what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 136 RSS Feed

Files

NotJustBrowsing.c
Posted May 27, 2005
Authored by ATmaCA, Kozan | Site netmagister.com

NotJustBrowsing 1.0.3 local password disclosure exploit.

tags | exploit, local
SHA-256 | 76e22a4ea665c1c413d680a933167ca1ca852258c4c4193203949c7ec552d9e4
MaxDB750023.c
Posted May 27, 2005
Authored by cybertronic

MySQL MaxDB Webtool versions 7.5.00.23 and below remote stack overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 79152d4a215596166a7683269d0c401109535504c0a7cc3d9cad939aa193eea7
RatBof.cpp
Posted May 27, 2005
Authored by Andres Tarasco, Miguel Tarasco Acuna | Site haxorcitos.com

Internet Explorer content advisor exploit that is related to MS05-020.

tags | exploit
SHA-256 | 2f95b570804ce81df9cc63e603821d901dd46f7d675f57008472b4a884355879
yager524.txt
Posted May 27, 2005
Authored by cybertronic

Yager versions 5.24 and below remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | f086943e339503dbdf9f853d84fa577a5100c41b36ba00bd1b9d7d0255f0f576
msbv5120-xhacker.tar.gz
Posted Apr 28, 2005
Authored by X-Hacker

Motorola SBV5120 cable modem denial of service exploit v0.1.

tags | exploit, denial of service
SHA-256 | 1a7922a1f6ffe4d7b3111d60bce9c47e2193af1c21cb278603be57513444cf62
xtcpdump-isis-dos.c
Posted Apr 27, 2005
Authored by vade79 | Site fakehalo.us

Tcpdump v3.8.x/3.9.1 remote infinite loop denial of service exploit which takes advantage of the isis_print() function by sending a GRE packet.

tags | exploit, remote, denial of service
SHA-256 | 7715283f9e248b04a7f1186a37ab92696fba6aa192da993f47a8e4362a1c6bfa
xtcpdump-bgp-dos.c
Posted Apr 27, 2005
Authored by vade79 | Site fakehalo.us

Tcpdump v3.8.x and below remote denial of service exploit which causes tcpdump to go into an infinite loop when it processes an evil BGP packet. Works if TCP port 179 is not filtered.

tags | exploit, remote, denial of service, tcp
SHA-256 | ccc1ba68ec8e05ee151df0dc0455d51be29ffeac87519d101d1ec5c6ec4d29f6
xtcpdump-ldp-dos.c
Posted Apr 27, 2005
Authored by vade79 | Site fakehalo.us

Tcpdump v3.8.3 and below remote denial of service exploit which causes tcpdump to go into an infinite loop when it processes an evil LDP packet.

tags | exploit, remote, denial of service
SHA-256 | 5d2ae4babb02e4a4cdaf59c68d9c308c703d7d0c5ae0c27f8ef1aab1b8401184
xtcpdump+ethr-rsvp-dos.c
Posted Apr 27, 2005
Authored by vade79 | Site fakehalo.us

Tcpdump v3.9.1 and below and Ethereal v0.10.10 and below remote denial of service exploit which takes advantage of a bug in rsvp_print().

tags | exploit, remote, denial of service
SHA-256 | 55e3698692b58c34879b5f8ed2655d6e63f7b4f6346ba705a052758b7d96a384
sumus_exploit.txt
Posted Apr 20, 2005

Sumus, a Internet-based cardgame program, is vulnerable to a stack-based buffer-overflow in the server component.

tags | exploit, overflow
SHA-256 | 04b607c7c82dcc14b5382394ef565748a6ad092ebe29a4a4a2e157d6d8c1ab8d
all4www_homepagecreator.txt
Posted Apr 20, 2005

All4WWW-

tags | exploit
SHA-256 | c3d17514e1fa26e0970b8916a28ed513073ce3377b213d0794119ac7f3ef0ee3
lgfreeze.mid
Posted Apr 20, 2005
Authored by Luca Ercoli | Site lucaercoli.it

Example of malformed MIDI ringtone which can be used to cause a Denial of Service condition in LG-U8120 mobile phones.

tags | exploit, denial of service
SHA-256 | d88d8912a07b8432a22f5b3279b4ba54f57f6883f9b4a6dbd3af5acca52d6b49
predebug1.c
Posted Apr 20, 2005
Authored by Brett Moore SA | Site security-assessment.com

Example predebug code execution exploit, demonstrating how programmers being loaded into debuggers can attack the machine running the debugger. Example showing simple command execution.

tags | exploit, code execution
SHA-256 | 76d7d2479d8d488badcb0576ec9f7d6ca96d0d10a0e52cd27298f200805cd49e
predebug2.c
Posted Apr 20, 2005
Authored by Brett Moore SA | Site security-assessment.com

Example predebug code execution exploit, demonstrating how programmers being loaded into debuggers can attack the machine running the debugger.

tags | exploit, code execution
SHA-256 | 33ca07cc4db8f94578af6e6aae40cf6f4c90465438674f0c1438b9825c9a1273
plsql_multiplestatement_injection.txt
Posted Apr 19, 2005
Authored by Esteban Martinez Fayo

Specialized exploit for cases where SQL injection is possible against a Oracle PL/SQL setup.

tags | exploit, sql injection
SHA-256 | d157fd2dfa2d66e860e087333a9d56513595d3653e44b2708d42626d1eb78d34
oracle_sdo_code_size.c
Posted Apr 19, 2005
Authored by Esteban Martinez Fayo

Exploit for buffer overflow vulnerability in procedure MDSYS.MD2.SDO_CODE_SIZE within Oracle Database Server version 10.1.0.2 under Windows 2000 SP4.

tags | exploit, overflow
systems | windows
SHA-256 | a0f3cca0424aca2f2583ed61ffa387e3f18c17050746fbcb5ef2f5de1e81146f
adz_serendipity.pl
Posted Apr 19, 2005
Authored by kreon | Site adz.void.ru

Serendipity 0.8beta4 beta.php SQL injection exploit.

tags | exploit, php, sql injection
SHA-256 | 202976f007352d982e4bef3889c5a2c8105be38b552f23a27cf66c03614d2144
dc_phpbb_xss_sql.txt
Posted Apr 19, 2005
Authored by Diabolic Crab | Site digitalparadox.org

Multiple SQL injection and Cross-site Scripting issues in phpBB versions 1.52 and below. Example exloit URLs included in advisory.

tags | exploit, xss, sql injection
SHA-256 | 9ed61fb9b6bddef6a6fbcc172a966e32b1952757835f428dc9b3ec91afbb9023
MSHTA_POC.c
Posted Apr 19, 2005
Authored by Zwell

Proof-of-Concept code to generate a file with an embedded CLSID, demonstrating how the issues detailed in the iDEFENSE "MSHTA" advisory, MS05-016, and other places, can be exploited.

tags | exploit
advisories | CVE-2005-0063
SHA-256 | 7826084c6c139e8540b77c60563f111711b9055021c1118b3cabc3f461e16bb2
msjet101.c
Posted Apr 19, 2005
Authored by Nanika | Site chroot.org

This is a slightly modified version of Stuart Pearson's original exploit for the malformed MDB parsing vulnerabilities in Microsoft Access.

tags | exploit, vulnerability
SHA-256 | 21907bea8baebb0eabf8d5cb55470e6622f00c5110265a1be7900b93ce98dd5a
msjet40.txt
Posted Apr 19, 2005
Authored by Tal Zeltzer | Site see-security.com

Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll.

tags | exploit
SHA-256 | 363d13ce385e71ed1d0b870b6c9e4eb5dfef4e9ceae62b8fe3b8bb540e55059d
ie_dhtml_poc.txt
Posted Apr 18, 2005
Authored by SkyLined | Site edup.tudelft.nl

Proof-of-Concept exploit code for the MSIE DHTML object handling vulnerabilities (described in MS05-20).

tags | exploit, vulnerability
advisories | CVE-2005-0553
SHA-256 | c26eff210455c49cb3320cc55bf604d64f8ad0b37b6bea90265783cad726472f
eGroupWare_infoleak.txt
Posted Apr 18, 2005
Authored by Gerald Quakenbush | Site mastermindsecuritygroup.com

eGroupWare contains a bug where mail attachments could be sent to the wrong recipient by mistake, due to eGroupWare caching attachments after a user decides to cancel a message.

tags | exploit
SHA-256 | 749dead5a3d9e61cb8aeed7fe8e36c08cea5e025ab202d7a3da558e4ee54b64c
101_WINS.cpp
Posted Apr 18, 2005
Authored by class101 | Site hat-squad.com

Remote heap buffer overflow exploit for the Microsoft Windows Internet Name Service. Tested against Win2k SP4 Advanced Server English. This exploit can bind a shell to port 101 or will reverse a cmd shell back to a listener.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | 066ed83cc6f30f1fbe63953338c4c89426c0eae9a7ecfd5d398fd0ba8b78fe6e
Exploit Labs Security Advisory 2005.6
Posted Apr 18, 2005
Authored by Exploit Labs, Morning Wood | Site exploitlabs.com

XAMPP contains multiple vulnerabilities, including default usernames / passwords and Cross-site scripting issues. Example exploit URLs provided as part of advisory.

tags | exploit, vulnerability, xss
SHA-256 | 1c1cffe32942fde51d981767af0ae64e1987d397b5288232d1cce12aa159380c
Page 3 of 6
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close