exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 92 RSS Feed

Files

exim.pl.txt
Posted Jan 16, 2005
Authored by Rafael San Miguel Carrasco | Site dvc.es

Proof of concept exploit for the locally exploitable buffer overflow in Exim version 4.41.

tags | exploit, overflow, proof of concept
SHA-256 | a3703739ac743a76f5e34f4b14e40e5c169129e1431122ee072a0597ad2ba497
siteman119.txt
Posted Jan 16, 2005
Authored by Pi3cH | Site persianhacker.net

Siteman version 1.1.9 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | e80dd8eb12e76829443ea47b0ca233d7382c4328f5d33c7d4206955bd26662b5
ss11012005.txt
Posted Jan 16, 2005
Authored by SmOk3

MPM Guestbook Pro 1.05 is susceptible to file inclusion and directory traversal attacks.

tags | exploit, file inclusion
SHA-256 | bd873c882571bb58ef6d64418f8f55cbf92793860c9f7d62816db4ac2fa81055
breedzero.zip
Posted Jan 16, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service proof of concept exploit for the Breed game server that crashes upon accepting an empty UDP packet.

tags | exploit, remote, denial of service, udp, proof of concept
SHA-256 | 90b331b9e3b1f4f07df307eb710d50ccf1aa56a88ebdb3f89d780cf9049f0898
r57ita.pl.txt
Posted Jan 16, 2005
Authored by 1dt.w0lf | Site rst.void.ru

ITA Forum 1.49 SQL injection exploit with one character bruteforce.

tags | exploit, sql injection
SHA-256 | 2e1f9c9d8e1c7b34aa1a3cd45aac2108339a478a3d27ff0ed4012a4e18b82d51
ieBarBypass.txt
Posted Jan 16, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Microsoft Internet Explorer 6 is susceptible to a flaw that allows for malicious file download via manipulation of the File Download Information bar functionality.

tags | exploit
SHA-256 | 9819de7846ae70cadf20f378c91cc61117a83847a9ab9ea1767507c8b371ec78
forumKIT.txt
Posted Jan 16, 2005
Authored by ne0

forumKIT 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6838b682b5f32e1beb7f6200c5cdac9786c241115776b6c8d1e6fe8a36c72614
STG Security Advisory 2005-01-13.25
Posted Jan 16, 2005
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: An input validation flaw in ZeroBoard can allow malicious attackers the ability to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user.

tags | exploit, arbitrary
SHA-256 | 0c9e35a9c275bc19120772f641e5b82ca15d9b4c4e3661ccf564440202b8c080
H2005-01.txt
Posted Jan 16, 2005
Authored by Robert Fly | Site hyperdose.com

Horde 3.0 contains two XSS attacks that can be exploited through GET requests. Once exploited, these requests could be used to execute any javascript commands in the context of that user, potentially including but not limited to reading and deleting email, and stealing authentication tokens.

tags | exploit, javascript
SHA-256 | 74a66b7743cd681267539641ac2b61777f2dca3586fbe4f9c385f6dd94d19edf
vanisher.tgz
Posted Jan 15, 2005
Authored by Assaf Reshef | Site underwar.livedns.co.il

Proof of concept exploit for the Windows ANI File Parsing vulnerability along with a complete detailed paper describing the process of creating it.

tags | exploit, proof of concept
systems | windows
SHA-256 | ffba59f6dfec03389c5e1d961d4a05a3a53fc3cbbf541367bf3885c7b77566d2
waraxe-2005-SA039.txt
Posted Jan 15, 2005
Authored by Janek Vind aka waraxe | Site waraxe.us

SGallery version 1.01 suffers from path disclosure, file inclusion, and SQL injection bugs.

tags | exploit, sql injection, file inclusion
SHA-256 | 63e83634fdc1f28b76fb5d6c48aae1837f5ddd74bbe1b90923816331b5dbc867
arkeia.txt
Posted Jan 15, 2005
Authored by Maciej Bogucki

Arkeia versions 4.2.x, 5.2.x, and 5.3.x all have blank default root passwords and various other flaws.

tags | exploit, root
SHA-256 | 7d5be354b29fc5701ad583c134c26444425e523e05d233ff9ea5ff438ba0f3f2
InternetExploiter3.2.zip
Posted Jan 15, 2005
Authored by SkyLined | Site edup.tudelft.nl

InternetExploiter 3, .ANI-file Animation header length stack based buffer overflow exploit for Internet Explorer. Uses Cascading Style Sheets to load a malicious animated cursor. Runs a bindshell on port 28876.

tags | exploit, overflow
SHA-256 | 2c241ffbbd01971af65ed38f537c9d5cc267d13e058013c5e7fd39635abbc94c
stackgrow.c
Posted Jan 15, 2005
Authored by Christophe Devine

expand_stack SMP race proof of concept exploit that makes use of a locally exploitable flaw in the Linux page fault handler code.

tags | exploit, proof of concept
systems | linux
advisories | CVE-2005-0001
SHA-256 | d3d25f66960b33f304bf4382ad16d8f3fcd86d9c63cf0fd47c4257c388fa98d0
iis_w3who_overflow.pm
Posted Jan 12, 2005
Authored by H D Moore | Site metasploit.com

Remote buffer overflow exploit for the w3who.dll in Microsoft Windows 2000. Drops to a command shell.

tags | exploit, remote, overflow, shell
systems | windows
advisories | CVE-2004-1134
SHA-256 | 791c811f7b49febb9fa1bb40a85b1ab1d9f1f2712120f52a797cf5c3770e9942
wins_ms04_045.pm
Posted Jan 12, 2005
Authored by H D Moore | Site metasploit.com

Remote Microsoft Windows WINS exploit created by the Metasploit Framework.

tags | exploit, remote
systems | windows
SHA-256 | 389f409a7d45860686e46e3506c07570873310d3c58abcf4654df37406bd247e
LSS-2005-01-03.txt
Posted Jan 12, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-01-03 - There is a privilege escalation and arbitrary file read vulnerability in ftpfile, the Squirrelmail Vacation plugin. Version 0.15 is affected. Detailed exploitation provided.

tags | exploit, arbitrary
SHA-256 | 7688f4089c87f00981c0f9d4b007b41913c9605ad778a2cfa060942962b562f8
veritasABS.c
Posted Jan 12, 2005
Authored by class101

Remote stack overflow exploit for Veritas Backup Exec. Works for versions 9.1.4691.SP1, 9.1.4691.SP0, and 8.5.3572. Allows for a shell to be bound to port 101 or it spawn a reverse shell as well.

tags | exploit, remote, overflow, shell
advisories | CVE-2004-1172
SHA-256 | 66d099090c243e36b9f7564b05d434f6f4b2b0d4406b819eb60322f646d6b2fc
winToken.c
Posted Jan 12, 2005

Local privilege escalation exploit for the improper token validation vulnerability discovered in Microsoft Windows 2000/2003/XP.

tags | exploit, local
systems | windows
SHA-256 | ff2667276d645551dbd24afe95ca5f4631323cfd8b7dd7ffb5bbb7cb99e91911
PSA05-010.txt
Posted Jan 12, 2005
Authored by Paul J Docherty

Portcullis Security Advisory - The Emotion MediaPartner Web Server version 5.0 suffers from a classic directory traversal attack.

tags | exploit, web
SHA-256 | 6be621a00b4ac12f30f5e4697e1024e0eab7f2133fbd8e721232b10ea90de2e7
invisionSQL.txt
Posted Jan 11, 2005
Authored by darkhawk matrix | Site matrix2k.org

The Invision Community Blog system is susceptible to a SQL injection attack on the eid variable.

tags | exploit, sql injection
SHA-256 | 36265105588ccc92584f9456a31f92502a12abd1b33d0faae8566e5fc2d61e61
woltlabXSS.txt
Posted Jan 11, 2005
Authored by Martin Heistermann

Woltlab Burning Board Lite version 1.0.0 and 1.0.1e are susceptible to a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 6de24017e17875d943c41277f135a9f35263b691c2126505a2cfda4256449ff4
sphpBlog037.txt
Posted Jan 11, 2005
Authored by Madelman

SPHPBlog 0.3.7c is susceptible to a directory traversal attack. Fixed in release 0.3.7r2.

tags | exploit
SHA-256 | e36068983fcd00d46f6dcd628206297051c8060e3793ed88228add5b177e6284
isec-0021-uselib.txt
Posted Jan 7, 2005
Authored by Paul Starzetz | Site isec.pl

Locally exploitable flaws have been found in the Linux binary format loaders' uselib() functions that allow local users to gain root privileges. Linux kernel versions 2.4 up to and including 2.4.29-pre3, 2.6 up to and including 2.6.10 are affected. Exploit included.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2004-1235
SHA-256 | dc8912477cabd4620eccb9621b77afc571d533b90b200dfc6fc0b9d16173ee04
amp2zero.zip
Posted Jan 7, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept denial of service exploit for the Amp II 3D game engine that is susceptible to attack when receiving UDP datagrams of zero bytes.

tags | exploit, denial of service, udp, proof of concept
SHA-256 | 80d677ae8b10d22ddbe0c994296c32782336b61e029dcafac8acdd83a4c4290d
Page 3 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close