Section:  .. / 0506-exploits  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 89
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: eping.txt
Description:
eping, the ping plugin for the e107 portal system, has an arbitrary command execution flaw.
Homepage:http://www.RedC0de.org
File Size:1156
Last Modified:Jun 21 06:19:39 2005
MD5 Checksum:530e9ab0c93aca92d494ba14a45ab9da

 ///  File Name: invisionGallery.txt
Description:
Invision Gallery versions prior to 1.3.1 suffer from cross site scripting and SQL injection vulnerabilities. Exploitation details included.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2637
Last Modified:Jun 21 06:18:26 2005
MD5 Checksum:3b8ddfba4788851d9a14d7edf5f601f1

 ///  File Name: invisionXSSSQL.txt
Description:
Invision Blog versions prior to 1.1.2 Final suffer from cross site scripting and SQL injection vulnerabilities. Exploitation details provided.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2486
Last Modified:Jun 21 06:16:12 2005
MD5 Checksum:4abe7b5b770fc7b66017269ee1c645cb

 ///  File Name: flatnuke_253_referer.pm.gz
Description:
FlatNuke 2.5.3 Referer poisoning remote command execution exploit created with the Metasploit Framework.
Author:arkanoid
Homepage:http://arkanoid.altervista.org
File Size:1133
Last Modified:Jun 21 06:14:23 2005
MD5 Checksum:213c47f8075f975adbe15d1fdbdd0817

 ///  File Name: lokiSQL.txt
Description:
The Loki download manager is susceptible to SQL injection attacks.
Author:hack_912
File Size:342
Last Modified:Jun 20 09:20:18 2005
MD5 Checksum:9caea66bc21bc83d132af820079d3a1d

 ///  File Name: goodtechDoS.txt
Description:
GoodTech SMTP Server for Windows NT/2000/XP version 5.14 is susceptible to a denial of service vulnerability.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/
File Size:1444
Last Modified:Jun 20 08:59:15 2005
MD5 Checksum:865e9cb2d4c6232438f6ab88a1e22c39

 ///  File Name: memfs.c
Description:
Proof of concept exploit for a memory disclosure vulnerability that exists in FUSE versions below 2.3.0.
Author:Sven Tantau
Homepage:http://www.sven-tantau.de/
Related File:fuseDisclose.txt
File Size:2432
Last Modified:Jun 18 22:34:46 2005
MD5 Checksum:1eefaaa038bfe2e407174f6a8de7c306

 ///  File Name: lpanelClient.txt
Description:
Lpanel versions 1.59 and below allows any logged in user to view any client invoice information.
File Size:3226
Last Modified:Jun 18 22:21:02 2005
MD5 Checksum:937b3d42221d3db972fc3559c9677eb6

 ///  File Name: lpanelPlain.txt
Description:
Lpanel versions 1.59 and below suffer from a cross site scripting flaw in viewticket.php.
File Size:4574
Last Modified:Jun 18 22:16:03 2005
MD5 Checksum:69f921c83ba44dd826cf73ae57650a6c

 ///  File Name: rakzero.zip
Description:
Proof of concept exploit for the denial of service flaws discovered in Raknet network library versions 2.33 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:rakzero.txt
File Size:6265
Last Modified:Jun 18 22:04:49 2005
MD5 Checksum:a8b80b6898ae7cfe6828e6e466281d68

 ///  File Name: ExhibitSQL.txt
Description:
Exhibit Engine versions 1.22 and 1.54 RC4 are susceptible to SQL injection attacks.
Author:sk0L
Homepage:http://www.sec-consult.com
File Size:3906
Last Modified:Jun 18 21:49:56 2005
MD5 Checksum:e2cf2a019fc4e8df82bb3d4fb1114445

 ///  File Name: phpCMS12x.txt
Description:
phpCMS 1.2.x suffers from an arbitrary file inclusion vulnerability.
Author:sk0L
Homepage:http://www.sec-consult.com
File Size:2245
Last Modified:Jun 18 21:48:52 2005
MD5 Checksum:5b8843c1fddc0a8fcffeb227365117e5

 ///  File Name: adv14-theday-2005.txt
Description:
Liberum Help Desk versions greater than 0.97.3 suffer from various cross site scripting and SQL injection flaws.
Author:theday
Homepage:http://theday.echo.or.id/
File Size:5808
Last Modified:Jun 18 21:47:21 2005
MD5 Checksum:b92dee53f638603d3cf3072d7956e72f

 ///  File Name: cuteNewsExec.txt
Description:
Providing an attacker already has administrative access to CuteNews, they can further execute commands on the underlying filesystem due to a failure in sanitizing user input.
Author:John Cantu
File Size:958
Last Modified:Jun 18 21:45:21 2005
MD5 Checksum:13c639ae677a2d9eb126ecd057e36988

 ///  File Name: fortinetBackdoor.txt
Description:
A backdoor exists in Fortinet's Fortigate firewall that allows for maintainer access.
Author:Johan Andersson
File Size:341
Last Modified:Jun 18 21:43:31 2005
MD5 Checksum:8fe53a36cec7a3f93b344324a23c7f91

 ///  File Name: ZH2005-13SA.txt
Description:
SQL injection, input tampering, and direct database access vulnerabilities exist in the (i)Site web site management system.
Author:Trash-80
File Size:1776
Last Modified:Jun 18 21:35:34 2005
MD5 Checksum:6b05873aeea44f1fca95aa2c267d4d9d

 ///  File Name: UPBdecrypt.pl.txt
Description:
Ultimate PHP Board versions 1.9.6 and below GOLD users.dat password decryption exploit.
Author:Alberto Trivero
File Size:2253
Last Modified:Jun 18 20:08:10 2005
MD5 Checksum:100b1d9c49fead9a21e3af04ec645575

 ///  File Name: paFileDB113.pl.txt
Description:
PHP Arena paFileDB version 1.1.3 and below remote change password exploit.
Author:Alpha_Programmer
File Size:2686
Last Modified:Jun 18 20:06:03 2005
MD5 Checksum:85f6d340620484ad76ed616d26f4782c

 ///  File Name: webstore.pl.txt
Description:
eXtropia shopping cart web_store.cgi remote command execution exploit.
Author:sun-os [ActionSpider]
File Size:3957
Last Modified:Jun 18 20:03:54 2005
MD5 Checksum:73e3898e1923d5441b0fef62e00ac0e6

 ///  File Name: mambo4521.php.txt
Description:
Mambo 4.5.2.1 + MySQL 4.1 fetch password hash exploit.
Author:pokleyzz
File Size:5961
Last Modified:Jun 18 20:01:57 2005
MD5 Checksum:3b64e18e2b44aaf09e9d4cdf94494f94

 ///  File Name: CAU-paginit.c
Description:
IBM AIX paginit root exploit. Tested on 5.2.
Author:intropy
File Size:2836
Last Modified:Jun 18 19:58:45 2005
MD5 Checksum:7532c7a5f32e58dc2dedf289996a3a3f

 ///  File Name: CAU-netpmon.c
Description:
IBM AIX netpmon elevated privileges exploit. Tested on 5.2.
Author:intropy
File Size:2869
Last Modified:Jun 18 19:57:42 2005
MD5 Checksum:409a5624dc0bd1ab461a6d6f1b63a2cf

 ///  File Name: CAU-launchd.c
Description:
Mac OS X 10.4 launchd race condition exploit.
Author:intropy
File Size:1798
Last Modified:Jun 18 19:55:31 2005
MD5 Checksum:1dace8c5356c34bdc3cccbc74efc4d78

 ///  File Name: M4DR007.pl
Description:
Webhints version 1.0.3 and below remote command execution exploit.
Author:madroot security group
Homepage:http://www.madroot.edu.ms
File Size:3435
Last Modified:Jun 18 19:54:35 2005
MD5 Checksum:32992be26b1fbf11cbba43868935c102

 ///  File Name: Webhints.c
Description:
Webhints version 1.03 and below remote command execution exploit. Written in C.
Author:Alpha_Programmer
File Size:3346
Last Modified:Jun 18 19:51:47 2005
MD5 Checksum:a0f7919dbbeb4bd4806eb0f1edb79a0b