Section:  .. / 0511-exploits  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 132
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: ipb.2.1.txt
Description:
Invision Power Board version 2.1 is susceptible to javascript injection and cross site scripting attacks. Advisory is in French. Exploitation details provided.
Author:benjilenoob
Homepage:http://www.redkod.org/
File Size:2394
Last Modified:Nov 8 15:38:01 2005
MD5 Checksum:89b3e1fa2d80d76844065e5fceb1fb07

 ///  File Name: waraxe-2005-SA043.txt
Description:
Phorum versions 5.0.0.alpha through 5.0.20 are susceptible to SQL injection attacks. Exploitation details provided.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:5157
Last Modified:Nov 8 15:35:05 2005
MD5 Checksum:e177fce92c9484b06a17fa7f1524b966

 ///  File Name: zoomblogXSS.txt
Description:
Zoomblog is prone to HTML injection attacks which can allow for cross site scripting attacks. Exploitation details provided.
Author:sikikmail
File Size:676
Last Modified:Nov 8 15:33:13 2005
MD5 Checksum:58b5a0ee85d12320d8610193e9e2ef6b

 ///  File Name: gallery24.pl.txt
Description:
Gallery version 2.4 remote SQL injection exploit.
Author:Abducter
Homepage:http://www.s4a.cc
File Size:1407
Last Modified:Nov 8 15:28:18 2005
MD5 Checksum:d72765f7b3817bc1d907037f2522dc1c

 ///  File Name: wzdFTPd.pm.txt
Description:
Wzdftpd SITE command arbitrary command execution Metasploit plugin exploit for versions 0.5.4 and below.
Author:David Maciejak
Related Exploit:wzdftpdwarez.pl.txt"
File Size:3272
Last Modified:Nov 5 05:02:01 2005
MD5 Checksum:4525076feb9a2471acc5fd1a9ca7255c

 ///  File Name: gpsdrive-ex-short-x86.pl.txt
Description:
Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. x86 version. Binds a shell to port 5074.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com
Related File:DMA-2005-1104a.txt
File Size:3162
Last Modified:Nov 5 04:39:31 2005
MD5 Checksum:c143e7d3c03702f1909b1e47e87b8040

 ///  File Name: gpsdrive-ex-long-ppc.pl.txt
Description:
Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. PowerPC version.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com
Related File:DMA-2005-1104a.txt
File Size:7065
Last Modified:Nov 5 04:38:14 2005
MD5 Checksum:5669d45ae60d36ec13e00422dc5e6863

 ///  File Name: spymacXSS.txt
Description:
Spymac Web OS 4.0 is susceptible to multiple cross site scripting vulnerabilities. Full exploitation details provided.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/2005/11/
File Size:3487
Last Modified:Nov 5 03:12:16 2005
MD5 Checksum:27cefc9d8d3de3e67378d98f45a27380

 ///  File Name: phpinfoXSS.txt
Description:
Proof of concept code showing the simple syntax needed to exploit the cross site scripting vulnerability in phpinfo.php for PHP versions 4.4.0 and below and 5.0.5 and below.
Related File:advisory_182005.77.txt
File Size:742
Last Modified:Nov 4 18:29:34 2005
MD5 Checksum:4ff556410905697a208875fa60c64129

 ///  File Name: cerberusDownload.txt
Description:
By playing with parameter manipulation, you can download other people's uploads in Cerberus Helpdesk.
Author:cumhur onat
File Size:1967
Last Modified:Nov 4 18:24:16 2005
MD5 Checksum:0c43ab5599acc8f4875c865a4d4b9278

 ///  File Name: H4-CREW-000003.txt
Description:
Superclick is susceptible to cross site scripting attacks in popup.php.
Author:h4 Crew
File Size:2025
Last Modified:Nov 4 18:10:55 2005
MD5 Checksum:a5a8e07c7b62bd8fb8b16ed975c2b627

 ///  File Name: 20051021.MS05-047.c
Description:
Remote exploit that makes use of a buffer length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList (services.exe - ms05-047).
File Size:13148
Related CVE(s):CVE-2005-2120
Last Modified:Nov 4 10:16:37 2005
MD5 Checksum:7da4be57b49181300f904d409eadbd69

 ///  File Name: CuteNews1.4.1.txt
Description:
CuteNews 1.4.1 Arbitrary file inclusion and remote code execution exploit.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:7411
Last Modified:Nov 4 02:33:13 2005
MD5 Checksum:c506f6d33b39493d17b3d6bc7f27f75c

 ///  File Name: php-handicapper.txt
Description:
PHP HANDICAPPER is susceptible to cross site scripting, SQL injection, and other flaws. Details provided.
Author:BiPi_HaCk
Homepage:http://www.NightmareTeAmZ.altervista.org
File Size:2282
Last Modified:Nov 3 03:09:14 2005
MD5 Checksum:ba4d54f1820d49ee349f292dfaa05af1

 ///  File Name: cirt-40-advisory.pdf
Description:
Whatsup Small Business 2004 is susceptible to a directory traversal attack. Exploitation details provided.
Author:Dennis Rand
Homepage:http://www.cirt.dk/
File Size:139157
Last Modified:Nov 3 03:07:48 2005
MD5 Checksum:fad3cd98d759016e604f2963e8e51661

 ///  File Name: bcarrydos.zip
Description:
Proof of concept exploit for a denial of service flaw in Battle Carry versions .005 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:bcarrydos.txt
File Size:7736
Last Modified:Nov 3 03:02:01 2005
MD5 Checksum:39dec2b6011875f864315f8ad113b0e4

 ///  File Name: flatfragz.zip
Description:
Proof of concept exploit for FlatFrag versions 0.3 and below which suffer from a null pointer crash and buffer overflow bugs.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:flatfragz.txt
File Size:7464
Last Modified:Nov 3 02:59:16 2005
MD5 Checksum:60c1835fd969eb9fa52eb2805e9e30b0

 ///  File Name: asusvsbugs.zip
Description:
Proof of concept exploit code for Asus Video Security versions 3.5.0.0 and below which suffer from buffer overflow and directory traversal vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:asusvsbugs.txt
File Size:8648
Last Modified:Nov 3 02:56:52 2005
MD5 Checksum:e4aa307d8812f26650b98783803691a3

 ///  File Name: NeroNet1202.txt
Description:
NeroNET versions 1.2.0.2 and below suffer from a directory traversal vulnerability. Details provided.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:2137
Last Modified:Nov 3 02:54:08 2005
MD5 Checksum:953852b90b8d3d216380c70216335626

 ///  File Name: gliderbof.zip
Description:
Proof of concept exploit for the buffer overflow vulnerability discovered in Glider collect'n kill version 1.0.0.0.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:gliderbof.txt
File Size:7036
Last Modified:Nov 3 02:49:52 2005
MD5 Checksum:a18ae12f5eebc73b1c269eedb5d6f902

 ///  File Name: scorchbugs.zip
Description:
Proof of concept code for various format string and buffer overflow vulnerabilities discovered in Scorched 3D versions 39.1 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:scorched.txt
File Size:10854
Last Modified:Nov 3 02:44:14 2005
MD5 Checksum:a972a8c408f6c3eabcf98e4bb5973de8

 ///  File Name: ggwbofc.zip
Description:
Client related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ggwbof.zip"
File Size:6589
Last Modified:Nov 3 02:38:55 2005
MD5 Checksum:7966dc701c134fc49ab2366ad54aaa2c

 ///  File Name: ggwbof.zip
Description:
Server related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ggwbofc.zip"
File Size:6755
Last Modified:Nov 3 02:38:39 2005
MD5 Checksum:71783d0afbcba6d5b0554a712014f175

 ///  File Name: TUVSA-0511-001.txt
Description:
Simple PHP Blog versions 0.4.5 and below are susceptible to multiple cross site scripting attacks.
Author:Nenad Jovanovic
Homepage:http://www.seclab.tuwien.ac.at
File Size:5346
Last Modified:Nov 3 02:11:16 2005
MD5 Checksum:3636d3372789a162f31edbcfc6ee0e7c

 ///  File Name: sambar63.txt
Description:
Sambar Server 6.3 BETA 2 is susceptible to cross-site scripting attacks under the proxy configuration section.
Author:h4xorcrew
File Size:2435
Last Modified:Nov 3 02:07:22 2005
MD5 Checksum:bdc00c99e6efe9ea02c5e3ea1e0eb7bc