Section:  .. / 0701-exploits  /

Page 2 of 8
<< 1 2 3 4 5 6 7 8 >> Files 25 - 50 of 195
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: cacti086i-remote.txt
Description:
Cacti versions 0.8.6i and below remote injection exploit that makes use of cmd.php and allows for arbitrary code execution.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5356
Last Modified:Jan 20 04:50:37 2007
MD5 Checksum:63f152f8e622cf7721ee603df77032d2

 ///  File Name: swcms.php.txt
Description:
Simple Web Content Management System remote SQL injection exploit.
Author:DarkFig
File Size:5106
Last Modified:Jan 4 05:15:50 2007
MD5 Checksum:102c88548cc2d6b1cbc6f313c941c250

 ///  File Name: guest402.txt
Description:
@lex Guestbook versions 4.0.2 and below remote command execution exploit.
Author:DarkFig
File Size:5093
Last Modified:Jan 13 22:24:27 2007
MD5 Checksum:0ded326b5020bc4ce0354d4e29b3ea20

 ///  File Name: adobeplugin.txt
Description:
The Adobe Acrobat Reader plugin is susceptible to session riding and cross site scripting vulnerabilities.
Author:Stefano Di Paola
Homepage:http://www.wisec.it/
File Size:5025
Last Modified:Jan 4 08:31:20 2007
MD5 Checksum:cdcfb7f0fe7c3c08289067140c9c2be4

 ///  File Name: phpnuke79-sql.txt
Description:
PHP-Nuke versions 7.9 and below suffer from a SQL injection vulnerability.
Author:[NST]
Homepage:http://www.neosecurityteam.net/
File Size:4994
Last Modified:Jan 14 02:08:54 2007
MD5 Checksum:2d627eefbe9e3e5b9a936bf946f919c9

 ///  File Name: kav60-escalate.txt
Description:
Kaspersky Antivirus version 6.0 local privilege escalation exploit.
Author:m4d
Homepage:http://unl0ck.net/
File Size:4965
Last Modified:Jan 16 04:25:50 2007
MD5 Checksum:ed4aeb725bbd4b7425a25718a2cb5215

 ///  File Name: phpmyadmin-xss.txt
Description:
PhpMyAdmin versions 2.8.1 and below suffer from a cross site scripting vulnerability.
Author:AlFa
Homepage:http://www.virtuax.be/
File Size:4942
Last Modified:Jan 14 02:12:24 2007
MD5 Checksum:480f958eb72938c4a17576d9aa97a1ec

 ///  File Name: tmvwall381v3_exp.c
Description:
Local root exploit for vscan/VSAPI in Trend Micro VirusWall version 3.81 on Linux.
Author:Sebastian Wolfgarten
Related File:tmvwall381v3_adv.txt
File Size:4860
Last Modified:Jan 27 05:08:56 2007
MD5 Checksum:0ab083587b33449c1ee9e02dbb117db5

 ///  File Name: aiocp-sql.txt
Description:
AIOCP versions 1.3.009 and below suffer from a SQL injection vulnerability.
Author:Coloss
File Size:4729
Last Modified:Jan 14 02:02:58 2007
MD5 Checksum:8619a6df1ea243916f1196a897b36e21

 ///  File Name: cacti1-086i.txt
Description:
Cacti 0.8.6i remote create admin SQL injection exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:4555
Last Modified:Jan 20 04:48:35 2007
MD5 Checksum:835e38d1de631b4b148ac83f1834560e

 ///  File Name: hpj-x01.cpp
Description:
Proof of concept exploit for the .HPJ project file buffer overflow vulnerability in Microsoft Help Workshop version 4.03.0002.
Author:porkythepig
Related File:mhw-hpj.txt
File Size:4474
Last Modified:Jan 20 05:03:01 2007
MD5 Checksum:985cc677cb0570fada5a101f554777df

 ///  File Name: camouflage-crack.txt
Description:
Camouflage version 1.2.1 suffers from a vulnerability that allows access to encrypted files.
Author:NtWaK0, NoPh0BiA
File Size:4126
Last Modified:Jan 13 22:37:12 2007
MD5 Checksum:e55cf76cf98831630e2554aa141c3efd

 ///  File Name: MOAB-06-01-2007.pdf
Description:
Month of Apple Bugs - Warning, this pdf is an exploit. The current PDF specification is affected by a design flaw, a rogue Pages entry or malicious catalog dictionary could cause a denial of service (memory corruption condition, memory leakage, etc) or potential arbitrary code execution in the reader application.
Author:LMH, Kevin Finisterre
Homepage:http://projects.info-pull.com/moab/index.html
File Size:4026
Last Modified:Jan 13 23:40:09 2007
MD5 Checksum:525a1a163dab2a135fb38b6bf1510f4d

 ///  File Name: arcserve.py.txt
Description:
CA BrightStor ARCserver tapeeng.exe remote buffer overflow exploit for Windows 2000 that binds a shell to port 4443.
Author:Winny Thomas
File Size:3998
Last Modified:Jan 14 00:52:16 2007
MD5 Checksum:817658b2c1c984fa07f10f765cb0c1b6

 ///  File Name: MOAB-05-01-2007.rb.txt
Description:
Month of Apple Bugs - Exploit for a vulnerability in the handling of BOM files by the DiskManagement/diskutil that allows the setting of rogue permissions on the filesystem. This can be used to execute arbitrary code and escalate privileges. One of two exploits.
Author:LMH, Kevin Finisterre
Homepage:http://projects.info-pull.com/moab/index.html
Related Exploit:MOAB-05-01-2007_cron.rb.txt
File Size:3955
Last Modified:Jan 13 23:37:41 2007
MD5 Checksum:85e12ce375db99cbe7baff4ae16bce8a

 ///  File Name: createauction-rfi.txt
Description:
createauction suffers from a remote file inclusion flaw.
Author:IbnuSina
File Size:3583
Last Modified:Jan 13 23:53:26 2007
MD5 Checksum:d2fb41e3b8858ac1e893dec88321ec31

 ///  File Name: critical_openbsd_communism.c
Description:
Critical Security OpenBSD 3.x through 4.0 vga_ioctl() local root exploit.
Homepage:http://www.critical.lt/
File Size:3541
Last Modified:Jan 13 23:29:28 2007
MD5 Checksum:e0ffac6fd11b9f41e12b3acbdde329a8

 ///  File Name: filecopa.meta.txt
Description:
This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch.
Author:acaro
File Size:3519
Last Modified:Jan 14 00:55:18 2007
MD5 Checksum:a2ae6fee2fa0a5bfd82c7132880df591

 ///  File Name: MOAB-29-01-2007.rb.txt
Description:
Month of Apple Bugs - Apple iChat Bonjour functionality is affected by several remotely exploitable denial of service flaws which can be triggered via advertising presence services over multicast DNS. This is the denial of service proof of concept exploit.
Author:LMH
Homepage:http://projects.info-pull.com/moab/
File Size:3488
Last Modified:Jan 31 05:07:42 2007
MD5 Checksum:3c46cb42934dba072146951e4a6e1324

 ///  File Name: berlios.meta.txt
Description:
This Metasploit module exploits a format string vulnerability in the Berlios GPSD server. This vulnerability was discovered by Kevin Finisterre.
Author:senotier@enseirb.fr
File Size:3476
Last Modified:Jan 14 00:56:57 2007
MD5 Checksum:484e7a591e8ea80dd8ad2f5352e1486e

 ///  File Name: digi-sql.txt
Description:
DigiAffiliate versions 1.4 and below remote SQL injection exploit that makes use of visu_user.asp.
Author:ajann
File Size:3474
Last Modified:Jan 14 01:05:49 2007
MD5 Checksum:58aa58089822af0d14929c8afa15cc6a

 ///  File Name: checkpoint-bypass.txt
Description:
Check Point Connectra End Point is susceptible to a bypass flaw.
Author:Roni Bachar, Nir Goldshlager
File Size:3462
Last Modified:Jan 24 06:48:43 2007
MD5 Checksum:b40c5ea6144c7d9a9583cbe7dcb2ad48

 ///  File Name: MOAB-03-01-2007.rb.txt
Description:
Month Of Apple Bugs - A vulnerability in the handling of the HREFTrack field in Apple QuickTime allows cross-zone scripting, leading to potential remote arbitrary code execution.
Author:LMH, Kevin Finisterre
Homepage:http://projects.info-pull.com/moab/index.html
File Size:3414
Last Modified:Jan 4 09:16:03 2007
MD5 Checksum:14d84ba7efc399a2effe828124ed3a6c

 ///  File Name: indexu-xss.txt
Description:
All current versions of indexu suffer from multiple cross site scripting vulnerabilities.
Author:SwEET-DeViL
File Size:3370
Last Modified:Jan 20 02:35:48 2007
MD5 Checksum:924cbf5d7a26681840e4e25b58010568

 ///  File Name: intel-pwn.c
Description:
Intel Centrino ipw2200 wireless driver remote overflow proof of concept exploit.
Author:Giuseppe Gottardi
File Size:3311
Last Modified:Jan 20 04:46:27 2007
MD5 Checksum:c34e734af71d473ed79bf8b23c3da260