Section:  .. / 0810-exploits  /

Page 8 of 14
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 >> Files 175 - 200 of 332
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: mozff_sunjava_dos.txt
Description:
Solaris 10 + Sun's Java Desktop System 3 Mozilla/Firefox browser denial of service html exploit.
Author:Jeremy Brown
Homepage:http://jbrownsec.blogspot.com/
File Size:100211
Last Modified:Oct 15 20:23:21 2008
MD5 Checksum:fa67ad5e163daeccae97f63af7bf69f0

 ///  File Name: vividads-sql.txt
Description:
Vivid Ads Shopping Cart suffers from a remote SQL injection vulnerability.
Author:KoDoQ_GiLa
File Size:869
Last Modified:Oct 15 20:09:54 2008
MD5 Checksum:4b18dceb07b9bba15fa3255098ad9942

 ///  File Name: afd_plugin.zip
Description:
K-Plugin for Kartoffel that exploits a kernel memory overwrite in AFD.sys as outlined in MS08-066. Applies to Microsoft Windows XP and 2003.
Author:Ruben Santamarta
Homepage:http://www.reversemode.com/
File Size:152376
Last Modified:Oct 15 20:01:47 2008
MD5 Checksum:1cb47aa297bcdcce88506ae96e34cbc5

 ///  File Name: activeportail-xss.txt
Description:
ActivePortail suffers from cross site scripting and remote Java inclusion vulnerabilities.
Author:Ivan Sanchez
Homepage:http://www.nullcode.com.ar/
File Size:1375
Last Modified:Oct 15 02:35:04 2008
MD5 Checksum:53b5a5e23428c77179d572acddb8f1e3

 ///  File Name: phpwebgallery-hijackexec.txt
Description:
PHP Web Gallery versions 1.7.2 and below session hijacking and code execution exploit.
Author:EgiX
File Size:5320
Last Modified:Oct 15 02:33:21 2008
MD5 Checksum:f2667f95bc1df32f9e46d8cdcd10b6af

 ///  File Name: myphpdating-sql.txt
Description:
My PHP Dating suffers from a remote SQL injection vulnerability in success_story.php.
Author:Hakxer
Homepage:http://www.educ-up.com/
File Size:1792
Last Modified:Oct 15 02:28:47 2008
MD5 Checksum:3458d296f86ec7c5e4d9a567550d7d9e

 ///  File Name: phpnukereview2-sql.txt
Description:
Remote SQL injection exploit for the Reviews2 module for PHP-Nuke.
Author:boom3rang
Homepage:http://www.khq-crew.ws/
File Size:2135
Last Modified:Oct 14 16:42:55 2008
MD5 Checksum:2579b6910e2c785d884ddb19e1dbccb8

 ///  File Name: webscene-sql.txt
Description:
Webscene eCommerce suffers from a remote SQL injection vulnerability.
Author:Angela Chang
File Size:1723
Last Modified:Oct 14 16:41:29 2008
MD5 Checksum:ba6b149ecfdc07dd9273a1939de8ed82

 ///  File Name: nukedklan-multi.txt
Description:
Nuked-Klan versions 1.7.7 and below and SP4.4 and below remote SQL injection and remote shell upload exploit.
Author:real
Homepage:http://www.real.o-n.fr/
File Size:45579
Last Modified:Oct 14 16:40:28 2008
MD5 Checksum:a40fcd627b5b2d3fbafeecda20bf7c86

 ///  File Name: phpwebsite152-sql.txt
Description:
phpWebSite version 1.5.2 suffers from a remote SQL injection vulnerability in article.php.
Author:d3v1l
File Size:1478
Last Modified:Oct 14 16:37:19 2008
MD5 Checksum:14e5cb9672059a67b4d7394e970c7ba7

 ///  File Name: sezhoo-rfi.txt
Description:
SezHoo version 0.1 suffers from a remote file inclusion vulnerability.
Author:DaRkLiFe
File Size:916
Last Modified:Oct 14 16:29:30 2008
MD5 Checksum:bff82c131db2163d5006dd1554133397

 ///  File Name: sweetcms-sql.txt
Description:
Sweet CMS version 1.5.2 suffers from a remote SQL injection vulnerability.
Author:underc, Dapirates
Homepage:http://www.darkc0de.com/
File Size:1908
Last Modified:Oct 14 16:28:29 2008
MD5 Checksum:c48c86906cea5d362524b26eff5ae1be

 ///  File Name: alicetelecom-backdoor.txt
Description:
Alice Telecom Italia CPE Modems / Routers manufactured by Pirelli have an embedded backdoor in them that can be used to active telnetd/ftpd/tftpd/httpd.
Author:saxdax, drpepperONE
File Size:13740
Last Modified:Oct 14 16:27:23 2008
MD5 Checksum:a99a8d05f51466448fa0c5c4fbe48f8d

 ///  File Name: elxis-xss.txt
Description:
Elxis 2008.1 Nemesis suffers from multiple cross site scripting vulnerabilities.
Author:swappie aka faithlove
File Size:4381
Last Modified:Oct 14 14:36:05 2008
MD5 Checksum:ebdfb9d765bc810cafddbd35bb601bd1

 ///  File Name: parsblogger-sql.txt
Description:
ParsBlogger suffers from a remote SQL injection vulnerability in links.asp.
Author:Hussin X
Homepage:http://www.tryag.cc/
File Size:1314
Last Modified:Oct 14 14:34:58 2008
MD5 Checksum:149bf0f83355859a41b66866ef082518

 ///  File Name: xhresim-sql.txt
Description:
The XOOPS module xhresim suffers from a remote SQL injection vulnerability.
Author:r45c4l
Homepage:http://www.darkc0de.com
File Size:932
Last Modified:Oct 14 14:32:25 2008
MD5 Checksum:dcc97b8e740d2d6b3c6dddb5f42531ca

 ///  File Name: eserv-overflow.txt
Description:
Eserv 3.x FTP Server ABOR related remote stack overflow proof of concept exploit.
Author:LiquidWorm
Homepage:http://www.zeroscience.org/
File Size:897
Last Modified:Oct 14 14:29:49 2008
MD5 Checksum:691e790bbb589946408242bce970a239

 ///  File Name: wpcomment-multi.txt
Description:
WP Comment Remix version 1.4.3 suffers from cross site scripting, cross site request forgery, and SQL injection vulnerabilities.
Author:g30rg3_x
Related Exploit:wpcomment-sql.txt
File Size:5430
Last Modified:Oct 14 14:28:05 2008
MD5 Checksum:cb118fab7db93c68a6960d0b7ca49b24

 ///  File Name: wpcomment-sql.txt
Description:
WP Comment Remix version 1.4.3 remote SQL injection proof of concept exploit.
Author:g30rg3_x
Related Exploit:wpcomment-multi.txt
File Size:8491
Last Modified:Oct 14 14:27:05 2008
MD5 Checksum:ee48b9a41d58499eb60cc9424f9e5ed9

 ///  File Name: indexscript30-sql.txt
Description:
IndexScript version 3.0 suffers from a remote SQL injection vulnerability in sug_cat.php.
Author:d3v1l
File Size:1671
Last Modified:Oct 13 18:52:58 2008
MD5 Checksum:5e2807c76a32766616e40201332ae419

 ///  File Name: globsy-rewrite.txt
Description:
Globsy versions 1.0 and below remote file rewriting exploit.
Author:StAkeR
File Size:2523
Last Modified:Oct 13 18:39:27 2008
MD5 Checksum:78f659efa0d70ef59b7f3232e2bf167e

 ///  File Name: createdirectory2sysdba.sql
Description:
Proof of concept code that demonstrates how an Oracle DB user which has been granted CREATE ANY DIRECTORY can use that system privilege to grant themselves the SYSDBA system privilege by creating a DIRECTORY pointing to the password file location on the OS and then overwriting it with a previously prepared known binary password file using UTL_FILE.PUT_RAW from within the DB.
Author:Paul Wright
Homepage:http://www.oracleforensics.com/
Related File:create_any_directory_to_sysdba.pdf
File Size:6826
Last Modified:Oct 13 18:38:09 2008
MD5 Checksum:0aa995c9603c1c0edc67e8ed52f9a3d3

 ///  File Name: lokicms034-exec.txt
Description:
LokiCMS versions 0.3.4 and below remote command execution exploit.
Author:__GiReX__
Homepage:http://girex.altervista.org/
Related Exploit:lokicms-exec.txt
File Size:2121
Last Modified:Oct 13 18:30:37 2008
MD5 Checksum:e96c6fe9c20c761f97abfb09e4783ba6

 ///  File Name: lokicms-lfi.txt
Description:
Loki CMS version 0.3.4 create local file inclusion exploit that uses admin.php.
Author:JosS
Homepage:http://www.spanish-hackers.com/
File Size:2123
Last Modified:Oct 13 18:28:59 2008
MD5 Checksum:34108b04b4ff81c8f41076847bbd2607

 ///  File Name: lokicms-check.txt
Description:
Loki CMS versions 0.3.4 and below arbitrary check file exploit that uses index.php.
Author:JosS
Homepage:http://www.spanish-hackers.com/
File Size:2504
Last Modified:Oct 13 18:27:51 2008
MD5 Checksum:2e46b939fbe92807d4c684a4755329fb