Section:  .. / 0710-exploits  /

Page 2 of 8
<< 1 2 3 4 5 6 7 8 >> Files 25 - 50 of 185
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: d3engfspb.zip
Description:
Proof of concept exploit for the Doom 3 engine which suffers from a format string vulnerability. Doom 3 versions 1.3.1 and below, Quake 4 versions 1.4.2 and below, and Prey versions 1.3 and below are affected.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:d3engfspb.txt
File Size:7935
Last Modified:Oct 2 00:37:08 2007
MD5 Checksum:0298bcd939456dd9d796a208bd8e253a

 ///  File Name: deonix-sql.txt
Description:
Web Template Management System version 1.3 suffers from a remote SQL injection vulnerability.
Author:home_edition2001
Homepage:http://www.solpotcrew.org/
File Size:1789
Last Modified:Oct 5 01:35:01 2007
MD5 Checksum:6d02817e24173e2a8dacf23a28168a89

 ///  File Name: django-csrf.txt
Description:
Django version 0.96 suffers from a cross site request forgery vulnerability in the administrative panel.
Author:J. Carlos Nieto
File Size:2456
Last Modified:Oct 30 12:17:12 2007
MD5 Checksum:504747b3d7afb6e64ae7ce12ec45e9af

 ///  File Name: dmcms-sql.txt
Description:
DM CMS version 0.l7.0 suffers from a SQL injection vulnerability.
Author:Outlaw
Homepage:http://aria-security.net/
File Size:229
Last Modified:Oct 22 23:20:41 2007
MD5 Checksum:62a778b39586165018a6134fe5458aed

 ///  File Name: dnewsweb-xss.txt
Description:
The DNews News Server is susceptible to cross site scripting vulnerabilities.
Author:Doz
Homepage:http://www.hackerscenter.com/
File Size:1637
Last Modified:Oct 10 01:49:58 2007
MD5 Checksum:c0ea52447a092c5b648f9d6bbe1114b7

 ///  File Name: doopcms-sql.txt
Description:
DOOP CMS versions 1.3.7 and below suffer from a local file inclusion vulnerability.
Author:Vladiii
Homepage:http://www.rstzone.net/
File Size:2087
Last Modified:Oct 15 17:38:15 2007
MD5 Checksum:031768073449607cdd42f3dd76f3a394

 ///  File Name: drbguestbook-xss.txt
Description:
DRBGuestbook suffers from a remote cross site scripting vulnerability.
Author:Gokhan
File Size:655
Last Modified:Oct 3 19:26:06 2007
MD5 Checksum:a25cfbcf1d62f219c2293e06017d106a

 ///  File Name: dropteamz.zip
Description:
Proof of concept exploit for Dropteam versions 1.3.3 and below which suffer from format string, buffer overflow, and various other vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:dropteamz.txt
File Size:35619
Last Modified:Oct 5 23:00:32 2007
MD5 Checksum:1990ec4d051b68be23cd61234ffe1bb7

 ///  File Name: drupal-hash.txt
Description:
Drupal versions 5.2 and below PHP Zend Hash vulnerability exploitation vector.
Author:ShAnKaR
Homepage:http://securityvulns.com/
File Size:200
Last Modified:Oct 10 23:37:53 2007
MD5 Checksum:faa698ce19fb35ac550acce29475b2d8

 ///  File Name: edraw53-activex.txt
Description:
EDraw Office Viewer component version 5.3 FtpDownloadFile() remote buffer overflow exploit.
Author:shinnai
Homepage:http://shinnai.altervista.org/
File Size:1314
Last Modified:Oct 2 00:10:07 2007
MD5 Checksum:fe6ff5c182175bc540e039f4755862d0

 ///  File Name: efileman-multi.txt
Description:
eFileMan 7.x suffers from arbitrary file upload and direct configuration file access vulnerabilities.
Author:Xcross87
File Size:629
Last Modified:Oct 23 19:18:15 2007
MD5 Checksum:c79436f808318ce27e29d236e60ec939

 ///  File Name: egg-serv.c
Description:
Eggdrop server module message handling remote buffer overflow exploit for Eggdrop version 1.6.18.
Author:bangbus/magnum, Bow Sineath
File Size:4332
Last Modified:Oct 10 23:44:57 2007
MD5 Checksum:c740b2a5596d457930802785ee85e1b2

 ///  File Name: eiqnetworks-overflow.pm.txt
Description:
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the SEARCHREPORT command, a stack-based buffer overflow occurs.
Author:ri0t
File Size:1947
Last Modified:Oct 24 23:47:37 2007
MD5 Checksum:dadd4c1ae1e8772f173bac687e39528b

 ///  File Name: elseif-rfi.txt
Description:
Else If version Beta 0.6 suffers from multiple remote file inclusion vulnerabilities.
Author:HACKERS PAL
Homepage:http://www.soqor.net/
File Size:5363
Last Modified:Oct 8 19:36:31 2007
MD5 Checksum:ef7eb303e64e0276c078370b914b464f

 ///  File Name: eluisa-download.txt
Description:
eLuisa's Download Script suffers from an arbitrary file download vulnerability.
Author:Xcross87
File Size:291
Last Modified:Oct 23 19:16:59 2007
MD5 Checksum:b7dc0d29a377b96c1ee1956b32946d2e

 ///  File Name: emagic-sql.txt
Description:
emagiC CMS.NET version 4.0 suffers from a remote SQL injection vulnerability.
Author:hak3r-b0y
File Size:562
Last Modified:Oct 29 15:06:54 2007
MD5 Checksum:88e8e7c70253eb140cbd222f2f6ca9e3

 ///  File Name: ex211heap-overflow.txt
Description:
eXtremail versions 2.1.1 and below remote heap overflow proof of concept exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:1768
Last Modified:Oct 15 17:28:18 2007
MD5 Checksum:079ca23a63b53b94966240ac4073f960

 ///  File Name: ex211memmove-dos.txt
Description:
eXtremail versions 2.1.1 and below memmove() remote denial of service exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:2093
Last Modified:Oct 15 17:27:01 2007
MD5 Checksum:1b59cdddaad0c3f4473e9146c65d0d9f

 ///  File Name: extremail-v4.c
Description:
eXtremail versions 2.1.1 and below remote root exploit that makes use of LOGIN.
Author:mu-b
File Size:5635
Last Modified:Oct 15 17:41:42 2007
MD5 Checksum:9353662cab12d0536533faa939f7f5e6

 ///  File Name: extremail-v6.c
Description:
eXtremail versions 2.1.1 and below remote stack overflow exploit that makes use of PLAIN authentication.
Author:mu-b
File Size:7122
Last Modified:Oct 15 17:42:32 2007
MD5 Checksum:cc854243111f96a0ef533ea9e4e2bd39

 ///  File Name: fearfspb.zip
Description:
Proof of concept exploit for F.E.A.R. versions 1.08 and below which suffer from a format string vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:fearfspb.txt
File Size:7870
Last Modified:Oct 2 00:52:37 2007
MD5 Checksum:110ac975f68881fb84446b2136f8c9d0

 ///  File Name: fireconfig-lfi.txt
Description:
FireConfig version 0.5 suffers from a remote file disclosure vulnerability in dl.php.
Author:GolD_M
Homepage:http://www.tryag.cc/
File Size:200
Last Modified:Oct 29 15:07:42 2007
MD5 Checksum:3872222df077af09a025d9eef31a2eaa

 ///  File Name: flatnuke3-cm.txt
Description:
Flatnuke3 suffers from remote cookie manipulation and privilege escalation vulnerabilities.
Author:KiNgOfThEwOrLd
Homepage:http://www.inj3ct-it.org/
File Size:1694
Last Modified:Oct 23 17:56:00 2007
MD5 Checksum:3cccdb32895191f4ddc6cd48b5cc5a96

 ///  File Name: flatnuke3-fm.txt
Description:
Flatnuke 3 suffers from remote command execution and privilege escalation vulnerabilities.
Author:KiNgOfThEwOrLd
Homepage:http://www.inj3ct-it.org/
File Size:3008
Last Modified:Oct 23 17:56:18 2007
MD5 Checksum:e6a70aa9348521c875f71a3918b54dab

 ///  File Name: fsfdt-overflow.txt
Description:
FSFDT version 3.000 d9 remote buffer overflow exploit that spawns a reverse shell to 10.0.0.100:4321.
Author:weak
File Size:2690
Last Modified:Oct 5 01:32:29 2007
MD5 Checksum:968b5f8d999e018b1a86b8c7e98e4002