Section:  .. / 0502-exploits  /

Page 4 of 5
<< 1 2 3 4 5 >> Files 75 - 100 of 108
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: RaidenHTTPD.txt
Description:
RaidenHTTPD version 1.1.27 is susceptible to a directory traversal flaw where any file can be extracted from the disk partition where the httpd is installed.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1885
Last Modified:Feb 6 06:35:24 2005
MD5 Checksum:43f94e3e8371843f56deb595922201ea

 ///  File Name: vbulletin-3.0.4-2.txt
Description:
vBulletin v3.0 through 3.0.4 remote command execution exploit, written in PHP. Takes advantage of a bug in forumdisplay.php.
Author:AL3NDALEEB
File Size:1881
Last Modified:Feb 18 09:08:23 2005
MD5 Checksum:fcdfb1e7e59b312e89ee3e3b65b0a189

 ///  File Name: advisory002.txt
Description:
Due to a flaw in punbb version 1.2.1, a remote attacker without an account can set the password of any user on the system to NULL, effectively shutting them out of the system.
Author:John Gumbel
File Size:1841
Last Modified:Feb 28 06:50:51 2005
MD5 Checksum:2fca37c706129ea7a3acd4dc2f838553

 ///  File Name: vpasp.txt
Description:
VP-ASP Shopping Cart version 5.x stores sensitive user data in .mdb files.
Author:fris
File Size:1840
Last Modified:Feb 22 21:59:21 2005
MD5 Checksum:10687fedbfae08a1525d1474c10cc001

 ///  File Name: gigafast.txt
Description:
The Gigafast/CompUSA router model EE400-R allows for login bypass, unauthenticated access to passwords stored as plain text, and denial of service attacks.
Author:Gary H. Jones II
Homepage:http://PointBlankSecurity.com
File Size:1792
Last Modified:Feb 26 01:07:27 2005
MD5 Checksum:789f93d1952fbba04654a9c8134f4860

 ///  File Name: delphiTurk.c
Description:
DelphiTurk FTP version 1.0 local exploit.
Author:Kozan
File Size:1741
Last Modified:Feb 23 05:58:34 2005
MD5 Checksum:12c55aa460475e8de778176efd82c8ac

 ///  File Name: un_0wnz_macue.txt
Description:
Mac OS X local root exploit for Adobe Version Cue that makes use of insecure path.
Author:unl0ck
Homepage:http://unl0ck.void.ru
File Size:1739
Last Modified:Feb 22 22:19:38 2005
MD5 Checksum:69bbac51aea208499ef387019c512930

 ///  File Name: webconnect.pl
Description:
WebConnect remote exploit that makes use of a directory traversal vulnerability in versions 6.4.4 and 6.5.
Author:KarakOrsan
Related File:webConnect.txt
File Size:1688
Last Modified:Feb 26 05:55:40 2005
MD5 Checksum:87be5ea960b62e6bab82d1a72e4b7e5a

 ///  File Name: avaya.cpp
Description:
Avaya IP Office Phone Manager exploit that attempts to extract sensitive data from the Windows registry.
Author:pagvac
File Size:1680
Last Modified:Feb 26 06:10:46 2005
MD5 Checksum:9666749b62f499e1f04e9084c391876b

 ///  File Name: pdsploit.pl
Description:
PerlDesk version 1.x remote SQL injection exploit.
Author:deluxe89, Astovidatu
Homepage:http://www.security-project.org/
File Size:1624
Last Modified:Feb 22 22:16:20 2005
MD5 Checksum:dcac1b92f57460cdc18ed76445a176fb

 ///  File Name: advisory003.txt
Description:
Improper handling of several arguments in the moderate.php code in punbb version 1.2.1 allows a malicious moderator to inject arbitrary SQL statements.
Author:John Gumbel
File Size:1610
Last Modified:Feb 28 06:52:15 2005
MD5 Checksum:0fa245da1da2ee450650915c291a331a

 ///  File Name: xinkaa-adv.txt
Description:
Xinkaa WEB Station versions 1.0.3 and below suffer from a classic directory traversal flaw.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1423
Last Modified:Feb 26 01:25:28 2005
MD5 Checksum:28039f57e1c23f2f1fccb9ab33b8e28d

 ///  File Name: visualboyadv.c
Description:
Local exploit for VisualBoyAdvanced 1.x.x that is not normally setuid by default.
Author:Qnix
File Size:1349
Last Modified:Feb 25 09:21:54 2005
MD5 Checksum:cdb6ec68d4c468ec8859817c0255fd15

 ///  File Name: tinyweb19DoS.pl
Description:
TinyWeb version 1.9 remote denial of service exploit.
Author:Karak0rsan
File Size:1242
Last Modified:Feb 3 08:11:27 2005
MD5 Checksum:ccafbd0f7e9912e77b22a752355c7089

 ///  File Name: un-typed.c
Description:
Proof of concept local exploit for typespeed.
Homepage:http://unl0ck.void.ru/
Related File:dsa-684.txt
File Size:1147
Last Modified:Feb 25 09:10:06 2005
MD5 Checksum:347d7a732144bfe5d0cdeeb1fa1e3005

 ///  File Name: adpl33t.txt
Description:
ADP Elite invoice and purchasing systems allow for a user to circumvent their menuing system and drop into a shell.
Author:rootfiend
File Size:1135
Last Modified:Feb 26 00:25:44 2005
MD5 Checksum:5d339d904d508ef5b80004ae8b5874d2

 ///  File Name: paNews_v2.0b4.txt
Description:
paNews version 2.0b4 is susceptible to remote php code injection.
Homepage:http://nst.e-nex.com/
File Size:1133
Last Modified:Feb 26 01:19:41 2005
MD5 Checksum:0768931e700ec992ba71b15aa8732b4a

 ///  File Name: vbulletin306.txt
Description:
vBulletin versions 3.0.6 and below suffer from a php code injection vulnerability.
Author:pokley
File Size:1082
Last Modified:Feb 26 01:15:12 2005
MD5 Checksum:12bc5da22028ab420d54fb8e080892d3

 ///  File Name: postnuke.postwrap.txt
Description:
Postnuke Postwrap remote command execution exploit. Includes information on finding vulnerable systems with google.
Homepage:http://www.albanianhaxorz.org
File Size:1081
Last Modified:Feb 18 05:15:17 2005
MD5 Checksum:0cb697ad4c75dda22556bedddae30ee1

 ///  File Name: SDtraverse.txt
Description:
SD Server versions 4.0.70 and below suffer from a classic directory traversal flaw.
Author:CorryL
File Size:1080
Last Modified:Feb 26 02:07:19 2005
MD5 Checksum:edd39b6f6ccf627ba499afd72b2bbdec

 ///  File Name: iGeneric12.txt
Description:
Multiple information disclosure and possible SQL injection vulnerabilities have been discovered in iGeneric eShop 1.2.
Author:John Cobb
Homepage:http://www.nobytes.com
File Size:1046
Last Modified:Feb 26 02:08:45 2005
MD5 Checksum:a90af00737204235c158c89d0979957d

 ///  File Name: advisory001.txt
Description:
A remote attacker can cause register.php punbb version 1.2.1 to execute arbitrary SQL statements by supplying malicious values to the language or email parameters.
Author:John Gumbel
File Size:983
Last Modified:Feb 28 06:49:14 2005
MD5 Checksum:49e3dec810dbe71cfb281699c1269f7d

 ///  File Name: CIS3513.txt
Description:
CIS WebServer version 3.5.13 is susceptible to a classic directory traversal attack.
Author:CorryL
File Size:829
Last Modified:Feb 28 07:18:30 2005
MD5 Checksum:8ddb6a4d31dd61f9b9a44f94d44f79fa

 ///  File Name: php-fusion.txt
Description:
php-fusion 4.x has a bypass vulnerability where a remote attacker can view any thread.
Author:TheGreatOne2176
File Size:708
Last Modified:Feb 23 04:14:24 2005
MD5 Checksum:30260b02cb67509898db9655337352fc

 ///  File Name: rna_bof.rgs
Description:
Proof of concept exploit that makes use of an integer overflow in RealArcade versions 1.2.0.994 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:rna_adv.txt
File Size:681
Last Modified:Feb 23 05:08:37 2005
MD5 Checksum:6325f487e6d6c41caecd50db3709d8a0