Section:  .. / 0505-exploits  /

Page 2 of 6
<< 1 2 3 4 5 6 >> Files 25 - 50 of 149
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: codebug-7.txt
Description:
Multiple SQL injection and cross site scripting bugs have been discovered in MyBB 1.00 RC4.
Author:Alberto Trivero
Homepage:http://www.codebug.org
File Size:6129
Last Modified:Aug 15 01:19:18 2005
MD5 Checksum:85a3e05013b64edf9abbca6e69bced21

 ///  File Name: codethatFlaws.txt
Description:
CodeThat Shopping Cart suffers from cross site scripting, SQL injection, and remote command execution vulnerabilities. Full exploitation details provided.
Author:Lostmon
File Size:7471
Last Modified:Aug 7 08:15:44 2005
MD5 Checksum:2058d15b65736632fed98f4b1fc7ace6

 ///  File Name: comersusXSSsql.txt
Description:
Spread The Word, a Comersus based bookstore, is susceptible to multiple cross site scripting and SQL injection flaws.
Author:Lostmon
File Size:5816
Last Modified:Aug 14 22:21:55 2005
MD5 Checksum:11d03260aa83963bb20b709b917231e2

 ///  File Name: compozitSQL.txt
Description:
Compozit 1.0 is susceptible to SQL injection attacks.
Author:basher13
File Size:1295
Last Modified:Jun 23 10:46:38 2005
MD5 Checksum:42554337b9e9e4b3ee12dbd968458b96

 ///  File Name: cryptoloop_exploit.tar
Description:
Demonstration of vulnerabilities in Linux's cryptoloop encrypted file system support. Cryptoloop is vulnerable to watermarking, where you can determine whether or not a known watermarked file is present within an encrypted filesystem, even with the key(s) for that filesystem.
Author:Jari Ruusu
Homepage:http://marc.theaimsgroup.com/?l=linux-kernel&m=107719798631935&w=2
File Size:10240
Last Modified:May 25 20:31:39 2005
MD5 Checksum:770e8c995dc7e6ad8286dc30f08da246

 ///  File Name: DataTracConsole.c
Description:
DataTrac Activity Console remote denial of service exploit.
Author:INFGP
File Size:3021
Last Modified:May 27 06:50:32 2005
MD5 Checksum:d49ad8f0b24b0147eb5e84628ab537d6

 ///  File Name: dc_metabid_sqlinj.txt
Description:
Metabid contains multiple SQL injection vulnerabilities. Username / Password verification can be bypassed via SQL injection, and more issues exist. Advisory contains example exploit URL.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:1183
Last Modified:May 7 17:28:36 2005
MD5 Checksum:cf175e30c0afdd373d2ead33e631abcb

 ///  File Name: dc_metacart_sqling.txt
Description:
Multiple SQL injection vulnerabilities in metacart2 for payflow. Example exploit URL included in advisory.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:1710
Last Modified:May 7 17:44:18 2005
MD5 Checksum:36ed40131025266df8227f13f7a39b67

 ///  File Name: dc_phpcoin.txt
Description:
phpCoin versions 1.2.2 and lower contain multiple SQL injection vulnerabilities. Example exploit URL included in advisory.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:5204
Last Modified:May 7 19:00:57 2005
MD5 Checksum:d5249a8881994826b4f915cb875750eb

 ///  File Name: dmail_expl.c
Description:
dSMTP mail server 3.1b remote root format string exploit for Linux.
Author:cybertronic
File Size:12471
Last Modified:May 27 06:46:50 2005
MD5 Checksum:8cff01f5e63991a47652b2b70e5f43e1

 ///  File Name: DSL-504T.txt
Description:
The DSL-504T D-Link router allows for user authentication bypass.
Author:Alessandro Audero
File Size:2272
Last Modified:Aug 15 00:20:35 2005
MD5 Checksum:c1fde8173df26f4825a68bad081f7d4d

 ///  File Name: dt_Multiple_vuln.txt
Description:
Directtopics versions 2 beta, DT2 final, 2.1, and 2.2 suffer from SQL injection and cross site scripting flaws, amongst others.
Author:Morinex
File Size:1544
Last Modified:Aug 7 08:10:36 2005
MD5 Checksum:46c49b0024e2d2d17ae67a14fdfd5781

 ///  File Name: e107617.txt
Description:
e107 version 0.617 suffers from directory traversal and SQL injection vulnerabilities.
Author:Heintz
File Size:3851
Last Modified:Jul 13 09:42:39 2005
MD5 Checksum:902384d4bbaffee17d90c880bd742303

 ///  File Name: easymsgb_advisory.txt
Description:
Easy Message Board suffers from a remote directory traversal and code execution flaw.
Homepage:http://www.soulblack.com.ar
File Size:2114
Last Modified:Aug 7 08:12:47 2005
MD5 Checksum:d7499b0e14aaaf7c5aadb419771a82b3

 ///  File Name: ecl-winipdos.c
Description:
Proof of concept denial of service exploit for windows that takes advantage of an off-by-one validation error in the IP options field.
Author:Yuri Gushin, Alex Behar
File Size:3670
Last Modified:May 22 20:00:20 2005
MD5 Checksum:5604a878fbe7d738535cd90f3a34d11c

 ///  File Name: elfcd1.txt
Description:
Linux kernel binfmt_elf core dump buffer overflow exploit.
Homepage:http://isec.pl/
File Size:3378
Last Modified:May 27 07:07:03 2005
MD5 Checksum:be7c31586cdf30d3abe70f69489a99ba

 ///  File Name: ESRI9x.c
Description:
ESRI 9.x Arcgis local root format string exploit. Tested on Solaris 10.
Author:Kevin Finisterre, John H.
File Size:6736
Last Modified:May 27 06:12:44 2005
MD5 Checksum:d250611e1ce24040cbb19e2ac5585286

 ///  File Name: ethereal-SMB-DoS.c
Description:
Ethereal versions 0.10.10 and below SMB dissector remote denial of service exploit. Tested on 0.9.4 and 0.10.10.
Author:Nicob, vade79
File Size:7583
Last Modified:May 27 06:52:45 2005
MD5 Checksum:3ab2b3f2fbc4facb56d109e6506558d3

 ///  File Name: ethereal_sip_dos.c
Description:
Proof of concept denial of service exploit for the Ethereal SIP dissector stack overflow found in versions below 0.10.11.
Author:Shawn Colley
File Size:4731
Last Modified:Aug 7 09:02:09 2005
MD5 Checksum:b3908bb2bcae7fc18e791120bbbe8d62

 ///  File Name: exim-exploit-idefense.c
Description:
Local exploit for Exim 4.40.
Author:plugger
Related File:01.14.05.txt
File Size:2647
Last Modified:Aug 14 22:24:17 2005
MD5 Checksum:8f1ff4dca26b7a0fbf123cbe55347d6e

 ///  File Name: exponentXSS.txt
Description:
Exponent suffers from a cross site scripting vulnerability.
Author:RB9
File Size:573
Last Modified:Jul 2 03:10:53 2005
MD5 Checksum:949403a1e01bd64a43badd990e323686

 ///  File Name: f3r4.txt
Description:
INMOLUXE Premium 2.0 is susceptible to SQL injection attacks.
Author:F3R4_R4PP3R
File Size:1842
Last Modified:Aug 14 10:16:15 2005
MD5 Checksum:0a200f78eefdacbf9b0bd4836fddb430

 ///  File Name: firefox0day.php.txt
Description:
Mozilla Firefox 1.0.3 remote arbitrary code execution exploit. Note added by FrSIRT that offers clarity on its functionality.
File Size:2537
Last Modified:May 27 06:55:55 2005
MD5 Checksum:0943439407d32d8b0628d34dd7cefbd3

 ///  File Name: firefox103.txt
Description:
Firefox 1.0.3 spoof and auto download exploit.
File Size:7747
Last Modified:Aug 7 08:06:12 2005
MD5 Checksum:075be35c8ab3b89fae946409bbe395e8

 ///  File Name: firefoxSploit-2.txt
Description:
Mozilla Suite and Firefox script objections command execution exploit.
Author:moz_bug_r_a4
File Size:1649
Last Modified:May 27 07:39:41 2005
MD5 Checksum:968300b6c9f85deacba9a7890c01eeb6