Section:  .. / 0601-exploits  /

Page 4 of 6
<< 1 2 3 4 5 6 >> Files 75 - 100 of 137
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: ihs_winrar.c
Description:
WinRAR local buffer overflow exploit for versions 3.3.0 and below.
Author:c0d3r
File Size:5207
Last Modified:Jan 8 19:53:22 2006
MD5 Checksum:68a94ebfd48c42c061dfb8437d23f021

 ///  File Name: interspireXSS.txt
Description:
Interspire TrackPoint NX versions below 0.1 suffer from a cross site scripting vulnerability.
Author:M.Neset KABAKLI
Homepage:http://www.wakiza.com
File Size:780
Last Modified:Jan 15 16:42:51 2006
MD5 Checksum:6b167dc9b3a7d467b55dc68532d60a75

 ///  File Name: ironwallTraverse.txt
Description:
IronWall version 7.41 is susceptible to a classic directory traversal attack.
Author:hwclock
File Size:1479
Last Modified:Jan 11 07:18:42 2006
MD5 Checksum:479a75485b8bf209a4591e71760ef822

 ///  File Name: ISAA-2006-001.txt
Description:
123flashchat server versions 5.1 and below suffer from directory traversal attacks that allow for arbitrary file creation.
Author:Jesus Olmos Gonzalez
File Size:4698
Last Modified:Jan 21 19:58:32 2006
MD5 Checksum:6b899581652a6d00c78163f8d0a75085

 ///  File Name: kapda-22.txt
Description:
Azbb versions 1.1.00 and below suffer from cross site scripting vulnerabilities. NASL plugin to test for this included.
Author:Roozbeh Afrasiabi
Homepage:http://www.KAPDA.ir
File Size:3632
Last Modified:Jan 29 22:35:30 2006
MD5 Checksum:c73436eb82588baf20ab5c34d114e159

 ///  File Name: kapda-23.txt
Description:
The WorldsEnd.NET Free Ping script is susceptible to a restriction bypass condition.
Author:cvh
Homepage:http://www.KAPDA.ir
File Size:4677
Last Modified:Jan 29 22:40:21 2006
MD5 Checksum:e384226759c240ec8c678aa282f1d49d

 ///  File Name: kapda-25.txt
Description:
MYBB 1.x does not properly sanitize user supplied input leading to a XSS vulnerability.
Author:Roozbeh Afrasiabi
Homepage:http://www.KAPDA.ir
File Size:2023
Last Modified:Jan 27 08:24:13 2006
MD5 Checksum:d64d3cd4e2838d832b42972566e22d20

 ///  File Name: ldu-inject.txt
Description:
Land Down Under website engine is vulnerable to HTML injection via a stylesheet tag.
Author:Night_Warrior
File Size:337
Last Modified:Jan 25 09:07:15 2006
MD5 Checksum:7761067c75c3793a56993882a1a17ec7

 ///  File Name: LizardCart.txt
Description:
The Lizard Cart CMS version 1.04 suffers from an SQL injection vulnerability in the "id" variable.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/12/summary.html
File Size:1251
Last Modified:Jan 5 02:24:05 2006
MD5 Checksum:77c466bb102824b0596cf05408e2fa1a

 ///  File Name: MiniNukeSQL-2.txt
Description:
MiniNuke CMS System versions 1.8.2 and below suffer from a flaw where an authenticated user can change any password via membership.asp.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1515
Last Modified:Jan 15 18:01:33 2006
MD5 Checksum:0b9270f90b1f336310b682775ceb9e28

 ///  File Name: MiniNukeSQL.txt
Description:
MiniNuke CMS System versions 1.8.2 and below suffer from a SQL injection attack in news.asp.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1014
Last Modified:Jan 15 17:59:57 2006
MD5 Checksum:68d24208b9496fa63148b8e47e2ce704

 ///  File Name: mircfontexploitXPSP2.c
Description:
mIRC /font exploit that spawns a cmd.exe.
Author:Jordi Corrales
File Size:3399
Last Modified:Jan 29 22:52:43 2006
MD5 Checksum:cc354422b0b369da3ea499ad5264febe

 ///  File Name: mozilla_compareto.pm.txt
Description:
Metasploit exploit for the Mozilla Suite/Firefox InstallVersion->compareTo() remote buffer overflow vulnerability.
Author:Aviv Raff, H D Moore
Homepage:http://www.metasploit.com
File Size:6014
Last Modified:Jan 3 03:58:28 2006
MD5 Checksum:aa4311ac9c892a3c0d124870d0328670

 ///  File Name: ms05-055.c
Description:
Microsoft Windows Kernel APC Data-Free local privilege escalation vulnerability exploit.
Author:SoBeIt
File Size:10589
Last Modified:Jan 8 19:57:55 2006
MD5 Checksum:3364bf57dfbfff5b82e1c2917e44cfc5

 ///  File Name: MS05-055Exp.rar
Description:
MS05-055 local privilege escalation exploit tested on Windows2000 pro sp4 with and without rollup 1 - Chinese and English versions. Takes advantage of a vulnerability in the Windows Kernel APC Data-Free. Includes C source.
Author:SoBeIt
File Size:54187
Last Modified:Jan 6 10:32:10 2006
MD5 Checksum:81029bdb3889e6fc2d3cd1307e150698

 ///  File Name: MSIEDoS.txt
Description:
Microsoft(R) Internet Explorer 5 and 6 suffer from a remote denial of service flaw using IMG and XML elements. Proof of concept code included.
Author:Inge Henriksen
Homepage:http://ingehenriksen.blogspot.com/
File Size:1441
Last Modified:Jan 21 20:03:48 2006
MD5 Checksum:624ee3829bec9e7afa29fcf02a6044ea

 ///  File Name: msvc-featurebug-POC.zip
Description:
POC Exploit for the MSVC 6.0 run file bug.
Author:Morning Wood
Homepage:http://exploitlabs.com/
Related File:msvc-featurebug.txt
File Size:2666
Last Modified:Jan 26 07:05:55 2006
MD5 Checksum:b4e54a2fd586637af385f4b6701a97c9

 ///  File Name: mtink.c
Description:
/usr/bin/mtink local root exploit which overflows the HOME environment variable. For all versions of linux, especially Debian and Gentoo.
Author:Icesk
File Size:867
Last Modified:Jan 1 16:03:38 2006
MD5 Checksum:a51dc4863862f6bf39008443953c0d5d

 ///  File Name: MyBB-search.txt
Description:
MyBB v1.0.2 updated suffers from XSS via search.php
Author:imei
File Size:1389
Last Modified:Jan 27 08:44:26 2006
MD5 Checksum:d29a2eb7c73d6da7c970cb840531dff3

 ///  File Name: MyBB-sig.txt
Description:
MyBB suffers from HTML code injection in the signature field via an image tag.
Author:Night_Warrior
File Size:328
Last Modified:Jan 25 09:05:15 2006
MD5 Checksum:5155da837b5d1533e1991ecd6aab9446

 ///  File Name: Note-A-Day-2.1.txt
Description:
Note-A-Day v2.1 does not password protect a sensitive directory leading to information disclosure.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/44/summary.html
File Size:976
Last Modified:Jan 26 10:30:47 2006
MD5 Checksum:3f8f22100fbc3881340d9456cd079c0d

 ///  File Name: OraGENERATESCHEMAExploits.txt
Description:
Oracle 10g Release 1 exploit for the GENERATESCHEMA buffer overflow with shellcode that creates a file named Unbreakable.txt.
Author:Esteban Martinez Fayo
Homepage:http://www.argeniss.com/
Related File:ARGENISS-ADV-010601.txt
File Size:3411
Last Modified:Jan 29 23:09:49 2006
MD5 Checksum:58e81ef8d8f5dcde7c2a0fbf81cefc47

 ///  File Name: orjinweb.txt
Description:
Orjinweb E-Commerce is susceptible to a remote file inclusion vulnerability. Example provided.
Author:serxwebun
File Size:124
Last Modified:Jan 10 05:05:13 2006
MD5 Checksum:ad3cadb27bf67fc8299e98126a89d86b

 ///  File Name: PaQFile_Share.txt
Description:
eFileGo v3.01 contains multiple vulnerabilities including remote command execution, file upload, denial of service, and a directory traversal issue in upload.exe. The vulnerable eFileGo web server runs on TCP port 608.
Author:dr_insane
File Size:3069
Last Modified:Jan 1 15:37:04 2006
MD5 Checksum:26f8b9da7a9fec8026bda1b0fff8c34c

 ///  File Name: Phpclanwebsite.txt
Description:
Phpclanwebsite is vulnerable to XSS in the img tag.
Author:Night_Warrior
File Size:299
Last Modified:Jan 25 08:11:41 2006
MD5 Checksum:dfdd055019a7ca0d0e866cb1a0120cf6