Section:  .. / 0509-exploits  /

Page 1 of 4
<< 1 2 3 4 >> Files 1 - 25 of 78
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0509-exploits.tgz
Description:
New Packet Storm exploits for September, 2005.
Homepage:http://packetstormsecurity.org/
File Size:409181
Last Modified:Oct 4 17:10:31 2005
MD5 Checksum:c80e08cbbf88fb228a911a8ab30005b2

 ///  File Name: mantis-poc.tar.gz
Description:
Mantis Bugtracker exploit scanner that looks for versions less than 1.0.0RC2 and greater than 0.18.3 which are vulnerable to XSS and variable poisoning attacks if register_globals is enabled.
Author:Joxean Guay del Paraguay
Related Exploit:mantis-poc.txt"
File Size:1893
Last Modified:Sep 29 05:46:09 2005
MD5 Checksum:0f28dffbd3d89ef328aab25d1033fb7b

 ///  File Name: phpfusion600109.txt
Description:
Exploit for PHP-Fusion v6.00.109 SQL Injection and admin credentials disclosure vulnerability.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:8361
Last Modified:Sep 29 05:43:30 2005
MD5 Checksum:fb1f0fefc75ecddc016cd57da6a28642

 ///  File Name: cubecart-3.0.3.txt
Description:
CubeCart 3.0.3 contains a flaw that allows a remote cross site scripting attack. Exploitation provided.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/2005/09/
File Size:7126
Last Modified:Sep 29 05:43:04 2005
MD5 Checksum:d724af0688649985edd7703faad60ed9

 ///  File Name: mantis-poc.txt
Description:
Mantis Bugtracker versions less than 1.0.0RC2 and greater than 0.18.3 are vulnerable to XSS and variable poisoning attacks if register_globals is enabled.
Author:Joxean Guay del Paraguay
Related Exploit:mantis-poc.tar.gz"
File Size:10303
Last Modified:Sep 29 05:37:57 2005
MD5 Checksum:d3137f93b98019ab086082b975926888

 ///  File Name: imap4d_FreeBSD_exploit.c
Description:
GNU Mailutils version 0.6 imap4d 'search' format string exploit. Written to be used against FreeBSD.
Author:Johnny Mast, Angelo Rosiello
Homepage:http://www.rosiello.org/
Related File:09.09.05.txt
File Size:12843
Last Modified:Sep 29 03:59:21 2005
MD5 Checksum:642b5fb9f407325048f6e9666e719172

 ///  File Name: lucidCMS.txt
Description:
lucidCMS version 1.0.11 is susceptible to a cross site scripting flaw. Exploitation details provided.
Author:X1ngBox
File Size:523
Last Modified:Sep 28 00:56:00 2005
MD5 Checksum:f332478664fc332178c3e9ebd169085b

 ///  File Name: OSG_Advisory_13.txt
Description:
RealPlayer and Helix Player remote format string exploit. This flaw makes use of the .rp and .rt file formats. Code tested on Debian 3.1 against RealPlayer 10 Gold's latest version.
Author:c0ntex
Homepage:http://www.open-security.org
File Size:10720
Last Modified:Sep 28 00:38:20 2005
MD5 Checksum:b753c5e729eb9c6216cb72df318e125c

 ///  File Name: mtaboom.zip
Description:
Proof of concept exploit for MultiTheftAuto versions 0.5 patch 1 and below. This causes Windows to crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:mtaboom.txt
File Size:6271
Last Modified:Sep 26 07:39:39 2005
MD5 Checksum:99976b5912749ccd7466e53d66e16d27

 ///  File Name: contentServ.txt
Description:
The ContentServ CMS allows for remote file disclosure. Exploitation details provided.
Author:qobaiashi
File Size:1559
Last Modified:Sep 26 07:32:52 2005
MD5 Checksum:932b8ac4713feab27795b6e0420a24f4

 ///  File Name: poppassd-lnx.sh.txt
Description:
Linux Qpopper poppassd latest version local root exploit.
Author:kcope
File Size:1397
Last Modified:Sep 26 07:28:44 2005
MD5 Checksum:880ae69daa8a80e3e1fce451afcb85f6

 ///  File Name: poppassd-freebsd.sh.txt
Description:
FreeBSD Qpopper poppassd latest version local root exploit. Tested on FreeBSD 5.4-RELEASE.
Author:kcope
File Size:1237
Last Modified:Sep 26 07:27:20 2005
MD5 Checksum:162efe574682e6d657e6b9d1c60362f7

 ///  File Name: wzdftpdwarez.pl.txt
Description:
WzdFTPd versions 0.5.4 and below remote command execution exploit.
Author:kcope
File Size:1698
Last Modified:Sep 26 07:25:32 2005
MD5 Checksum:053667191211ded156b69fabd6c0f93c

 ///  File Name: GeSHi.txt
Description:
GeSHi version 1.0.72 is susceptible to a local file inclusion vulnerability.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:3120
Last Modified:Sep 26 07:17:14 2005
MD5 Checksum:f1aa4004e9b285d93d41b03809a4bab1

 ///  File Name: cmsXSS.txt
Description:
CMS Made Simple 0.10 is susceptible to a cross site scripting attack.
Author:x1ng
File Size:434
Last Modified:Sep 26 07:07:55 2005
MD5 Checksum:af9cd509dd4e0c9de4f5b49ce90ecd54

 ///  File Name: maildisgust.txt
Description:
MailGust 1.9 is vulnerable to a SQL injection attack that allows for board takeover. Exploit provided.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:9176
Last Modified:Sep 26 06:49:54 2005
MD5 Checksum:2af5368ea3e4eb646f7368060ac87c62

 ///  File Name: efriends.txt
Description:
AlstraSoft E-Friends is susceptible to a remote command execution flaw. Details provided.
Author:khc
File Size:1299
Last Modified:Sep 26 06:48:33 2005
MD5 Checksum:c44bd751fc3d504fe3d73034311b7bad

 ///  File Name: riverdarkXSS.txt
Description:
Riverdark RSS Syndicator version 2.17 is susceptible to cross site scripting attacks.
Author:X1NG
File Size:463
Last Modified:Sep 24 04:01:22 2005
MD5 Checksum:a943737ac116052361033701e00a232a

 ///  File Name: jPortalSQL.txt
Description:
jPortal versions 2.2.1 through 2.3.1 suffer from a SQL injection vulnerability. Exploitation details provided.
Author:krasza
Homepage:http://www.krewniacy.pl
File Size:1180
Last Modified:Sep 24 03:55:03 2005
MD5 Checksum:7e6fd7142e87e934196bf671c73c2b53

 ///  File Name: phpmyfuck151.html
Description:
PhpMyFaq version 1.5.1 is susceptible to SQL injection, board takeover, user information disclosure, and remote code execution flaws. Detailed exploitation provided. Earlier versions are also possibly vulnerable.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:13868
Last Modified:Sep 23 09:41:09 2005
MD5 Checksum:7e4688c40fe3f1047e4d60351226021d

 ///  File Name: pwnzilla.txt
Description:
PwnZilla 5 - Exploit for the IDN host name heap buffer overrun in Mozilla browsers such as Firefox, Mozilla, and Netscape.
Author:Berend-Jan Wever aka Skylined
File Size:13871
Related CVE(s):CAN-2005-2871
Last Modified:Sep 23 08:51:45 2005
MD5 Checksum:eef9337ee7cdaceb446572f6a20a0ea6

 ///  File Name: mall23.txt
Description:
Mall23 is vulnerable to a SQL injection attack in AddItem.asp. Versions below 4.11 are susceptible.
Author:David Sopas Ferreira
File Size:1714
Last Modified:Sep 23 08:48:01 2005
MD5 Checksum:b5930d3085f3fa34e7ba1f5e486a1080

 ///  File Name: mylittle15_16b.txt
Description:
My Little Forum 1.5 SQL injection exploit that retrieves an md5 password hash.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:8164
Last Modified:Sep 23 08:38:47 2005
MD5 Checksum:c59af767c4a1416bec0a1e0907d82cb4

 ///  File Name: EXPL-A-2005-014.txt
Description:
Perldiver versions 1.x and 2.x suffer from cross site scripting flaws.
Author:Donnie Werner
Homepage:http://exploitlabs.com
File Size:2167
Last Modified:Sep 23 08:29:49 2005
MD5 Checksum:f972471c8c7a2fe83c55efcb0fab0724

 ///  File Name: mercury_imap.c
Description:
Mercury Mail IMAP server versions 4.01a and below remote buffer overflow exploit.
Author:c0d3r
Homepage:http://www.ihsteam.com
File Size:9314
Last Modified:Sep 23 07:56:20 2005
MD5 Checksum:071e805167e5cc006d1d151ea6d12887