Section:  .. / 0511-exploits  /

Page 3 of 6
<< 1 2 3 4 5 6 >> Files 50 - 75 of 132
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: freeftpd.txt
Description:
Unavailable.
File Size:3341
Last Modified:Nov 20 08:44:52 2005
MD5 Checksum:34b3f38e8858ec6f7e1353636361df61

 ///  File Name: wzdFTPd.pm.txt
Description:
Wzdftpd SITE command arbitrary command execution Metasploit plugin exploit for versions 0.5.4 and below.
Author:David Maciejak
Related Exploit:wzdftpdwarez.pl.txt"
File Size:3272
Last Modified:Nov 5 05:02:01 2005
MD5 Checksum:4525076feb9a2471acc5fd1a9ca7255c

 ///  File Name: SEC-20051107-0.txt
Description:
SEC-CONSULT Security Advisory 20051107-0 - toendaCMS allows for theft of CMS usernames and passwords (XML database mode), session theft (XML database mode), directory traversal attacks (XML database mode), and arbitrary file uploads. Versions below 0.6.2 are affected.
Author:Bernhard Mueller
Homepage:http://www.sec-consult.com
File Size:3223
Last Modified:Nov 8 17:56:56 2005
MD5 Checksum:6844189f4d71a6ff5a7e18d4ca8b49b4

 ///  File Name: gpsdrive-ex-short-x86.pl.txt
Description:
Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. x86 version. Binds a shell to port 5074.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com
Related File:DMA-2005-1104a.txt
File Size:3162
Last Modified:Nov 5 04:39:31 2005
MD5 Checksum:c143e7d3c03702f1909b1e47e87b8040

 ///  File Name: revizeSQL.txt
Description:
Revize(r) CMS is susceptible to SQL injection and cross site scripting attacks. Exploitation details provided.
Author:Lostmon
File Size:3161
Last Modified:Nov 20 17:27:04 2005
MD5 Checksum:fea2e4ff6b5637b58f64bf7ed7bf5fbd

 ///  File Name: twiki20030201.pl.txt
Description:
TWiki 20030201 VIEW string remote command execution exploit.
Author:rUnViRuS
Homepage:http://www.worlddefacers.net
File Size:3144
Last Modified:Nov 8 17:49:44 2005
MD5 Checksum:704505f7f84b2632546beef86fb51138

 ///  File Name: SEC-20051107-1.txt
Description:
SEC-CONSULT Security Advisory 20051107-1 - SEC Consult has found that parameters to ActionDefineFunction (ACTIONRECORD 0x9b) in the Macromedia Flash Plugin are not properly sanitized. Loading a specially crafted SWF leads to an improper memory access condition which can be used to crash flash player or may be exploited as a vector for code execution. This issue is similar to CAN-2005-2628 (as reported by eEye Digital Security on November 4, 2005) but affects a different function. Versions affected: flash.ocx 7.0.19.0 and earlier, libflashplayer.so before 7.0.25.0.
Author:Bernhard Mueller
Homepage:http://www.sec-consult.com
File Size:3098
Last Modified:Nov 8 17:59:22 2005
MD5 Checksum:264599e1850c14e2756e29db80b22319

 ///  File Name: cyphorSQL.txt
Description:
Cyphor versions 0.19 and below suffer from a SQL injection attack. Exploit provided.
Author:HACKERS PAL
File Size:2999
Last Modified:Nov 15 07:29:26 2005
MD5 Checksum:7c5dc7bc55d196f61456968eb4e629ca

 ///  File Name: exponentCMS.txt
Description:
ExponentCMS versions 0.96.3 and higher suffer from multiple vulnerabilities including cross site scripting and SQL injection flaws.
Author:Hans Wolters
File Size:2986
Last Modified:Nov 20 21:55:23 2005
MD5 Checksum:62881d111aa1ba4f0c8b69db88f7fc47

 ///  File Name: phgrafx.txt
Description:
A buffer overflow vulnerability in the utility phgrafx included in the QNX Neutrino Realtime Operating System can potentially be exploited by malicious users to escalate their privileges. Exploit included.
Author:pasquale minervini
File Size:2967
Last Modified:Dec 1 10:31:32 2005
MD5 Checksum:ea16f7998381ea8d6d6f22765720cc90

 ///  File Name: 0003.txt
Description:
TikiWiki versions 1.9.x up to and including 1.9.2 suffer from a cross site scripting vulnerability and possible SQL injection vulnerabilities.
Homepage:http://moritz-naumann.com/
File Size:2887
Related CVE(s):CVE-2005-3528, CVE-2005-3529
Last Modified:Nov 10 06:25:42 2005
MD5 Checksum:01326c2f74a0d9a59e9f2daf503b0a9b

 ///  File Name: php2018.txt
Description:
PHP Upload Center is susceptible to directory traversal attacks via the filename parameter in index.php.
Author:Liz0ziM, wannacut, R00t3RR0R
Homepage:http://www.biyo.tk
File Size:2883
Last Modified:Dec 2 17:41:07 2005
MD5 Checksum:a239186e97510988e205365cd4334173

 ///  File Name: ipb.2.1-english.txt
Description:
Invision Power Board version 2.1 is susceptible to javascript injection and cross site scripting attacks. English version of this advisory translated by Jerome Athias. Exploitation details provided.
Author:benjilenoob
Homepage:http://www.redkod.org/
File Size:2874
Last Modified:Nov 8 16:51:41 2005
MD5 Checksum:ff9ecbf8c1b28e47c93b281cd1d1ebd9

 ///  File Name: fbsdmaster.c
Description:
master.passwd disclosure local exploit for FreeBSD versions 4.11 and below and 5.4 and below.
Author:kcope
File Size:2709
Last Modified:Nov 15 11:29:38 2005
MD5 Checksum:1be6dc85228723eb40a313491d766821

 ///  File Name: HYSA-2005-009.txt
Description:
Elite Forum version 1.0.0.0 is susceptible to a cross site scripting vulnerability.
Author:Gladiator.KHF
Homepage:http://www.h4cky0u.org
File Size:2709
Last Modified:Nov 2 02:18:03 2005
MD5 Checksum:9e1933a9385b71ef068a854793671d64

 ///  File Name: VHCSXSS.txt
Description:
VHCS version 2.x is susceptible to cross site scripting attacks.
Author:Moritz Naumann
Homepage:http://moritz-naumann.com/
File Size:2673
Last Modified:Nov 30 20:26:46 2005
MD5 Checksum:8d6b5fb521260765932fd6061bd26bd1

 ///  File Name: PIXdos.pl.txt
Description:
Remote denial of service exploit that makes use of a blocking feature in Cisco PIX 515E OS version 6.3(3).
Author:Konstantin V. Gavrilenko
Homepage:http://www.arhont.com/
Related File:ciscoPacket.txt
File Size:2659
Last Modified:Nov 30 19:48:56 2005
MD5 Checksum:24cb7f8e1c499bbc120082a18e1065a9

 ///  File Name: Flashosx.c
Description:
Proof of concept exploit that generates a flash file able to produce a denial of service condition. Relates to Flash.ocx.
Author:BassReFLeX
File Size:2597
Last Modified:Nov 20 20:27:23 2005
MD5 Checksum:4d44188e1e766f43177f22dec02ee46f

 ///  File Name: ieDoS.pm.txt
Description:
Microsoft Internet Explorer denial of service metafile exploit. Raises CPU utilization up to 100%.
Author:Winny Thomas
File Size:2570
Last Modified:Dec 1 10:34:01 2005
MD5 Checksum:5c1c28310a0cdee182a606b0c706306f

 ///  File Name: sambar63.txt
Description:
Sambar Server 6.3 BETA 2 is susceptible to cross-site scripting attacks under the proxy configuration section.
Author:h4xorcrew
File Size:2435
Last Modified:Nov 3 02:07:22 2005
MD5 Checksum:bdc00c99e6efe9ea02c5e3ea1e0eb7bc

 ///  File Name: 0004.txt
Description:
Antville version 1.1 suffers from a cross site scripting flaw.
Homepage:http://moritz-naumann.com/
File Size:2407
Related CVE(s):CVE-2005-3530
Last Modified:Nov 10 06:26:50 2005
MD5 Checksum:b892b6dfca7fbf65303b9584f298dfc9

 ///  File Name: ipb.2.1.txt
Description:
Invision Power Board version 2.1 is susceptible to javascript injection and cross site scripting attacks. Advisory is in French. Exploitation details provided.
Author:benjilenoob
Homepage:http://www.redkod.org/
File Size:2394
Last Modified:Nov 8 15:38:01 2005
MD5 Checksum:89b3e1fa2d80d76844065e5fceb1fb07

 ///  File Name: phpwcms.txt
Description:
PHPWCMS 1.2.5-DEV is susceptible to multiple cross site scripting and directory traversal attacks. Exploit details provided.
Author:Stefan Lochbihler
File Size:2289
Last Modified:Nov 20 05:02:45 2005
MD5 Checksum:9397e2d8133e9cee75fd10900abcecff

 ///  File Name: php-handicapper.txt
Description:
PHP HANDICAPPER is susceptible to cross site scripting, SQL injection, and other flaws. Details provided.
Author:BiPi_HaCk
Homepage:http://www.NightmareTeAmZ.altervista.org
File Size:2282
Last Modified:Nov 3 03:09:14 2005
MD5 Checksum:ba4d54f1820d49ee349f292dfaa05af1

 ///  File Name: PHPCalendar.txt
Description:
A remote code execution vulnerability has been discovered in various CodeGrrl products including PHPCalendar, PHPClique, PHPFanBase, PHPCurrently, and PHPQuotes.
Author:Robin Verton
File Size:2282
Last Modified:Nov 15 07:27:42 2005
MD5 Checksum:cd96338a3b96453f9b3b5d5e28f63ef5