Section:  .. / 0508-exploits  /

Page 2 of 5
<< 1 2 3 4 5 >> Files 25 - 50 of 105
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: EXPL-A-2005-010.txt
Description:
Mac OS X Weblog Server version 10.4.0 is susceptible to cross site scripting attacks.
Author:Donnie Werner
Homepage:http://exploitlabs.com
File Size:2357
Related CVE(s):CAN-2005-2523
Last Modified:Aug 17 08:43:04 2005
MD5 Checksum:e5ce4d28fb2dfcc5e952b605f9659858

 ///  File Name: ezupload-2.2.0.pl
Description:
Ezupload prior to v2.2.0 remote command execution exploit via file inclusion.
Author:Johnnie Walker
Related File:1747
File Size:2142
Last Modified:Aug 16 07:57:33 2005
MD5 Checksum:6a7199fabb717954ece8447f5c1f9a8c

 ///  File Name: ezuploadRemote.txt
Description:
Ezupload suffers from remote file inclusion vulnerabilities.
Author:Johnnie Walker
File Size:1136
Last Modified:Aug 11 06:33:06 2005
MD5 Checksum:8994b31bf62bab8495333a8df8e1f673

 ///  File Name: flat256.html
Description:
FlatNuke version 2.5.6 suffers from remote command execution, cross site scripting, and path disclosure flaws. Detailed exploitation provided.
Author:rgod
Homepage:http://www.rgod.altervista.org/
File Size:1254
Last Modified:Aug 31 08:51:23 2005
MD5 Checksum:11acdd9d2ced8d0e8654998fccb7e62b

 ///  File Name: flatnuke.html
Description:
FlatNuke version 2.5.5 suffers from remote command execution, cross site scripting, and path disclosure flaws. Detailed exploitation provided.
Author:rgod
Homepage:http://www.rgod.altervista.org/
File Size:11946
Last Modified:Aug 7 07:47:49 2005
MD5 Checksum:28e00967d918af40327814729eefae70

 ///  File Name: foojanInject.txt
Description:
Foojan PHP Weblog suffers from an injection flaw when trusting an unsanitized HTTP_REFERER payload.
Author:ali202
File Size:583
Last Modified:Aug 25 07:16:23 2005
MD5 Checksum:8d7c5ecdfa9b64b6f5372f8fa0e32db2

 ///  File Name: FreznoShopSQL.txt
Description:
Versions of FreznoShop below 1.4.1 are vulnerable to SQL injection attacks due to a lack of input validation on parameters used in database queries. Sample exploitation provided.
Author:Mike Shema
Homepage:http://www.ntobjectives.com/
File Size:2363
Last Modified:Aug 11 06:50:07 2005
MD5 Checksum:251e4d680f2039a7188789d03c74e266

 ///  File Name: fud.html
Description:
Remote code execution exploit for FUD Forum versions 2.7 and below.
Author:rgod
Homepage:http://rgod.altervista.org
Related File:fudForum.txt
File Size:1476
Last Modified:Aug 31 08:49:53 2005
MD5 Checksum:0a6890ae0ddec4b2fbf9dafb1a53e299

 ///  File Name: fudForum.txt
Description:
FUD Forum bulletin board software version 2.6.15 allows for unauthenticated access to messages.
Author:Alexander Heidenreich
File Size:7948
Last Modified:Aug 12 09:10:59 2005
MD5 Checksum:5f4359c950138e45d602dfc0f0ff159c

 ///  File Name: funkboard066.txt
Description:
FunkBoard version 0.66CF suffers from multiple cross site scripting flaws, remote code execution, and more. Full exploitation details provided.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:15115
Last Modified:Aug 10 07:33:54 2005
MD5 Checksum:f4bed4c56ff83694efb27c8e811047bf

 ///  File Name: fuseXSS.txt
Description:
Fuse version 4.1.0 and possibly earlier versions appear susceptible to cross site scripting attacks.
Author:N.N.P
File Size:2477
Last Modified:Aug 5 09:38:39 2005
MD5 Checksum:dfef692a0eec1d3be8708d8c4abe013b

 ///  File Name: grandstream-DoS.pl.txt
Description:
Denial of service exploit for the Grandstream Budge Tone 101/102 VOIP phone that sends UDP packets larger than 65534 bytes in size to port 5060.
Author:Pierre Kroma
Related File:Grandstream.txt
File Size:1288
Last Modified:Aug 13 08:52:52 2005
MD5 Checksum:55b5381d4cdf567a6ccc4d0618081fbc

 ///  File Name: gravityBad.txt
Description:
Gravity Board X version 1.1 suffers from multiple vulnerabilities that can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or compromise a vulnerable system.
Author:rgod
Homepage:http://www.rgod.altervista.org/
File Size:10106
Last Modified:Aug 10 07:21:11 2005
MD5 Checksum:aa6af3863ba0fbdd0fe94ab03da43d80

 ///  File Name: gtchatDoS.txt
Description:
GTChat versions 0.95 Alpha and below remote denial of service exploit.
Author:x97Rang
File Size:2490
Last Modified:Aug 19 07:17:18 2005
MD5 Checksum:fb94eeadfecd56bcc98ef2ef6565bb53

 ///  File Name: HAURItraverse.txt
Description:
Secunia Research has discovered a vulnerability in various HAURI anti-virus products, which can be exploited by malicious people to write files to arbitrary directories. Affected versions: ViRobot Expert 4.0, ViRobot Advanced Server, ViRobot Linux Server 2.0, HAURI LiveCall.
Author:Tan Chew Keong
Homepage:http://secunia.com/
File Size:4600
Last Modified:Aug 24 02:31:14 2005
MD5 Checksum:48852c43d92563bdb5dd75c64b1cdbb1

 ///  File Name: HOD-ms05039-pnp-expl.c
Description:
Microsoft Windows Plug-and-Play remote overflow universal exploit that is related to MS05-039. Vulnerable systems include: Microsoft Windows Server 2003 SP1, Microsoft Windows XP SP1 and SP2, and Microsoft Windows 2000 SP4.
Author:houseofdabus
Related Exploit:ms05039.c"
File Size:14264
Related CVE(s):CAN-2005-1983
Last Modified:Aug 13 09:01:08 2005
MD5 Checksum:d6dc9aaaab54213702bd9facbedf2e7c

 ///  File Name: HP_OV_NNM_RCE.c
Description:
Remote command execution exploit for HP OpenView Network Node Manager versions 6.2, 6.4, 7.01, and 7.50.
Author:Lympex
Homepage:http://l-bytes.net
File Size:3959
Last Modified:Aug 31 08:26:49 2005
MD5 Checksum:f52cf58231344c9d88f6eb0cd01adc82

 ///  File Name: IE-Msddsdll-0day.txt
Description:
Microsoft Internet Explorer msdds.dll remote code execution exploit. z3r0 d4y. Binds a shell on port 28876. Tested on Microsoft Internet Explorer 6 SP2 (Windows XP SP2).
File Size:3319
Last Modified:Aug 19 06:31:35 2005
MD5 Checksum:d1fe9fb20e8dc5e0ef6fe7939785ef12

 ///  File Name: IMRadio-4.0-expl.txt
Description:
Mercora IMRadio 4.0.0.0 stores username and passwords in the Windows Registry in plain text. A local user can read the values.
Author:Kozan
Homepage:http://www.spyinstructors.com
File Size:3019
Last Modified:Aug 24 10:36:19 2005
MD5 Checksum:649b6ad97a5ee8a49551e8e28ad2b8b4

 ///  File Name: jagoff.txt
Description:
The JaguarControl ActiveX controller suffers from a buffer overflow exploit.
Author:Tacettin Karadeniz
File Size:7186
Last Modified:Aug 17 06:39:41 2005
MD5 Checksum:643f8b8022b4e721b3f4964731f4da5a

 ///  File Name: JaxXSS.txt
Description:
Various Jax PHP scripts suffer from a multitude of cross site scripting vulnerabilities. Detailed exploitation provided.
Author:Lostmon
File Size:8728
Last Modified:Aug 6 07:50:29 2005
MD5 Checksum:a6d52131534c3d1d0580eef57b4f42ab

 ///  File Name: jgtcXSS.txt
Description:
jg-tc.com is susceptible to a multitude of cross site scripting flaws.
Author:Jeff Peadro
File Size:1895
Last Modified:Aug 17 07:04:41 2005
MD5 Checksum:9e166a2972ea986026d7d3996a8b6a30

 ///  File Name: kavLocalRoot.txt
Description:
Due to the logs directory being 777 by default, Kaspersky AntiVirus 5.5 is susceptible to a local root exploit via a symlink attack. Details are provided.
Author:Dr. Peter Bieringer
File Size:15672
Last Modified:Aug 13 08:56:49 2005
MD5 Checksum:cb19145c1046533f786fc038e618534f

 ///  File Name: landDownUnder.txt
Description:
Bugs Land Down Under version 800 is susceptible to multiple SQL injection and cross site scripting bugs.
Author:bl2k, SmallMouse
Homepage:http://www.shabgard.org
File Size:965
Last Modified:Aug 24 06:13:27 2005
MD5 Checksum:7d15a77282edf0261efdb4f04dbb6755

 ///  File Name: lantronixRoot.txt
Description:
Multiple Lantronix Secure Console Server local root exploits that make use of security issues allowing for unrestricted shell access.
Author:c0ntex
File Size:10696
Last Modified:Aug 6 07:58:33 2005
MD5 Checksum:8b24a3e766f3d0ae39e6caba270cd4d6