c8523c310fd549fb920a1065f8d2013

 ///  File Name: PhpOpenChat3.0.xADODB.txt
Description:
PhpOpenChat 3.0.x and ADODB versions less than 4.70 SQL injection exploit. Requires a blank mysql root password.
Author:rgod
File Size:5083
Last Modified:Apr 14 02:16:36 2006
MD5 Checksum:0f86ebfe2fb7849f3f24dbb4aac8d0fa

 ///  File Name: ReloadCMS-1.2.5.txt
Description:
ReloadCMS versions less than 1.2.5 do not properly sanitize the user-agent request header before storing in stats.dat leading to XSS when the admin views the site statistics. Permissions can be escalated further ones logged in as admin.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:4343
Last Modified:Apr 11 03:07:44 2006
MD5 Checksum:99b485cdf47d45a2e6a18491f6dfc907

 ///  File Name: BL4-smtp.txt
Description:
BL4s SMTP server versions less than 0.1.5 suffers from a flaw that can allow remote attacker to cause a denial of service or execute arbitrary code due to a buffer overflow in the SMTP service.
Author:ECHO_ADV
Homepage:http://advisories.echo.or.id/adv/adv30-theday-2006.txt
File Size:4133
Last Modified:Apr 29 03:44:03 2006
MD5 Checksum:905bed11cacb4ab6224c1bbe3fdd8c4a

 ///  File Name: pajax-0.5.1.txt
Description:
PAJAX versions less than pajax-0.5.2 suffer from remote code injection and arbitrary file inclusion. POC included.
Author:RedTeam Pentesting
Homepage:http://www.redteam-pentesting.de
File Size:3961
Last Modified:Apr 18 01:01:08 2006
MD5 Checksum:ff73104679ac250ec3259570364bbeb7

 ///  File Name: r57phpbba2e2.pl
Description:
phpBB remote command execution exploit. Requires administrative access on the forum. Tested on 2.0.12, 2.0.13, 2.0.19.
Homepage:http://rst.void.ru
File Size:3573
Last Modified:Apr 14 02:24:51 2006
MD5 Checksum:dccfb9fe0d59e25b6af6a4f146c939b6

 ///  File Name: SA-03.txt
Description:
An example of a return into libc exploit that possibly works though grsecurity patch protection.
Homepage:http://pinkhat.org
Related File:grsec.png
File Size:3555
Last Modified:Apr 28 23:23:52 2006
MD5 Checksum:fb96640bf2648c2a5f3ec348f79a5079

 ///  File Name: horde_help_module.pm.txt
Description:
Horde versions less than or equal to 3.0.9 and 3.1.0 help viewer Metasploit Framework exploit.
Author:Inkubus Theo
File Size:3359
Last Modified:Apr 11 08:48:32 2006
MD5 Checksum:03781eabaf824513bd40c55c1d4dca18

 ///  File Name: NeonResponder-5.4.txt
Description:
Neon Responder 5.4 for Windows suffers from a DOS - sending it a specially crafted "Clock Synchronization" packet causes it to crash. POC included.
Homepage:http://www.xion-security.at
File Size:3284
Last Modified:Apr 28 23:16:33 2006
MD5 Checksum:a03fdc22463117f2bc324e0f2f615e20

 ///  File Name: confixx_exploit.pl.txt
Description:
exploit for SQL injection vulnerability in confixx professional 3.1.2
Author:defa
File Size:2873
Last Modified:Apr 28 20:19:26 2006
MD5 Checksum:fe6debcae0c63f0a248734b0e80893ed