Section:  .. / 0610-exploits  /

Page 4 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 75 - 100 of 253
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: ArticleBeach-2.0.txt
Description:
ArticleBeach Script versions 2.0 and prior suffer from a remote file inclusion vulnerability.
Author:Bithedz
File Size:2286
Last Modified:Oct 28 01:48:27 2006
MD5 Checksum:035dc7ddd9445e566de0931174797d40

 ///  File Name: Kmail-1.9.1.txt
Description:
kmail 1.9.1 table/frameset DOS proof of concept.
Author:nnp
Homepage:http://silenthack.co.uk/
File Size:2191
Last Modified:Oct 20 23:44:11 2006
MD5 Checksum:734625a1724e90eb9dbad29db74ad770

 ///  File Name: Derdirigent.txt
Description:
Der dirigent suffers from multiple remote file inclusion vulnerabilities.
Author:xfrancesco84x
File Size:2184
Last Modified:Oct 24 23:32:30 2006
MD5 Checksum:03d0d86fb2f3d179cc6417d3b7a80e24

 ///  File Name: WoltLab-bb-1.1.2.txt
Description:
woltlab.de burning book 1.1.2 and prior SQL and PHP injection proof of concept exploit.
Author:ShAnKaR sec
Homepage:http://antichat.ru/
File Size:2142
Last Modified:Oct 21 00:25:20 2006
MD5 Checksum:79f8ddf230ce0b0934e76cf4707aae65

 ///  File Name: prdelka-vs-SCO-ptrace.c
Description:
SCO Unixware 7.1.3 ptrace local root exploit. SCO Unixware 7.1.3 kernel allows unprivileged users to debug binaries. The condition can be exploited by an attacker when he has execute permissions to a file which has the suid bit set.
Homepage:https://prdelka.blackart.org.uk/
File Size:2132
Last Modified:Oct 27 23:30:29 2006
MD5 Checksum:edb031037242ffd4e2ec330bdb0667ef

 ///  File Name: prdelka-vs-HPUX-libc.c
Description:
HP-UX libc timezone environment overflow exploit. HP-UX libc contains an exploitable stack overflow in the handling of "TZ" environment variable. The problem occurs due to insufficient bounds checking in the localtime_r() and related functions. Any suid or sgid program which uses the timezone functions can be used as an attack vector. This exploit uses "su" to obtain root privileges.
Homepage:https://prdelka.blackart.org.uk/
File Size:2123
Last Modified:Oct 27 23:10:37 2006
MD5 Checksum:b982c3df898d3bb448870e0bb0bda5a3

 ///  File Name: ProgSys-0.151.txt
Description:
ProgSys 0.151 and below suffer from multiple instances of cross site scripting.
Author:Moran Zavdi
Homepage:http://www.vigilon.com
File Size:2122
Last Modified:Oct 27 22:45:57 2006
MD5 Checksum:c4212ce4942000b8cb9e8b952b1637de

 ///  File Name: NewswriterSWv1.4.2.txt
Description:
21:05:10 2006 Newswriter SW v1.4.2 Remote File Include Exploit
Author:x0r0n
File Size:2054
Last Modified:Oct 4
MD5 Checksum:b834a51118fe4468d6c9d841b39e98c6

 ///  File Name: MyPhotos.txt
Description:
MyPhotos 0.1.3b suffers from a remote file inclusion vulnerability.
Author:Root3r_H3ll
Homepage:http://Www.PersainFox.com
File Size:2049
Last Modified:Oct 3 01:48:07 2006
MD5 Checksum:62fa5c87c70679fd3842536190185fe2

 ///  File Name: phpMyChat-0.1.txt
Description:
phpMyChat 0.1 suffers from a flaw in ChatPath allowing for remote file inclusion.
Author:Hasibuan
Homepage:http://www.nyubicrew.org/
File Size:2025
Last Modified:Oct 4 01:40:13 2006
MD5 Checksum:9b3bf387597605502795ee0116d5e76e

 ///  File Name: HostingController6.1.txt
Description:
Hosting Controller 6.1 Hotfix less than or equal to 3.2 suffers from multiple vulnerabilities which can allow an unauthenticated user to delete sites and perform SQL injection attacks.
Author:playpacific.emulacaid
Homepage:http://www.kapda.ir/advisory-442.html
File Size:2004
Last Modified:Oct 31 22:58:58 2006
MD5 Checksum:550389fe90820188ecc8262a1b61c698

 ///  File Name: 4images-sql.txt
Description:
4images version 1.7.x remote SQL injection exploit that makes use of search.php.
Author:Disfigure, h3llfyr3, Synsta
File Size:1952
Last Modified:Oct 9 05:44:42 2006
MD5 Checksum:04b7eb92b092d068d9e8a581ab557815

 ///  File Name: prdelka-vs-SCO-termshx.c
Description:
SCO Openserver 5.0.7 termsh exploit. 'termsh' is a program to view or modify an existing terminal entry on SCO Openserver. A stack based overflow exists in the handling of command line arguments, namely the [-o oadir] argument. It is installed setgid auth in a default SCO Openserver 5.0.7 install. An attacker may use this flaw to gain write access to /etc/passwd or /etc/shadow allowing for local root compromise.
Homepage:https://prdelka.blackart.org.uk/
File Size:1951
Last Modified:Oct 27 23:31:21 2006
MD5 Checksum:54d689a2345b1a2e628537500f0f9df8

 ///  File Name: exploit-NAVENG-222AD3.rar
Description:
Local proof of concept exploit for the Symantec Antivirus Engine that requires no special privileges (6 of 6).
Author:Ruben Santamarta
Homepage:http://www.reversemode.com
Related File:symantecPwn.txt
File Size:1855
Last Modified:Oct 12 06:00:15 2006
MD5 Checksum:54519922ca7814de921c787148896b56

 ///  File Name: prdelka-vs-GNU-adabas.c
Description:
GNU/Linux adabas v1301 universal local root exploit. Standard stack overflow in the command line arguments of SUID root(default) clr_kernel & stop bins. The exploit calculates the value to use for return address.
Homepage:https://prdelka.blackart.org.uk
File Size:1847
Last Modified:Oct 27 23:25:04 2006
MD5 Checksum:1f97be5807b9efc48b2e826fd3d99a62

 ///  File Name: CMScontenido.txt
Description:
CMS contenido suffers from a remote file inclusion vulnerability in dbfs.php and front_content.php.
Author:CvIr.System
File Size:1840
Last Modified:Oct 17 21:36:50 2006
MD5 Checksum:a44510d9257fd4aa7da5816bf7a33a64

 ///  File Name: opendocman-1.2rc3.txt
Description:
If magic_quotes_gpc is off opendocman 1.2rc3 suffers from an authentication bypass vulnerability.
Author:k1tk4t
File Size:1839
Last Modified:Oct 30 22:17:56 2006
MD5 Checksum:ad7914cf51bff4deabe41709de9e163f

 ///  File Name: exploit-NAVEX15-222AD3.rar
Description:
Local proof of concept exploit for the Symantec Antivirus Engine that requires no special privileges (5 of 6).
Author:Ruben Santamarta
Homepage:http://www.reversemode.com
Related File:symantecPwn.txt
File Size:1839
Last Modified:Oct 12 05:59:50 2006
MD5 Checksum:06ad9f6a32c65dc3e856dd94f6b58039

 ///  File Name: TextPattern-1.19.txt
Description:
TextPattern versions 1.19 and prior suffer from a remote file inclusion vulnerability.
Author:Bithedz
File Size:1826
Last Modified:Oct 28 01:47:34 2006
MD5 Checksum:94c107300056ddea8ccb2c5e71438161

 ///  File Name: net2ftp.txt
Description:
net2ftp, a web based FTP client is vulnerable to remote file inclusion.
Author:rUnViRuS
Homepage:http://www.wdzone.net/
File Size:1821
Last Modified:Oct 4 01:58:49 2006
MD5 Checksum:aca3c823234aef2e2e7153a935fa7bd8

 ///  File Name: IPB-2.1.7.txt
Description:
Several vulnerabilities in IPB exist that can force the admin to execute malicious SQL commands through the IPB SQL toolbox.
Author:rapigator
File Size:1804
Last Modified:Oct 5 00:50:02 2006
MD5 Checksum:2963d8df853149a04974e99559374122

 ///  File Name: prdelka-vs-HPUX-swask.c
Description:
HP-UX swask format string local root exploit. HP-UX 'swask' contains an exploitable format string vulnerability. The 'swask' utility is installed setuid root by default. Specifically the vulnerability is in the handling of the "-s" optional argument which is passed to a format function as verbatim.
Homepage:https://prdelka.blackart.org.uk/
File Size:1787
Last Modified:Oct 27 23:11:21 2006
MD5 Checksum:1e6de8951928f8e64f891b9fc9c3bb7e

 ///  File Name: shttpd134.txt
Description:
SHTTPD version 1.34 POST remote buffer overflow exploit.
Author:SkOd
File Size:1786
Last Modified:Oct 9 05:49:29 2006
MD5 Checksum:f887671710395536f0a8e0aab0330121

 ///  File Name: osprey1.0.txt
Description:
osprey 1.0 suffers from a remote file inclusion vulnerability in ListRecords.php.
Author:KaBaRa.HaCk.eGy
File Size:1743
Last Modified:Oct 21 00:54:53 2006
MD5 Checksum:c63a0df4a317b1b12bece2878a1eb0d0

 ///  File Name: CMScontenido-path.txt
Description:
CMS contenido allows an attacker to view database include files, thus exposing sensitive information.
Author:CvIr.System
File Size:1734
Last Modified:Oct 17 21:40:31 2006
MD5 Checksum:a3f1b71ed47b79e796a44a960d23223a