Section:  .. / 0506-exploits  /

Page 4 of 4
<< 1 2 3 4 >> Files 75 - 89 of 89
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: cacti.pl.txt
Description:
Cacti versions 0.8.6d and below remote command execution exploit.
Author:Alberto Trivero
File Size:1364
Last Modified:Jun 23 09:37:23 2005
MD5 Checksum:129bbc13dc26c639b3050ca8f8b72254

 ///  File Name: mast.txt
Description:
MAST RunAsP.exe version 3.5.1 suffers from a local privilege escalation vulnerability.
Author:traxx
File Size:1344
Last Modified:Jun 21 06:39:57 2005
MD5 Checksum:a82c309e523a3fc714770b3a124244c2

 ///  File Name: wordpressSQL.txt
Description:
WordPress version 1.5.1.1 and below remote SQL injection exploit.
Author:Alberto Trivero
File Size:1338
Last Modified:Jun 18 19:40:47 2005
MD5 Checksum:41e46050f50df0e5bd4cd59fb2bc4d2a

 ///  File Name: portalSQL.pl.txt
Description:
Portail PHP remote SQL injection exploit for versions below 1.3.
Author:Alberto Trivero
File Size:1312
Last Modified:Jun 18 19:31:08 2005
MD5 Checksum:7b85f5c15e18592ab9bb85ee9240a628

 ///  File Name: ASPNukeSQL080.txt
Description:
ASPNuke versions 0.80 and below remote SQL injection exploit using comment_post.asp.
Author:Alberto Trivero
File Size:1215
Last Modified:Jul 1 06:59:53 2005
MD5 Checksum:17f91b9995ed195bdd4d9b6322b7a733

 ///  File Name: eping.txt
Description:
eping, the ping plugin for the e107 portal system, has an arbitrary command execution flaw.
Homepage:http://www.RedC0de.org
File Size:1156
Last Modified:Jun 21 06:19:39 2005
MD5 Checksum:530e9ab0c93aca92d494ba14a45ab9da

 ///  File Name: flatnuke_253_referer.pm.gz
Description:
FlatNuke 2.5.3 Referer poisoning remote command execution exploit created with the Metasploit Framework.
Author:arkanoid
Homepage:http://arkanoid.altervista.org
File Size:1133
Last Modified:Jun 21 06:14:23 2005
MD5 Checksum:213c47f8075f975adbe15d1fdbdd0817

 ///  File Name: bitrix40xInclusion.txt
Description:
Bitrix Site Manager 4.0.x suffers from a remote file inclusion and execution vulnerability.
Author:d_bug
File Size:1005
Last Modified:Jun 21 06:56:05 2005
MD5 Checksum:36b1b7457acd7c67150480cd54c8d2f1

 ///  File Name: cuteNewsExec.txt
Description:
Providing an attacker already has administrative access to CuteNews, they can further execute commands on the underlying filesystem due to a failure in sanitizing user input.
Author:John Cantu
File Size:958
Last Modified:Jun 18 21:45:21 2005
MD5 Checksum:13c639ae677a2d9eb126ecd057e36988

 ///  File Name: phpforum11.txt
Description:
Phpforum McGallery version 1.1 suffers from a directory traversal vulnerability.
Author:d_bug
File Size:657
Last Modified:Jun 21 06:57:05 2005
MD5 Checksum:c2aeb62cbb91fe79e5d6ca5260055752

 ///  File Name: imTRBBS.txt
Description:
Original imTRBBS versions 1.02 and below allow for remote command execution due to a lack of properly sanitized input in im_trbbs.cgi.
Author:blahplok
File Size:550
Last Modified:Jul 1 07:33:39 2005
MD5 Checksum:e2f1f4aed623bf85112f072bdb54fbc4

 ///  File Name: communityXSS.txt
Description:
Community forum suffers from a cross site scripting flaw. Exploitation provided.
Author:abducter_minds
File Size:417
Last Modified:Jun 29 10:45:39 2005
MD5 Checksum:3eda9b0e950a5224de3379c5dd0b1c9e

 ///  File Name: lokiSQL.txt
Description:
The Loki download manager is susceptible to SQL injection attacks.
Author:hack_912
File Size:342
Last Modified:Jun 20 09:20:18 2005
MD5 Checksum:9caea66bc21bc83d132af820079d3a1d

 ///  File Name: fortinetBackdoor.txt
Description:
A backdoor exists in Fortinet's Fortigate firewall that allows for maintainer access.
Author:Johan Andersson
File Size:341
Last Modified:Jun 18 21:43:31 2005
MD5 Checksum:8fe53a36cec7a3f93b344324a23c7f91