Section:  .. / 0511-exploits  /

Page 2 of 6
<< 1 2 3 4 5 6 >> Files 25 - 50 of 132
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: cyphorSQL.txt
Description:
Cyphor versions 0.19 and below suffer from a SQL injection attack. Exploit provided.
Author:HACKERS PAL
File Size:2999
Last Modified:Nov 15 07:29:26 2005
MD5 Checksum:7c5dc7bc55d196f61456968eb4e629ca

 ///  File Name: EasyPageCMSXSS.txt
Description:
EasyPageCMS is susceptible to cross site scripting attacks. Details provided.
Author:BiPi_HaCk
Homepage:http://www.NightmareSecurity.net/
File Size:808
Last Modified:Nov 15 07:28:22 2005
MD5 Checksum:b585a2cff1a6d7b26957911815221ad9

 ///  File Name: efiction2_xpl.txt
Description:
efiction versions 2.0 and below suffer from remote code execution, SQL injection, login bypass, cross site scripting, and path disclosure flaws. Full exploit and details provided.
Author:rgod
Homepage:http://rgod.altervista.org/
File Size:29353
Last Modified:Nov 30 21:01:16 2005
MD5 Checksum:7e1b76dddf96cf67aace637260a9cfc6

 ///  File Name: ekin103_xpl.html
Description:
EKINboard version 1.0.3 suffers from SQL injection and remote command execution flaws. Exploit provided.
Author:rgod
Homepage:http://rgod.altervista.org/
File Size:15499
Last Modified:Nov 20 20:19:41 2005
MD5 Checksum:0ce3e18c99a8415ab0b64160ebbc9e63

 ///  File Name: eQuickSQLXSS.txt
Description:
e-Quick Cart is susceptible to multiple cross site scripting and SQL injection flaws. Exploitation details provided.
Author:BiPi_HaCk
Homepage:http://www.NightmareSecurity.net/
File Size:1230
Last Modified:Nov 20 21:18:45 2005
MD5 Checksum:71fba8673c1b650aeef965d4009425a8

 ///  File Name: exophpdesk_advisory.txt
Description:
ExoPHPDesk version 1.2 is susceptible to remote code execution attacks. Exploitation details provided.
Homepage:http://www.soulblack.com.ar/
File Size:1888
Last Modified:Nov 20 21:47:01 2005
MD5 Checksum:9f790bfc7705ea578361766127649a57

 ///  File Name: exponentCMS.txt
Description:
ExponentCMS versions 0.96.3 and higher suffer from multiple vulnerabilities including cross site scripting and SQL injection flaws.
Author:Hans Wolters
File Size:2986
Last Modified:Nov 20 21:55:23 2005
MD5 Checksum:62881d111aa1ba4f0c8b69db88f7fc47

 ///  File Name: fbsdmaster.c
Description:
master.passwd disclosure local exploit for FreeBSD versions 4.11 and below and 5.4 and below.
Author:kcope
File Size:2709
Last Modified:Nov 15 11:29:38 2005
MD5 Checksum:1be6dc85228723eb40a313491d766821

 ///  File Name: fipsCMS.txt
Description:
fipsCMS is susceptible to cross site scripting.
Author:Preben Nylokken
File Size:319
Last Modified:Nov 15 11:16:04 2005
MD5 Checksum:28dcbfb300202cbcc19875304765d579

 ///  File Name: Flashosx.c
Description:
Proof of concept exploit that generates a flash file able to produce a denial of service condition. Relates to Flash.ocx.
Author:BassReFLeX
File Size:2597
Last Modified:Nov 20 20:27:23 2005
MD5 Checksum:4d44188e1e766f43177f22dec02ee46f

 ///  File Name: flatfragz.zip
Description:
Proof of concept exploit for FlatFrag versions 0.3 and below which suffer from a null pointer crash and buffer overflow bugs.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:flatfragz.txt
File Size:7464
Last Modified:Nov 3 02:59:16 2005
MD5 Checksum:60c1835fd969eb9fa52eb2805e9e30b0

 ///  File Name: forumSQL.txt
Description:
Some forum.php script is susceptible to SQL injection attacks.
Author:Abducter
File Size:1076
Last Modified:Nov 1 06:28:43 2005
MD5 Checksum:02b64f4cdcdf788e68810844ae573967

 ///  File Name: freeftpd.txt
Description:
Unavailable.
File Size:3341
Last Modified:Nov 20 08:44:52 2005
MD5 Checksum:34b3f38e8858ec6f7e1353636361df61

 ///  File Name: freeFTPDoS.txt
Description:
freeFTPd version 1.0.10 is susceptible to a remote denial of service attack. Exploit included.
Author:Stefan Lochbihler
File Size:3945
Last Modified:Nov 30 20:43:17 2005
MD5 Checksum:176fe3a8f002cb7793292507b61b3c21

 ///  File Name: fsigk_exp.py.txt
Description:
F-Secure Internet Gatekeeper for Linux local root exploit written in Python.
Author:xavier
Homepage:http://xavsec.blogspot.com
File Size:5726
Last Modified:Nov 10 06:41:36 2005
MD5 Checksum:8fd32a41755b781105ed34dc1b1eae28

 ///  File Name: FTGate-expl.pl.txt
Description:
Remote proof of concept buffer overflow exploit for the IMAP server in FTGate4 Groupware version 4.1.
Author:Luca Ercoli
Homepage:http://www.lucaercoli.it
Related File:ftgate4.txt
File Size:659
Last Modified:Nov 20 18:59:57 2005
MD5 Checksum:f36b542b381f5e2fc6e7adbca72613fb

 ///  File Name: gallery24.pl.txt
Description:
Gallery version 2.4 remote SQL injection exploit.
Author:Abducter
Homepage:http://www.s4a.cc
File Size:1407
Last Modified:Nov 8 15:28:18 2005
MD5 Checksum:d72765f7b3817bc1d907037f2522dc1c

 ///  File Name: ggwbof.zip
Description:
Server related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ggwbofc.zip"
File Size:6755
Last Modified:Nov 3 02:38:39 2005
MD5 Checksum:71783d0afbcba6d5b0554a712014f175

 ///  File Name: ggwbofc.zip
Description:
Client related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ggwbof.zip"
File Size:6589
Last Modified:Nov 3 02:38:55 2005
MD5 Checksum:7966dc701c134fc49ab2366ad54aaa2c

 ///  File Name: gliderbof.zip
Description:
Proof of concept exploit for the buffer overflow vulnerability discovered in Glider collect'n kill version 1.0.0.0.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:gliderbof.txt
File Size:7036
Last Modified:Nov 3 02:49:52 2005
MD5 Checksum:a18ae12f5eebc73b1c269eedb5d6f902

 ///  File Name: gmailbug.txt
Description:
A flaw in Google's G-Mail system allowed anyone access to any mailbox.
Homepage:http://www.elhacker.net/
File Size:5337
Last Modified:Nov 30 08:11:03 2005
MD5 Checksum:1e15a3835748c9b14ce6ad70691f2e45

 ///  File Name: google.pm.txt
Description:
This Metasploit module exploits a feature in the Saxon XSLT parser used by the Google Search Appliance. This feature allows for arbitrary java methods to be called. Google released a patch and advisory to their client base in August of 2005 (GA-2005-08-m). The target appliance must be able to connect back to your machine for this exploit to work.
Author:H D Moore
File Size:7138
Last Modified:Nov 20 20:29:43 2005
MD5 Checksum:4f156a6909004d91eb34fe3bfb396d20

 ///  File Name: googleProxy.txt
Description:
The Google Search Appliance allows customization of the search interface through XSLT style sheets. Certain versions of the appliance allow a remote URL to be supplied as the path to the XSLT style sheet. This feature can be abused to perform cross-site scripting (XSS), file discovery, service enumeration, and arbitrary command execution.
Author:H D Moore
Homepage:http://metasploit.com/
File Size:5264
Last Modified:Nov 30 08:19:58 2005
MD5 Checksum:197e33a1a1feb275398aab21c4d16687

 ///  File Name: gpsdrive-ex-long-ppc.pl.txt
Description:
Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. PowerPC version.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com
Related File:DMA-2005-1104a.txt
File Size:7065
Last Modified:Nov 5 04:38:14 2005
MD5 Checksum:5669d45ae60d36ec13e00422dc5e6863

 ///  File Name: gpsdrive-ex-short-x86.pl.txt
Description:
Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. x86 version. Binds a shell to port 5074.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com
Related File:DMA-2005-1104a.txt
File Size:3162
Last Modified:Nov 5 04:39:31 2005
MD5 Checksum:c143e7d3c03702f1909b1e47e87b8040