exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 89 of 89 RSS Feed

Files

Webhints.pl
Posted Jun 18, 2005
Authored by Alpha_Programmer

Webhints version 1.03 and below remote command execution exploit. Written in Perl.

tags | exploit, remote, perl
SHA-256 | 41a30d39d634bcd07034cd4c3a5aede15a4e97236b8e2bfd2b87b8611b1cf3cd
winzipBO.c
Posted Jun 18, 2005
Authored by ATmaCA, Kozan

WinZip command line local buffer overflow exploit. Tested with WinZip 8.1 on Win XP SP2 EN.

tags | exploit, overflow, local
SHA-256 | fab2e64730978d0a4446513212946fe3cd7f489153e5bd2e5ffe3b66a5b79698
tcpdump-bgp-update-poc.c
Posted Jun 18, 2005
Authored by Frederic Raynal

tcpdump bgp_update_print() remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 4810de4822c6a55a2bce7e84d2e9bfa8cc8e2d2d326358b2a4c20541d4da4bc4
invision.php.txt
Posted Jun 18, 2005

Invision Power Board versions 2.0.3 and below Login.PHP SQL injection exploit.

tags | exploit, php, sql injection
SHA-256 | a678c756c879360db7130399bb69c47a0363610d658176a91eb540d5dfb79279
wordpressSQL.txt
Posted Jun 18, 2005
Authored by Alberto Trivero

WordPress version 1.5.1.1 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | a790448fd8cfb89de0da5a52707f196ac0e7b207c3d6dc81c060742372f1bd4a
ipswitch.c
Posted Jun 18, 2005
Authored by nolimit, BuzzDee

IpSwitch IMAP server LOGON stack overflow exploit with connect back shellcode.

tags | exploit, overflow, imap, shellcode
SHA-256 | fecbe5453414412bea1d3d14016e293ff77db3c396755c860365d214855cb057
KAV_exploit.cpp
Posted Jun 18, 2005

Kaspersky AntiVirus 5.x klif.sys local privilege escalation exploit.

tags | exploit, local
SHA-256 | 1c191d90df915179b5d6eb0288abe97ab579f66a9df82c671a09dfada4178888
portalSQL.pl.txt
Posted Jun 18, 2005
Authored by Alberto Trivero

Portail PHP remote SQL injection exploit for versions below 1.3.

tags | exploit, remote, php, sql injection
SHA-256 | 32840117dab64e50f02b94aefa0c2145f2470547adc07312820e493210dee9c8
KCpnuke-xpl.pl
Posted Jun 18, 2005
Authored by K-C0d3r

PostNuke versions 0.750 and below readpmsg.php SQL injection exploit.

tags | exploit, php, sql injection
SHA-256 | 4eefa3ff786af6d217273543a7ff82c04c930dff51f797bda65ec07ea146f2dc
epsxe-e.c
Posted Jun 18, 2005
Authored by Qnix

ePSXe version 1.6.0 and below nogui() local exploit.

tags | exploit, local
SHA-256 | 3ab6284d8ee3a3f7522d2e3a778298e8c0eba78d8e759d283eb1ef45f83cad36
MIRC.PAS.HTML
Posted Jun 18, 2005
Authored by rgod | Site retrogod.altervista.org

MIRC 6.16 and 'generic Edit component' Win32 trick exploit.

tags | exploit
systems | windows
SHA-256 | 00feb8b7405ceb1014fbe1c777eb0d3449581bf6cba90daa1d4ad6b5f011a6a6
tftp_exp.c
Posted Jun 18, 2005
Authored by ATmaCA

FutureSoft TFTP Server 2000 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 40809a243cad01f2a1f6a32b6b806d3cbd5846a077f89e710a5cc89d720a3479
spa-promail4.c
Posted Jun 18, 2005
Site security.org.sg

e-Post SPA-PRO Mail Solomon SPA-IMAP4S 4.01 service buffer overflow vulnerability bind shell exploit.

tags | exploit, overflow, shell
SHA-256 | 98c5409ee1040a69b480f98ac708d21184fcb70e7f90fd3002fb1158d3bcd3e2
gun-imapd.c
Posted Jun 17, 2005
Authored by qobaiashi

GNU Mailutils v0.5 through v0.6.90 remote format string exploit which allows unauthenticated users to attack the imap4d service and bind a shell to port 4096.

tags | exploit, remote, shell
SHA-256 | b5ffbc49887bb4621dea362af759e58a3ea5d5f14daa0fa937332b5f96f5f095
Page 4 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close