Section:  .. / 0610-exploits  /

Page 8 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 175 - 200 of 253
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: phpQuestionnaire3.12.txt
Description:
phpQuestionnaire 3.12 suffers from a remote file inclusion vulnerability.
Author:Hasibuan
Homepage:http://www.nyubicrew.org/adv/solpot-adv-08.txt
File Size:2516
Last Modified:Oct 3 00:14:13 2006
MD5 Checksum:3ebc16e0aa3928eb3f6e3d9f191ebf77

 ///  File Name: PHPRecipeBook-2.35.txt
Description:
PHPRecipeBook 2.35 and prior remote file inclusion exploit. Written in perl.
Author:CarcaBot
File Size:4758
Last Modified:Oct 21 02:18:03 2006
MD5 Checksum:bb81417e469a4d756e5affeb1c16e25f

 ///  File Name: PHProjekt5.1.1.txt
Description:
PHProjekt 5.1.1 and prior suffers from a remote file inclusion vulnerability in specialdays.php.
Author:Sp1deR_NeT
Homepage:http://WwW.Sp1deR-N3T.Com
File Size:1097
Last Modified:Oct 17 21:39:12 2006
MD5 Checksum:1aaa9a4d35d8a710f490942240a540b2

 ///  File Name: PHPSelect.txt
Description:
PHPSelect PDD suffers from a remote file inclusion vulnerability in $Application_Root.
Author:rUnViRuS
Homepage:http://www.wdzone.net/
File Size:1633
Last Modified:Oct 4 02:00:33 2006
MD5 Checksum:b4a16d58263a8686aa80980a5416dc85

 ///  File Name: phptopwebs-rfi.txt
Description:
PHP Top Webs suffers from a remote file inclusion vulnerability in config.php.
Author:Le CoPrA
File Size:1394
Last Modified:Oct 19 01:48:15 2006
MD5 Checksum:f0e62d74e8bc4a4803e8ebaeaf7fb759

 ///  File Name: PixelMotionV2.1.1.txt
Description:
Pixel Motion V2.1.1 PHP Code Execution / Create Admin Exploit
Author:DarkFig
Homepage:http://acid-root.new.fr
File Size:2951
Last Modified:Oct 4 02:08:02 2006
MD5 Checksum:01c1f7ac619f6cd5c4efb7febb264b5a

 ///  File Name: PLS-Bannieres1.21.txt
Description:
PLS-Bannieres 1.21 suffers from a remote file inclusion vulnerability in bannieres.php.
Author:Mahmood_ali
File Size:1030
Last Modified:Oct 28 01:50:55 2006
MD5 Checksum:50cefaeeae022fd7ac82aa6a5d15c2da

 ///  File Name: PNewsv1.1.0.txt
Description:
PNews v1.1.0 (nbs) suffers from a remote file inclusion vulnerability.
Author:CvIr.System
File Size:1557
Last Modified:Oct 3 00:59:56 2006
MD5 Checksum:e280a195a512026cafd8f8d5a32ada99

 ///  File Name: Polaring.txt
Description:
Polaring suffers from a remote file inclusion vulnerability in general.php.
Author:xfrancesco84x
File Size:918
Last Modified:Oct 4 01:17:35 2006
MD5 Checksum:f416fd297555417b2317edb6ee58517a

 ///  File Name: PollCreator1.04.txt
Description:
PHP Poll Creator 1.04 suffers from a remote file inclusion vulnerability in poll_vote.php.
Author:Mahmood_ali
File Size:961
Last Modified:Oct 24 23:00:21 2006
MD5 Checksum:85dc4e9856f152302fb430e7960be569

 ///  File Name: prdelka-vs-AEP-smartgate.c
Description:
AEP/Smartgate arbitrary file download exploit. A vulnerability exists in the smartgate SSL server (listens on port 443 by default) which may allow a malicious user to download arbitrary files with the privileges of the smartgate server.
Homepage:https://prdelka.blackart.org.uk/
File Size:7466
Last Modified:Oct 27 23:14:34 2006
MD5 Checksum:6ce28a7a194f641cb2d4513191ed2f37

 ///  File Name: prdelka-vs-CISCO-vpnftp.c
Description:
Cisco VPN Concentrator 3000 FTP remote exploit. A vulnerability exists in the Cisco VPN Concentrator 3000, an unauthenticated user may access the file system through manipulation of FTP service commands.
Homepage:https://prdelka.blackart.org.uk/
File Size:7840
Last Modified:Oct 27 23:15:17 2006
MD5 Checksum:e747d898f1bdf6d1e870ae52339704be

 ///  File Name: prdelka-vs-GNU-adabas.c
Description:
GNU/Linux adabas v1301 universal local root exploit. Standard stack overflow in the command line arguments of SUID root(default) clr_kernel & stop bins. The exploit calculates the value to use for return address.
Homepage:https://prdelka.blackart.org.uk
File Size:1847
Last Modified:Oct 27 23:25:04 2006
MD5 Checksum:1f97be5807b9efc48b2e826fd3d99a62

 ///  File Name: prdelka-vs-GNU-adabas2.txt
Description:
Adabas D 13.01 (GNU/Linux & Win32) Multiple Vulns in WebApps including directory traversal and SQL injection.
Homepage:https://prdelka.blackart.org.uk
File Size:730
Last Modified:Oct 27 23:26:21 2006
MD5 Checksum:1dfeddc20a6114ba456968291a7d59a7

 ///  File Name: prdelka-vs-GNU-exim.c
Description:
Exim versions 4.43-r2 and prior host_aton() local root exploit.
Homepage:https://prdelka.blackart.org.uk/
File Size:1644
Last Modified:Oct 27 23:28:08 2006
MD5 Checksum:e0c24b80bc25ed7a2678485cc3da07d2

 ///  File Name: prdelka-vs-HPUX-libc.c
Description:
HP-UX libc timezone environment overflow exploit. HP-UX libc contains an exploitable stack overflow in the handling of "TZ" environment variable. The problem occurs due to insufficient bounds checking in the localtime_r() and related functions. Any suid or sgid program which uses the timezone functions can be used as an attack vector. This exploit uses "su" to obtain root privileges.
Homepage:https://prdelka.blackart.org.uk/
File Size:2123
Last Modified:Oct 27 23:10:37 2006
MD5 Checksum:b982c3df898d3bb448870e0bb0bda5a3

 ///  File Name: prdelka-vs-HPUX-swask.c
Description:
HP-UX swask format string local root exploit. HP-UX 'swask' contains an exploitable format string vulnerability. The 'swask' utility is installed setuid root by default. Specifically the vulnerability is in the handling of the "-s" optional argument which is passed to a format function as verbatim.
Homepage:https://prdelka.blackart.org.uk/
File Size:1787
Last Modified:Oct 27 23:11:21 2006
MD5 Checksum:1e6de8951928f8e64f891b9fc9c3bb7e

 ///  File Name: prdelka-vs-HPUX-swmodify.c
Description:
HP-UX swmodify buffer overflow exploit. HP-UX 'swmodify' contains an exploitable stack overflow in the handling of command line arguements. Specifically the problem occurs due to insufficient bounds checking in the "-S" optional argument. 'swmodify' is installed setuid root by default in HP-UX and allows for local root compromise when exploiting this issue.
Homepage:https://prdelka.blackart.org.uk/
File Size:1728
Last Modified:Oct 27 23:12:16 2006
MD5 Checksum:84198c0996115cbd40ac0e55a1d641fb

 ///  File Name: prdelka-vs-HPUX-swpackage.c
Description:
HP-UX swpackage buffer overflow exploit. HP-UX 'swpackage' contains an exploitable stack overflow in the handling of command line arguments. Specifically the problem occurs due to insufficient bounds checking in the "-S" optional argument. 'swpackage' is installed setuid root by default in HP-UX and allows for local root compromise when exploiting this issue.
Homepage:https://prdelka.blackart.org.uk/
File Size:1733
Last Modified:Oct 27 23:09:55 2006
MD5 Checksum:90516b5dc1e5ad786ae98a9baacf76ce

 ///  File Name: prdelka-vs-SCO-enable
Description:
SCO Openserver 5.0.7 enable exploit. A standard stack-overflow exists in the handling of command line arguments in the 'enable' binary. A user must be configured with the correct permissions to use the "enable" binary. SCO user documentation suggests "You can use the asroot(ADM) command. In order to grant a user the right to enable and disable tty devices". This exploit assumes you have those permissions.
Homepage:https://prdelka.blackart.org.uk/
File Size:1235
Last Modified:Oct 27 23:28:58 2006
MD5 Checksum:9caf6cd28ee59e5cbf860948ad762476

 ///  File Name: prdelka-vs-SCO-netwarex.c
Description:
SCO Openserver 5.0.7 Netware Printing utilities exploit. Multiple buffer overflows exist in the handling of command line arguments in SCO Openserver Netware printing utils. EIP is overwritten after 997 bytes are supplied on the command line. The following binaries are installed setgid 'lp' as default and are vulnerable to this attack.
Homepage:https://prdelka.blackart.org.uk/
File Size:2388
Last Modified:Oct 27 23:29:48 2006
MD5 Checksum:a00a79408765a3639253b63aded49b6c

 ///  File Name: prdelka-vs-SCO-ptrace.c
Description:
SCO Unixware 7.1.3 ptrace local root exploit. SCO Unixware 7.1.3 kernel allows unprivileged users to debug binaries. The condition can be exploited by an attacker when he has execute permissions to a file which has the suid bit set.
Homepage:https://prdelka.blackart.org.uk/
File Size:2132
Last Modified:Oct 27 23:30:29 2006
MD5 Checksum:edb031037242ffd4e2ec330bdb0667ef

 ///  File Name: prdelka-vs-SCO-termshx.c
Description:
SCO Openserver 5.0.7 termsh exploit. 'termsh' is a program to view or modify an existing terminal entry on SCO Openserver. A stack based overflow exists in the handling of command line arguments, namely the [-o oadir] argument. It is installed setgid auth in a default SCO Openserver 5.0.7 install. An attacker may use this flaw to gain write access to /etc/passwd or /etc/shadow allowing for local root compromise.
Homepage:https://prdelka.blackart.org.uk/
File Size:1951
Last Modified:Oct 27 23:31:21 2006
MD5 Checksum:54d689a2345b1a2e628537500f0f9df8

 ///  File Name: prdelka-vs-SGI-xrunpriv
Description:
SGI IRIX 6.5 /usr/sysadm/bin/runpriv local root exploit.
Homepage:https://prdelka.blackart.org.uk/
File Size:1718
Last Modified:Oct 27 23:32:01 2006
MD5 Checksum:4b1c2d6a99b7463829ce9ccb4d234784

 ///  File Name: prdelka-vs-SUN-telnetd.c
Description:
Solaris in.telnetd 8.0 and prior remote exploit. A boundary condition error exists in telnet daemons derived from the BSD telnet daemon. Under certain circumstances, the buffer overflow can occur when a combination of telnet protocol options are received by the daemon. The function responsible for processing the options prepares a response within a fixed sized buffer, without performing any bounds checking. This exploit has been tested against Solaris 7 & Solaris 8 (sparc).
Homepage:https://prdelka.blackart.org.uk/
File Size:4614
Last Modified:Oct 27 23:32:47 2006
MD5 Checksum:113abf242f87ad50cf0bf00692925a89