Section:  .. / 0504-exploits  /

Page 3 of 6
<< 1 2 3 4 5 6 >> Files 50 - 75 of 138
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: ubbprintthread.txt
Description:
UBB printthread.php is susceptible to a SQL injection attack.
Author:Axl, HLL
File Size:4834
Last Modified:Jun 1 06:30:46 2005
MD5 Checksum:9a260e77a85f0ab0aaeaaf01555a9506

 ///  File Name: comasp.pl.txt
Description:
ASP NUKE 0.80 and below Comments.asp SQL injection exploit.
Author:Diabolic Crab
Homepage:http://icis.digitalparadox.org/
File Size:4689
Last Modified:Jun 1 07:26:41 2005
MD5 Checksum:2135317c0511df24ddde100321dbaa7d

 ///  File Name: GForGE3x.c
Description:
GForge 3.x remote command execution exploit that makes use of a flaw in the CVE modules.
Author:Lion
Homepage:http://www.bastardsoperatorsfromhell.org
File Size:4663
Last Modified:Apr 17 20:35:38 2005
MD5 Checksum:9ed3d8effc7da66a58c61d60da20af87

 ///  File Name: netv-locsbof.c
Description:
BakBone NetVault versions 6.x and 7.x configure.cfg local buffer overflow exploit.
Author:class101
Homepage:http://www.hat-squad.com/
Related File:bakboneOverflows.txt
File Size:4309
Last Modified:Apr 14 09:31:44 2005
MD5 Checksum:bc67dbb5e71ab675b5bbdc5fcc0263da

 ///  File Name: argo.c
Description:
ArGoSoft FTP versions 1.4.2.29 and below remote denial of service exploit that makes use of a buffer overflow in the DELE command.
Author:c0d3r
Related File:argosoftFTP1428.txt
File Size:4246
Last Modified:Apr 17 09:03:01 2005
MD5 Checksum:144b8d88a83d668d47212f9fdb1594b9

 ///  File Name: punbb_email_sql_injection.txt
Description:
PunBB forum software contains a vulnerability where SQL injection can be performed by first entering an email address containing exploitation data into the change_email function, and then redisplaying the email address. This is due to PunBB trusting data it gets from its own database.
Author:exploits
File Size:4094
Last Modified:Apr 17 22:12:11 2005
MD5 Checksum:b242610ce1957b5f242867f87a20589a

 ///  File Name: oneworldSQL.txt
Description:
The OneWorldStore DisplayResults.asp sIDSearch variable is susceptible to cross site scripting and SQL injection flaws.
Author:Lostmon
File Size:4052
Last Modified:Jun 1 06:13:44 2005
MD5 Checksum:f139d1f6b8c2718e62e33d4f2abe5df5

 ///  File Name: EXPL-A-2005-006.txt
Description:
XAMPP contains multiple vulnerabilities, including default usernames / passwords and Cross-site scripting issues. Example exploit URLs provided as part of advisory.
Author:Morning Wood
Homepage:http://exploitlabs.com
File Size:3902
Last Modified:Apr 18 22:41:13 2005
MD5 Checksum:6bba4395d9f460bc982e51b85993f88a

 ///  File Name: radbidsGoldv2.txt
Description:
RadBids Gold version 2 is susceptible to directory traversal, SQL injection, and cross site scripting vulnerabilities.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:3808
Last Modified:Apr 18 08:04:09 2005
MD5 Checksum:150e0e21faa3127385dc9bd429410f2d

 ///  File Name: ftpNow2614.c
Description:
FTP Now version 2.6.14 local password disclosure exploit.
Author:Kozan, ATmaCA
Homepage:http://www.netmagister.com
File Size:3752
Last Modified:Apr 17 21:14:58 2005
MD5 Checksum:58bb4e5a94f38ef9db492636e6130f7a

 ///  File Name: PHPNukeXSS2.txt
Description:
PHPNuke versions 7.6 and below are susceptible to multiple cross site scripting flaws.
Author:Maksymilian Arciemowicz
Homepage:http://www.securityreason.com
File Size:3686
Last Modified:Apr 17 19:36:39 2005
MD5 Checksum:1d04a760215df69e516cda89de31df7c

 ///  File Name: waraxe-2005-SA041.txt
Description:
PHPNuke versions 6.x through 7.6 suffer from SQL injection flaws in their Top module.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:3584
Last Modified:Apr 17 21:06:27 2005
MD5 Checksum:182956494bfaabfc5e8040492d369843

 ///  File Name: phpnuke_sqlinj.txt
Description:
Unavailable.
File Size:3584
Last Modified:Apr 17 21:08:25 2005
MD5 Checksum:182956494bfaabfc5e8040492d369843

 ///  File Name: goldenFTP25200.c
Description:
Golden FTP Server Pro version 2.52.0.0 remote stack buffer overflow exploit. Binds a shell to port 4444.
Author:darkeagle
Homepage:http://unl0ck.org/
File Size:3517
Last Modified:May 27 06:04:20 2005
MD5 Checksum:a90be80a005b7495195481d188191658

 ///  File Name: egroupware100007.txt
Description:
eGroupewar versions below 1.0.0.007 suffer from multiple cross site scripting and SQL injection vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3227
Last Modified:Jun 1 06:42:50 2005
MD5 Checksum:019c1faa36d51971a6b59988bb021895

 ///  File Name: logicsBS2000.txt
Description:
Logics Software Filetransfer from BS2000 host to web client suffers from a file inclusion vulnerability.
Author:Roman Ramirez, Pedro Vinuales
File Size:3122
Last Modified:Apr 17 19:58:26 2005
MD5 Checksum:7bd65aa86e79f997ae8758e1b388e67e

 ///  File Name: sco507nwprint.c
Description:
Local exploit for nwprint on SCO OpenServer 5.0.7 that gives egid of lp.
Author:pasquale minervini
File Size:2988
Last Modified:Apr 17 09:09:04 2005
MD5 Checksum:418eb2e3b0bdf4111da5646bad3a0e66

 ///  File Name: ICUII70.c
Description:
ICUII 7.0 local password disclosure exploit.
Author:Kozan, ATmaCA
Homepage:http://www.netmagister.com
File Size:2985
Last Modified:May 27 05:22:09 2005
MD5 Checksum:8ed3f4e54ac7e7c8421088b4335c232b

 ///  File Name: linksys-WET11_pass-reset.txt
Description:
The Cisco Linksys WET11 is vulnerable to having the password reset simply by going to a known URL on the administrative interface recently after the systems administrator has logged in. It is not necessary to know the current password.
Author:Kristian Hermansen
Homepage:http://ht-technology.com
File Size:2908
Last Modified:Apr 17 21:20:06 2005
MD5 Checksum:6ca7f7cad061edc47ba030dc887e3176

 ///  File Name: double094.txt
Description:
Double Choco Latte versions 0.9.4.3 and below are vulnerable to a remote code execution due to unsafe eval() calls.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2868
Last Modified:Apr 18 07:36:36 2005
MD5 Checksum:55b526e77a9322734d393d9efdd93667

 ///  File Name: modernBill.txt
Description:
ModernBill versions 4.3.0 and below suffer from file inclusion and cross site scripting vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2826
Last Modified:Apr 18 08:21:50 2005
MD5 Checksum:16d7f7f7e62e3aabd9da3f00e9d8c8a6

 ///  File Name: artmedic.c
Description:
artmedic_links5 remote file access exploit.
Author:Adam Simuntis
File Size:2707
Last Modified:Jun 1 07:41:40 2005
MD5 Checksum:1b8055521d05efeee7938649aa1163ef

 ///  File Name: p2pShareSpy.txt
Description:
P2P Share Spy 2.2 local password exploit.
Author:Kozan, ATmaCA
Homepage:http://www.spyinstructors.co
File Size:2649
Last Modified:Apr 18 08:06:47 2005
MD5 Checksum:c7b0c37fe9947d3090309c35a896ce00

 ///  File Name: jawsXSS.txt
Description:
JAWS 0.4 is susceptible to cross site scripting attacks.
Author:Paulino Calderon
Homepage:http://suckea.com/nah/
File Size:2640
Last Modified:Jun 1 06:14:43 2005
MD5 Checksum:248a4b1b25700ad4c3d338f553792343

 ///  File Name: php2014.txt
Description:
phpBB 2.0.14 suffers from various cross site scripting flaws.
Author:HaCkZaTaN
Homepage:http://neosecurityteam.net/
File Size:2606
Last Modified:Jun 1 08:44:24 2005
MD5 Checksum:2a7b4b32e84be940fa1e3cc3175e460a