Section:  .. / 0507-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 92
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: Easyxp41.txt
Description:
Easyxp41 suffers from multiple cross site scripting and data disclosure flaws. An excessive amount of detailed exploitation is provided.
Author:FalconDeOro
File Size:3043
Last Modified:Aug 5 07:46:25 2005
MD5 Checksum:2895b06398aa7518a481acc5a04b9899

 ///  File Name: ECIrouter.txt
Description:
The ECI B-FOCuS router 312+ allows a remote, unauthenticated attacker the ability to download the configuration file containing the system passwords in clear text.
Author:D
File Size:1419
Last Modified:Jul 28 07:37:16 2005
MD5 Checksum:86a3d0646afa2279f429cefb4e617e67

 ///  File Name: eRoomVuln.txt
Description:
Documentum eRoom 6.x suffers from problematic cookie handling and code execution vulnerabilities.
Author:c0ntex
File Size:5558
Last Modified:Jul 7 16:18:11 2005
MD5 Checksum:9ad509c16d38a6589ebbcc6fd5a81779

 ///  File Name: eventum.pl.txt
Description:
MySQL AB Eventum versions 1.5.5 and below proof of concept SQL injection exploit.
Author:James Bercegay
Homepage:http://www.gulftech.org
Related Exploit:mysqlEventum.txt"
File Size:1700
Last Modified:Aug 5 07:56:55 2005
MD5 Checksum:e5b1ffe7254aad864d06c87eebd15e8f

 ///  File Name: flsearch.pl.txt
Description:
FtpLocate versions 2.02 and below remote code execution exploit that makes use of unsanitized user input.
Author:newbug
File Size:6692
Last Modified:Jul 28 07:40:37 2005
MD5 Checksum:8e8657e11d048ae7e1b7d614d8a5e7f3

 ///  File Name: FTPshellDoS.txt
Description:
Logging into FTPshell server version 3.38 will cause the ftpshelld.exe process to die, resulting in a denial of service.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/
File Size:1863
Last Modified:Jul 28 08:05:09 2005
MD5 Checksum:ac2ac8e4a10f4136e3188793d8eb0872

 ///  File Name: gforgeXSS.txt
Description:
GForge version 4.5 is susceptible to multiple cross site scripting vulnerabilities.
Author:Joxean Koret
File Size:4470
Last Modified:Aug 5 06:56:51 2005
MD5 Checksum:7c50c2216c8acfa27145c82dee23fc73

 ///  File Name: gnats.txt
Description:
GNATS, the GNU problem report management system, allows attackers to overwrite any files when installed setuid root. Versions 4.1.0 and 4.0 are confirmed vulnerable.
Author:pi3ki31ny
Homepage:http://www.pi3.int.pl
File Size:3254
Last Modified:Jul 7 15:47:58 2005
MD5 Checksum:63e55fb92ffc90fb49366dcd2157f1fc

 ///  File Name: Greasemonkey.txt
Description:
Greasemonkey Firefox extension arbitrary file disclosure exploit.
Author:Mark Pilgrim
File Size:4042
Last Modified:Jul 21 08:41:06 2005
MD5 Checksum:0b330270ab58f2f33d90e60ed1baee82

 ///  File Name: hostingCreate.txt
Description:
Hosting Controller allows for unauthenticated session and user creation.
Author:kehieuhoc
File Size:1778
Last Modified:Jul 12 16:39:11 2005
MD5 Checksum:25c4c6f75be02b08237ed5dd01f1f5c6

 ///  File Name: HPRadiaManagement.txt
Description:
NGSSoftware Insight Security Research Advisory - HP OpenView Radia Management Portal versions 2.x and 1.x running the Radia Management Agent suffer from a remote command execution flaw via a directory traversal. By connecting to the TCP port and sending a crafted packet, it is possible to traverse out of C:\Program Files\Novadigm and run any executable that is located on the same logical disk partition.
Author:David Morgan, Dominic Beecher
Homepage:http://www.ngssoftware.com
File Size:2727
Last Modified:Jul 28 18:59:55 2005
MD5 Checksum:746992e1a974b65a8b4f2abc6eab9a03

 ///  File Name: icc_ex.c
Description:
Proof of concept exploit for the MS05-036 JPEG ICC overflow issue.
Author:snooq
Homepage:http://www.redpuffer.net/snooq/web/
File Size:21407
Last Modified:Jul 21 18:06:03 2005
MD5 Checksum:19d8fb962b8bb333e210626ba647e33c

 ///  File Name: icmp-tools.tgz
Description:
Various tools that demonstrate the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP). Inside this tarball lives icmp-mtu.tar.gz, icmp-quench.tar.gz, and icmp-reset.tar.gz.
Author:Fernando Gont
Homepage:http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
Related File:draft-gont-tcpm-icmp-attacks-03.txt
File Size:17738
Last Modified:Jul 23 18:58:38 2005
MD5 Checksum:846c8bf7a9f947d3c0f2a46cc3be23d6

 ///  File Name: idboard113SQL.txt
Description:
ID Board 1.1.3 is susceptible to a SQL injection vulnerability. Exploitation details provided.
Author:defa
File Size:1731
Last Modified:Jul 12 16:20:14 2005
MD5 Checksum:5abbe8873515204ab27ffcd8e881b683

 ///  File Name: idm405.txt
Description:
Internet Download Manager input URL stack overflow exploit that affects versions 4.05 and below.
Author:c0d3r
Homepage:http://www.ihsteam.com/
File Size:6888
Last Modified:Jul 7 09:30:25 2005
MD5 Checksum:49a92c946b9d68852ee9164b0f29e840

 ///  File Name: iejavaprxyexploit.pl.txt
Description:
Microsoft Internet Explorer javaprxy.dll COM object exploit that binds a shell to port 28876. Tested on Internet Explorer 6 on Microsoft Windows XP SP1 and SP2.
Author:FrSIRT
File Size:4623
Last Modified:Jul 7 09:17:42 2005
MD5 Checksum:85b3ff1c3b9ffb9b9b514df63ca757b9

 ///  File Name: imail.cookie.txt
Description:
IMail appears to store the password for an account in clear text in cookies issued.
Author:Sintigan
File Size:428
Last Modified:Jul 7 10:16:09 2005
MD5 Checksum:2b4cfb18124f48bb82804534e0737e53

 ///  File Name: kaiseki.txt
Description:
The CGI script kaiseki.cgi is susceptible to a remote command execution vulnerability due to a lack of input validation. Details for exploitation provided.
Author:blahplok
File Size:1157
Last Modified:Jul 8 09:06:02 2005
MD5 Checksum:32296fd4340e4aa48da803ff4f2b6b0d

 ///  File Name: kayakoBad.txt
Description:
Kayako liveResponse versions 2.x suffer from cross site scripting, SQL injection, script insertion, and other vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3929
Last Modified:Aug 5 07:48:34 2005
MD5 Checksum:d12783db84eb4ba42f09805d1c50be4b

 ///  File Name: kentbb.txt
Description:
Kent's Guestbook allows for direct database file access.
Author:l--s
Homepage:http://3asfh.net/vb
File Size:245
Last Modified:Aug 5 07:35:02 2005
MD5 Checksum:67b78be508320b88e0c2e27981286f9d

 ///  File Name: kpopper10.txt
Description:
kpopper versions 1.0 and below suffer from an insecure temporary file creation vulnerability. Exploit included.
Author:Eric Romang
Homepage:http://www.zataz.net/
File Size:1530
Last Modified:Jul 7 10:07:07 2005
MD5 Checksum:22369ea4a48f2e5c26fc9a5c9ee0e9ab

 ///  File Name: kshoutaxs.txt
Description:
Kshout versions 2.x and 3.x allow for direct file access to their configuration files.
Author:SoulBlack
Homepage:http://soulblack.com.ar
File Size:1603
Last Modified:Aug 5 07:41:55 2005
MD5 Checksum:fd54c77c253ed96ef9fbab2190066717

 ///  File Name: McAfeeIPS.txt
Description:
The McAfee Intrushield IPS Management Console has been found susceptible to html and javascript injection, privilege escalation, and unauthenticated report deletion.
Author:c0ntex
File Size:13620
Last Modified:Jul 7 15:44:39 2005
MD5 Checksum:0ef5c12f8f6e2b58401a866929272c3e

 ///  File Name: mfsa2005-47exploit.txt
Description:
Mozilla Firefox versions 1.0.4 and below 'Set As Wallpaper' code execution exploit.
Author:Michael Krax
File Size:2186
Last Modified:Jul 15 07:40:55 2005
MD5 Checksum:4edb4b62ae413afc0a51e8a7fc4eb985

 ///  File Name: mfsa2005-49exploit.txt
Description:
Mozilla Firefox versions 1.0.4 and below data: URLs remote script injection exploit.
Author:Kohei Yoshino
File Size:1019
Last Modified:Jul 15 07:39:48 2005
MD5 Checksum:37b82e3fa6a17047e207ffc037b6508f