Section:  .. / 0507-exploits  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 92
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: panzone.zip
Description:
Proof of concept exploit for a denial of service flaw in NetPanzer versions 0.8 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:panzone.txt
File Size:6682
Last Modified:Jul 14 09:17:02 2005
MD5 Checksum:b9f043353a57d989eba2f591968caa26

 ///  File Name: phpsftpd.txt
Description:
PHPsFTPd suffers from an administrative password and login leak in versions 0.2 through 0.4.
Author:Steve
File Size:4626
Last Modified:Jul 14 08:23:01 2005
MD5 Checksum:bc0b7626ffec11e6e7191e456293fa2c

 ///  File Name: phpcountxss.txt
Description:
PHP Counter 7.2 is susceptible to a cross site scripting flaw.
Author:priestmaster
Homepage:http://www.priestmaster.org
File Size:708
Last Modified:Jul 14 08:20:41 2005
MD5 Checksum:24e3fc0e1add57633ffb2a38276cfde8

 ///  File Name: CORE-2005-0629.txt
Description:
Core Security Technologies Advisory ID: CORE-2005-0629 - A buffer overflow vulnerability was found in the status command of MailEnable version 1.54. Remote exploitation of this vulnerability could allow an attacker to execute arbitrary code with System privileges. The status command requires an authenticated session, so valid credentials are required. Proof of concept python exploit included.
Homepage:http://www.coresecurity.com/corelabs/
File Size:4680
Last Modified:Jul 14 07:48:05 2005
MD5 Checksum:dabde93718382dac2fdd57e545e7b6b5

 ///  File Name: xmlrpc.py.txt
Description:
Pear XML-RPC Library 1.3.0 remote PHP code execution exploit. Written in Python.
Author:k3rn3lp4nic
File Size:4893
Last Modified:Jul 13 09:00:54 2005
MD5 Checksum:b1aca5d1cd600fa463195b2ab7cc7458

 ///  File Name: wms_poc.pl.txt
Description:
SoftiaCom's wMailserver version 1.0 remote denial of service exploit.
Author:fRoGGz
File Size:1517
Last Modified:Jul 13 08:44:35 2005
MD5 Checksum:db53312822f03753ee24a07bbf2d64b8

 ///  File Name: xmlrpcGeneric.txt
Description:
Basic XMLRPC exploit written for Metasploit.
Author:peasant
File Size:2597
Last Modified:Jul 13 08:40:49 2005
MD5 Checksum:8d3074f1510918dfea2f402a421c43f9

 ///  File Name: DMA-2005-0712b.txt
Description:
Nokia Affix Bluetooth btsrv/btobex makes poor use of system() allowing for remote command execution as root.
Author:Kevin Finisterre
File Size:2895
Last Modified:Jul 13 08:39:54 2005
MD5 Checksum:b67ea83126035bcc43724c4785e998d3

 ///  File Name: dragonfly.txt
Description:
DragonFly shopping cart allows for SQL injection attacks and price manipulation.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:12637
Last Modified:Jul 12 17:08:00 2005
MD5 Checksum:d482883fcd3ac68ccd4eefeee5f7e9f0

 ///  File Name: blogtorrent092.txt
Description:
BlogTorrent versions 0.92 and below allow for direct access to the file storing users' password hashes and logins.
Author:LazyCrs, pjphem
File Size:1624
Last Modified:Jul 12 16:48:36 2005
MD5 Checksum:4da758b9fa72d9db2e2536418981f646

 ///  File Name: hostingCreate.txt
Description:
Hosting Controller allows for unauthenticated session and user creation.
Author:kehieuhoc
File Size:1778
Last Modified:Jul 12 16:39:11 2005
MD5 Checksum:25c4c6f75be02b08237ed5dd01f1f5c6

 ///  File Name: idboard113SQL.txt
Description:
ID Board 1.1.3 is susceptible to a SQL injection vulnerability. Exploitation details provided.
Author:defa
File Size:1731
Last Modified:Jul 12 16:20:14 2005
MD5 Checksum:5abbe8873515204ab27ffcd8e881b683

 ///  File Name: simplephpBlog040.txt
Description:
SimplePHPBlog 0.4.0 suffers from a remote password hash disclosure vulnerability due to the password file for the system being downloaded and in the webroot.
Author:pjphem, LazyCrs
File Size:4227
Last Modified:Jul 8 09:09:21 2005
MD5 Checksum:2ab4c73dd001c1f85a161ba3262f1408

 ///  File Name: kaiseki.txt
Description:
The CGI script kaiseki.cgi is susceptible to a remote command execution vulnerability due to a lack of input validation. Details for exploitation provided.
Author:blahplok
File Size:1157
Last Modified:Jul 8 09:06:02 2005
MD5 Checksum:32296fd4340e4aa48da803ff4f2b6b0d

 ///  File Name: cartwizMulti.txt
Description:
CartWIZ suffers from multiple SQL injection and cross site scripting flaws. Detailed exploitation provided.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com
File Size:8116
Last Modified:Jul 7 16:23:03 2005
MD5 Checksum:d815f044cfff07011c7777abd29182e5

 ///  File Name: comersusMulti.txt
Description:
Comersus suffers from multiple SQL injection and cross site scripting flaws. Detailed exploitation provided.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com
File Size:7433
Last Modified:Jul 7 16:21:55 2005
MD5 Checksum:da6b190be7e83af6060807eebd927843

 ///  File Name: phpAuctionMulti.txt
Description:
PhpAuction suffers from authentication bypass, SQL injection, cross site scripting, and file inclusion vulnerabilities. Detailed exploitation provided.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com
File Size:11012
Last Modified:Jul 7 16:20:17 2005
MD5 Checksum:3a154e672eaa1c81e91463c097028c41

 ///  File Name: eRoomVuln.txt
Description:
Documentum eRoom 6.x suffers from problematic cookie handling and code execution vulnerabilities.
Author:c0ntex
File Size:5558
Last Modified:Jul 7 16:18:11 2005
MD5 Checksum:9ad509c16d38a6589ebbcc6fd5a81779

 ///  File Name: gnats.txt
Description:
GNATS, the GNU problem report management system, allows attackers to overwrite any files when installed setuid root. Versions 4.1.0 and 4.0 are confirmed vulnerable.
Author:pi3ki31ny
Homepage:http://www.pi3.int.pl
File Size:3254
Last Modified:Jul 7 15:47:58 2005
MD5 Checksum:63e55fb92ffc90fb49366dcd2157f1fc

 ///  File Name: McAfeeIPS.txt
Description:
The McAfee Intrushield IPS Management Console has been found susceptible to html and javascript injection, privilege escalation, and unauthenticated report deletion.
Author:c0ntex
File Size:13620
Last Modified:Jul 7 15:44:39 2005
MD5 Checksum:0ef5c12f8f6e2b58401a866929272c3e

 ///  File Name: phpwebsiteSQL.txt
Description:
Phpwebsite suffers from multiple SQL injection flaws and a directory traversal vulnerability. Detailed exploitation provided.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com
File Size:8350
Last Modified:Jul 7 15:30:36 2005
MD5 Checksum:fd4e70655b0f1ed00bcf494e9962aaaa

 ///  File Name: solsockjack.c
Description:
Solaris has a bug in the use of SO_REUSEADDR in that the kernel favors any socket binding operation that is more specific than the general *.* wildcard bind(). Due to this, a malicious socket can bind to an already bound interface if a specific IP address is used. Exploit included.
Author:c0ntex
File Size:30428
Last Modified:Jul 7 10:54:21 2005
MD5 Checksum:7950a3e21801d1f24dc251082d058b05

 ///  File Name: probeExec.txt
Description:
probe.cgi allows for remote command execution due to a lack of a properly sanitized olddat variable.
Author:spher3
Homepage:http://www.badroot.org/
File Size:1081
Last Modified:Jul 7 10:48:02 2005
MD5 Checksum:f4de7c6ebe8aa807ef8d8c2ba1e7bb18

 ///  File Name: myguestbook_advisory.txt
Description:
MyGuestbook version 0.6.1 suffers from a remote code execution vulnerability. Detailed exploitation provided.
Author:SoulBlack Security Research
Homepage:http://soulblack.com.ar
File Size:1678
Last Modified:Jul 7 10:40:49 2005
MD5 Checksum:492c6b5f3b4e3cd56209422f948ae609

 ///  File Name: php2016.txt
Description:
A cross site scripting bug exists in phpBB 2.0.16.
Author:alex
File Size:449
Last Modified:Jul 7 10:39:15 2005
MD5 Checksum:5024c8fb13e107d81df63564c8fdfeee