A vulnerability has been reported in Divine Content Server 5.x, which can be exploited by malicious people to conduct Cross-Site Scripting attacks against visitors.
ab2bfd56158284ff18d428f04473a145bd1d06cbda895c15a1b08c567f50cbcc
Exploit that makes use of the Microsoft Word WordPerfect document converter which has been found vulnerable to a buffer overflow when a malicious .doc file is opened.
2fa509d670aa52809545e6a62f5886f884f5b653c4ef5c22e96e146011fc403f
WinDNSSpoof is a simple DNS ID Spoofer for Windows 9x/2K. You must be able to sniff traffic of the target - if you are in a switched network you can use ARP Cache Poisoning tools like winarp_sk or winarp_mim (see http://www.arp-sk.org).
2911c72fedd98553e0a0961f6319b0f628acb27aa5a9ddb8e1080b7bd4e79c6b
WinTCPKill is a TCP connection killer for Windows 9x/2K. You must be able to sniff traffic of the target - if you are in a switched network you can use ARP Cache Poisoning tools like winarp_sk or winarp_mim (see http://www.arp-sk.org).
923d8a462a5f0fac999c2cbce0fc54dbc03131e7c3825ac2322c9b299d0809d2
WinSSLMiM implements a HTTPS man in the middle attack from the Windows platform. It includes FakeCert a tool to make fake certificate (like the DCA of sslmim in Phrack 57). It can be used to exploit the Certificate Chain Vulnerability in Internet Explorer. Tested under Windows 9x/2000.
fa801d51a1b8cc96034f44ee461b037e348c7862a3c1fcd4dc4983a8ae087712
Domino Hash Breaker v1.0 is a tool that tries to guess a Lotus Domino HTTP password from his hash and a dictionary file. It needs Lotus Notes R5 client installation and nnotes.dll.
6ffe6b4d13ef659fc146b7ce4167173e4c037d1dc3cf2705bafc99210557c714