Exploit the possiblities
Showing 1 - 25 of 108 RSS Feed

Files

0502-exploits.tgz
Posted Mar 1, 2005
Authored by Todd J.

Packet Storm new exploits for February, 2005.

tags | exploit
MD5 | ab1eb6fa04a25b510796e7b6bf18ac72
badblue.cpp
Posted Feb 28, 2005
Authored by Andres Tarasco, Miguel

BadBlue webserver version 2.55 remote buffer overflow exploit. Tested under Windows 2000 Professional SP3/SP4 Spanish, Windows 2000 Server SP4 Spanish, and Windows XP SP1 Spanish.

tags | exploit, remote, overflow
systems | windows, 2k, xp
MD5 | 5529b72cb5a1e55ee5a545eee55e8adc
badblue25.c
Posted Feb 28, 2005
Authored by class101, Andres Tarasco | Site Hat-Squad.com

BadBlue webserver version 2.5 is susceptible to a remote buffer overflow vulnerability that allows for code execution. Full exploit provided.

tags | exploit, remote, overflow, code execution
MD5 | b199afc5574630ee6ece67c8d1c7d8af
knetDoS104c.txt
Posted Feb 28, 2005
Authored by CorryL | Site x0n3-h4ck.org

Knet versions 1.04c and below are susceptible to a remote buffer overflow vulnerability that allows for execution of code. Exploit provided.

tags | exploit, remote, overflow
MD5 | c9d2eb21aeeefd9b8a87f0393fc2cb12
CIS3513.txt
Posted Feb 28, 2005
Authored by CorryL

CIS WebServer version 3.5.13 is susceptible to a classic directory traversal attack.

tags | exploit
MD5 | 8ddb6a4d31dd61f9b9a44f94d44f79fa
advisory003.txt
Posted Feb 28, 2005
Authored by John Gumbel

Improper handling of several arguments in the moderate.php code in punbb version 1.2.1 allows a malicious moderator to inject arbitrary SQL statements.

tags | exploit, arbitrary, php
MD5 | 0fa245da1da2ee450650915c291a331a
advisory002.txt
Posted Feb 28, 2005
Authored by John Gumbel

Due to a flaw in punbb version 1.2.1, a remote attacker without an account can set the password of any user on the system to NULL, effectively shutting them out of the system.

tags | exploit, remote
MD5 | 2fca37c706129ea7a3acd4dc2f838553
advisory001.txt
Posted Feb 28, 2005
Authored by John Gumbel

A remote attacker can cause register.php punbb version 1.2.1 to execute arbitrary SQL statements by supplying malicious values to the language or email parameters.

tags | exploit, remote, arbitrary, php
MD5 | 49e3dec810dbe71cfb281699c1269f7d
sof2guidboom.zip
Posted Feb 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for a denial of service flaw in Soldier of Fortune II versions 1.03 and below.

tags | exploit, denial of service, proof of concept
MD5 | 6b5ce84269c5f3dbf5a53e46c70a1a33
phpMyAdmin261.txt
Posted Feb 26, 2005
Authored by Maksymilian Arciemowicz

phpMyAdmin versions 2.6.1 and below suffer from remote file inclusion and cross site scripting flaws. Detailed exploitation given.

tags | exploit, remote, xss, file inclusion
MD5 | 943aaf73594eaf3a6329bd1ea8d69e72
cycladesReveal.txt
Posted Feb 26, 2005
Site cirt.net

The Cyclades AlterPath Manager (APM) Console Server has design flaws that expose restricted consoles to unauthorized APM users, allow any APM user to obtain administrative privileges, and provide detailed system information to unauthorized users.

tags | exploit
MD5 | b05be9d4fc5d8ff1dadf3875d69ea0d1
wuftpd262DoS.c
Posted Feb 26, 2005
Authored by str0ke | Site milw0rm.com

wu-ftpd versions 2.6.2 and below file globbing denial of service exploit.

tags | exploit, denial of service
MD5 | 2e6a392d582fec375515b21f8f5022e2
sileAWSxpl_v5.7-6.2.c
Posted Feb 26, 2005
Authored by Silentium | Site autistici.org

Remote pluginmode command execution exploit for AWStats versions 5.7 through 6.2.

tags | exploit, remote
MD5 | a3c1e41a10460242dd78ea43169acc88
avaya.cpp
Posted Feb 26, 2005
Authored by PAgVac

Avaya IP Office Phone Manager exploit that attempts to extract sensitive data from the Windows registry.

tags | exploit, registry
systems | windows
MD5 | 9666749b62f499e1f04e9084c391876b
webconnect.pl
Posted Feb 26, 2005
Authored by KarakOrsan

WebConnect remote exploit that makes use of a directory traversal vulnerability in versions 6.4.4 and 6.5.

tags | exploit, remote
MD5 | 87be5ea960b62e6bab82d1a72e4b7e5a
wwwfileshare.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

WWW File Share Pro version 2.72 local exploit that discloses passwords.

tags | exploit, local
MD5 | 1396bc6f92f6f687ac3638bf0c5582f4
ChatAnywhere.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

Chat Anywhere version 2.72a local exploit that discloses passwords.

tags | exploit, local
MD5 | 32c7f73afcc0918d6935521ae88004e7
SendLink.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

SendLink version 1.5 local exploit that discloses passwords.

tags | exploit, local
MD5 | e05fe5a6f04ba21b132754cbb67c2d51
eXeem021.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

eXeem version 0.21 local exploit that discloses passwords for proxy settings.

tags | exploit, local
MD5 | 1f56bd8c9fa4abdd53b03dc6288c2435
iGeneric12.txt
Posted Feb 26, 2005
Authored by John Cobb | Site nobytes.com

Multiple information disclosure and possible SQL injection vulnerabilities have been discovered in iGeneric eShop 1.2.

tags | exploit, vulnerability, sql injection, info disclosure
MD5 | a90af00737204235c158c89d0979957d
SDtraverse.txt
Posted Feb 26, 2005
Authored by CorryL

SD Server versions 4.0.70 and below suffer from a classic directory traversal flaw.

tags | exploit
MD5 | edd39b6f6ccf627ba499afd72b2bbdec
bontagobof.zip
Posted Feb 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Bontago versions 1.1 and below remote exploit that makes use of a buffer overflow when a nickname longer than 512 bytes is sent.

tags | exploit, remote, overflow
MD5 | fc1431f7ae6fa0b788010eb29472e4f7
xinkaa-adv.txt
Posted Feb 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Xinkaa WEB Station versions 1.0.3 and below suffer from a classic directory traversal flaw.

tags | exploit, web
MD5 | 28039f57e1c23f2f1fccb9ab33b8e28d
paNews_v2.0b4.txt
Posted Feb 26, 2005
Site nst.e-nex.com

paNews version 2.0b4 is susceptible to remote php code injection.

tags | exploit, remote, php
MD5 | 0768931e700ec992ba71b15aa8732b4a
ieBypass.txt
Posted Feb 26, 2005
Authored by bitlance winter

Using magic DNS, the domain name in the Internet Explorer titlebar can be exploited to trick users into visiting a malicious pop-up window. The weakness has been confirmed in version 6.0 on a fully patched system running Windows XP with SP2 installed.

tags | exploit
systems | windows, xp
MD5 | d469b06a4e4051d3981c2a3efdaad2f6
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close