Section:  .. / 0504-exploits  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 138
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: PHPNukeXSS.txt
Description:
PHPNuke versions 6.x through 7.6 are susceptible to multiple cross site scripting flaws along with path disclosure issues.
Author:sp3x
Homepage:http://www.securityreason.com
File Size:5660
Last Modified:Apr 17 09:07:06 2005
MD5 Checksum:cfd965852b5a530afe07c79ca91ac40c

 ///  File Name: PHPNukeXSS2.txt
Description:
PHPNuke versions 7.6 and below are susceptible to multiple cross site scripting flaws.
Author:Maksymilian Arciemowicz
Homepage:http://www.securityreason.com
File Size:3686
Last Modified:Apr 17 19:36:39 2005
MD5 Checksum:1d04a760215df69e516cda89de31df7c

 ///  File Name: plsql_multiplestatement_injection.t..>
Description:
Specialized exploit for cases where SQL injection is possible against a Oracle PL/SQL setup.
Author:Esteban Martinez Fayo
File Size:1996
Last Modified:Apr 19 22:27:17 2005
MD5 Checksum:e45da5398455857dcb6ca69306692fd2

 ///  File Name: pm.c
Description:
PMsoftware miniature HTTP server remote stack overflow exploit.
Author:c0d3r
Related File:ernwSA012005.txt
File Size:5958
Last Modified:Jun 1 07:04:36 2005
MD5 Checksum:e95923d40fe66f625729e686647344b3

 ///  File Name: PortalAppXSS.txt
Description:
PortalApp version 3.3 is susceptible to multiple cross site scripting vulnerabilities.
Author:snkenjoi
Homepage:http://snkenjoi.com
File Size:599
Last Modified:May 30 02:38:24 2005
MD5 Checksum:b32e0ecd2eb141d9fd44bd9f341326f0

 ///  File Name: postnukeSQL.txt
Description:
PostNuke 0.760-RC3 is susceptible to SQL injection and cross site scripting attacks.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:2543
Last Modified:Apr 17 22:11:37 2005
MD5 Checksum:6a24eee0397120aaec68754f40024eb9

 ///  File Name: predebug1.c
Description:
Example predebug code execution exploit, demonstrating how programmers being loaded into debuggers can attack the machine running the debugger. Example showing simple command execution.
Author:brett.moore
Homepage:http://www.security-assessment.com
Related File:PreDebug.pdf
File Size:717
Last Modified:Apr 20 23:19:49 2005
MD5 Checksum:325726bc63cc5a8f626fa768b126b5c3

 ///  File Name: predebug2.c
Description:
Example predebug code execution exploit, demonstrating how programmers being loaded into debuggers can attack the machine running the debugger.
Author:Brett Moore
Homepage:http://www.security-assessment.com
Related File:PreDebug.pdf
File Size:2431
Last Modified:Apr 20 23:17:32 2005
MD5 Checksum:907e08389bb6518f3a430653e9701216

 ///  File Name: proFileXSS.txt
Description:
proFile from PHPLabs suffers from various cross site scripting vulnerabilities.
Author:snkenjoi
Homepage:http://snkenjoi.com
File Size:548
Last Modified:May 30 02:37:02 2005
MD5 Checksum:54873f7f60bb6b854d467883fb9c73f0

 ///  File Name: punbb_email_sql_injection.txt
Description:
PunBB forum software contains a vulnerability where SQL injection can be performed by first entering an email address containing exploitation data into the change_email function, and then redisplaying the email address. This is due to PunBB trusting data it gets from its own database.
Author:exploits
File Size:4094
Last Modified:Apr 17 22:12:11 2005
MD5 Checksum:b242610ce1957b5f242867f87a20589a

 ///  File Name: radbidsGoldv2.txt
Description:
RadBids Gold version 2 is susceptible to directory traversal, SQL injection, and cross site scripting vulnerabilities.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:3808
Last Modified:Apr 18 08:04:09 2005
MD5 Checksum:150e0e21faa3127385dc9bd429410f2d

 ///  File Name: RatBof.cpp
Description:
Internet Explorer content advisor exploit that is related to MS05-020.
Author:Andres Tarasco, Miguel Tarasco Acuna
Homepage:http://www.haxorcitos.com/
File Size:8679
Last Modified:May 27 05:16:33 2005
MD5 Checksum:cf0ff753894931c20f3c60077a8bcacf

 ///  File Name: rpc3telnet.txt
Description:
RPC-3 Telnet Host version 3.05 that is used in power supplies is susceptible to a login bypass flaw.
Author:Flare
File Size:1511
Last Modified:Apr 14 08:41:27 2005
MD5 Checksum:442753a019c99d63a9dac3ed72112cb3

 ///  File Name: sash.c
Description:
Local proof of concept exploit for a buffer overflow in sash 3.7.
Author:lammat
Homepage:http://grpower.ath.cx
File Size:1122
Last Modified:Apr 18 08:09:11 2005
MD5 Checksum:a55fd693486c254b74d143e95ae50830

 ///  File Name: sco507nwprint.c
Description:
Local exploit for nwprint on SCO OpenServer 5.0.7 that gives egid of lp.
Author:pasquale minervini
File Size:2988
Last Modified:Apr 17 09:09:04 2005
MD5 Checksum:418eb2e3b0bdf4111da5646bad3a0e66

 ///  File Name: shoutbox302.txt
Description:
Shoutbox SCRIPT versions 3.0.2 and below suffer from a remote retrieval flaw that allows for the grabbing of an administrator's MD5 hash and their username.
Author:CorryL
Homepage:http://www.x0n3-h4ck.org
File Size:1885
Last Modified:Jun 1 06:34:54 2005
MD5 Checksum:112f564af6eea7a062786d5bb7cca5d0

 ///  File Name: siteEnable.txt
Description:
SiteEnable CMS is susceptible to multiple cross site scripting and SQL injection vulnerabilities.
Author:Zinho
Homepage:http://www.hackerscenter.com
File Size:1519
Last Modified:Apr 17 09:16:40 2005
MD5 Checksum:97beb666617ffd9816e2e10933cfeb29

 ///  File Name: SiteEnableXSSnSQL.txt
Description:
SiteEnable CMS is susceptible to multiple SQL injection and cross site scripting attacks.
Author:zinho
Homepage:http://www.hackerscenter.com/
File Size:6970
Last Modified:Apr 14 09:10:54 2005
MD5 Checksum:e01a0e397d62112dd7a787d40c0fefe0

 ///  File Name: Snmppd.c
Description:
Snmppd SNMP proxy daemon remote format string exploit.
Author:cybertronic
Related File:snmppd_dos.txt
File Size:13662
Last Modified:May 27 06:00:10 2005
MD5 Checksum:7af8b2402d062b2c7f1e0e92eeb2b271

 ///  File Name: sonicwallXSS.txt
Description:
SonicWall SOHO/10 is susceptible to cross site scripting and code injection vulnerabilities.
Author:Oliver Karow
Homepage:http://www.oliverkarow.de/
File Size:2296
Last Modified:Apr 17 09:14:34 2005
MD5 Checksum:80422d10d22ed8405056627e4c621669

 ///  File Name: sumus_exploit.txt
Description:
Sumus, a Internet-based cardgame program, is vulnerable to a stack-based buffer-overflow in the server component.
File Size:16065
Last Modified:Apr 21 00:11:09 2005
MD5 Checksum:eaf54b1362348681b9d86ec29f77a1ca

 ///  File Name: turnkeyShopping.txt
Description:
The Turnkey Shopping Cart software is susceptible to multiple SQL injection attacks.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:7420
Last Modified:Apr 17 08:50:54 2005
MD5 Checksum:778b359632d6ef1836cdb9be74657e98

 ///  File Name: ubbprintthread.txt
Description:
UBB printthread.php is susceptible to a SQL injection attack.
Author:Axl, HLL
File Size:4834
Last Modified:Jun 1 06:30:46 2005
MD5 Checksum:9a260e77a85f0ab0aaeaaf01555a9506

 ///  File Name: vixie_crontab_readfiles-exploit_and..>
Description:
Vixie crontab allows reading other user's crontabs. Tested on FC3 with vixie-cron-4.1-24_FC3.
Author:Karol Wiêsek
File Size:1675
Related OSVDB(s):15352
Last Modified:Apr 17 20:41:18 2005
MD5 Checksum:06354dd4c33cfef8fa979d0c4b5b4515

 ///  File Name: vpBof.c
Description:
WheresJames Webcam Publisher Beta 2.0.0014 proof of concept exploit.
Author:Miguel Tarasco Acuna
File Size:6029
Last Modified:Jun 1 06:11:30 2005
MD5 Checksum:305f4ec7fd2184288f93060ad6beb7c3