Section:  .. / 0601-exploits  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 137
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: phpflaw.php.zip
Description:
PHP 4.3.10 and 4.4.0 Windows remote stack overflow exploit which works on certain systems by overflowing the mysql_connect function. Includes an advisory and workaround information.
Author:mercenary
File Size:2548
Last Modified:Jan 6 10:47:06 2006
MD5 Checksum:77f826297bb36e8891bdac9ce5515e63

 ///  File Name: phpinclusion.c
Description:
Proof of concept file inclusion exploit for PHP scripts that suffer from this sort of vulnerability.
Author:fabio, b0x
Homepage:http://www.pcbsd.ro
File Size:11112
Last Modified:Jan 15 03:07:03 2006
MD5 Checksum:81ac2c038d4cfd6996b4782e5d1cc1f0

 ///  File Name: PHPNukeEV77.txt
Description:
PHPNuke EV 7.7 is susceptible to SQL injection attacks via the query variable in the search module.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/
File Size:2100
Last Modified:Jan 9 19:29:07 2006
MD5 Checksum:7ca002b57ef50d700af013243ac2d80f

 ///  File Name: phpnukePoolXSS.txt
Description:
The PHP-Nuke Pool and News module is susceptible to cross site scripting via IMG tags.
Author:Night_Warrior
File Size:562
Last Modified:Jan 10 05:09:34 2006
MD5 Checksum:140e5ef3749273864f7f2e73dc641093

 ///  File Name: phpxplorer.txt
Description:
phpxplorer allows anyone to view any file on the system via a specially crafted URL.
Author:Liz0ziM&Cyberlord
Homepage:http://www.biyosecurity.be/bugs/phpxplorer.txt
File Size:827
Last Modified:Jan 25 08:19:45 2006
MD5 Checksum:fcfddf42633f287d3c84e671535f23ab

 ///  File Name: pixelpostXSS.txt
Description:
Pixelpost version 1.4.3 is susceptible to cross site scripting attacks.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1173
Last Modified:Jan 29 22:38:06 2006
MD5 Checksum:04ad864d958b3c22eb2c159e70813772

 ///  File Name: pwned-vpasp.txt
Description:
VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.
Author:tracewar
File Size:1214
Last Modified:Jan 29 23:25:08 2006
MD5 Checksum:f7775e5cbc389819c373c3ac3508f55f

 ///  File Name: rapidXSS.txt
Description:
The file hosting company rapidshare.de suffers from cross site scripting vulnerabilities.
Author:MoHaJaLi
File Size:555
Last Modified:Jan 30 02:11:33 2006
MD5 Checksum:92c1fdd496535dea73b1f57848c4bab3

 ///  File Name: RCBlog-1.0.3.txt
Description:
RCBlog v1.0.3 suffers from several vulnerabilities which can be used to open arbitrary files and compromise the admin's md5 password hash.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1337
Last Modified:Jan 26 08:49:06 2006
MD5 Checksum:62859679907231bd1f64813cbc0459b7

 ///  File Name: rt-sa-2005-15.txt
Description:
BSD Securelevels can be circumvented at runtime. By mounting another filesystem, immutable files can be masked. Masking means placing an arbitrary file at the location of an immutable file, without changing the immutable file itself. Details on how this can be exploited are included.
Homepage:http://www.redteam-pentesting.de/
File Size:7233
Related CVE(s):CVE-2005-4351
Last Modified:Jan 10 05:49:52 2006
MD5 Checksum:7b446b5372c0e46bf0489f75da101c51

 ///  File Name: sami_ftp_poc.pl
Description:
Sami FTP 2.0.1 Stack based buffer overflow exploit.
Author:Critical Security
Homepage:http://www.critical.lt/research/sami_ftp_poc.txt
File Size:3241
Last Modified:Jan 27 08:27:18 2006
MD5 Checksum:b8ed1cdae3ae234a78dee05ec76d2eb9

 ///  File Name: SaralBlog-sql.txt
Description:
SaralBlog 1.0 suffers from XSS and SQL injection due to lack of sanitized user input.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1301
Last Modified:Jan 25 08:52:39 2006
MD5 Checksum:556ea9849aac0689c41740364ae1f22d

 ///  File Name: secunia-ADOdb.txt
Description:
Secunia Research has discovered two security issues in ADOdb, which can be exploited by malicious people to disclose system information, execute arbitrary SQL code, and potentially compromise a vulnerable system. Details provided. ADOdb versions 4.66 and 4.68 for PHP are affected.
Author:Andreas Sandblad
Homepage:http://www.secunia.com
File Size:5227
Last Modified:Jan 10 06:05:56 2006
MD5 Checksum:f7443f571366df08d500f307702c21ee

 ///  File Name: simpleBlog21.txt
Description:
SimpleBlog version 2.1 is susceptible to SQL injection and cross site scripting attacks due to a lack of variable sanitization.
Author:Zinho
Homepage:http://www.hackerscenter.com/
File Size:1213
Last Modified:Jan 15 18:27:07 2006
MD5 Checksum:40c9f202077dfc69e005da9b100dd50e

 ///  File Name: simpleBlogXSS.txt
Description:
SimpleBlog version 2.1 suffers from SQL injection and cross site scripting flaws.
Author:Zinho
Homepage:http://www.hackerscenter.com/
File Size:943
Last Modified:Jan 21 20:00:16 2006
MD5 Checksum:d40972d7a6f05a6c0503f9a771e7f9b7

 ///  File Name: slsnif-ploit.pl.txt
Description:
slsnif aka Serial Line Sniffer version 0.4.4 local root exploit.
Author:Sintigan
Homepage:http://www.shellcoders.com/
File Size:1025
Last Modified:Jan 15 02:37:35 2006
MD5 Checksum:70982b19d549ce64b8429b76b7381f9a

 ///  File Name: sqmailchpasswd.c
Description:
Multiple buffer overflows are present in the handling of command line arguments in chpasswd leading to the execution of arbitrary code.
Author:rod hedor
Homepage:http://lezr.com
File Size:1524
Last Modified:Jan 25 09:20:16 2006
MD5 Checksum:185e1fca8a67c4be6a34dff677df1376

 ///  File Name: termsh.c
Description:
SCO Openserver 5.0.7 termsh local privilege escalation exploit.
Author:RoD hEDoR
File Size:1270
Related CVE(s):CAN-2005-0351
Last Modified:Jan 4 06:12:52 2006
MD5 Checksum:7eb534c3390752e4d676fd49101944ba

 ///  File Name: ua367XSS.txt
Description:
Ultimate Auction versions 3.67 and below suffer from cross site scripting flaws.
Author:Querkopf
File Size:613
Last Modified:Jan 21 21:37:52 2006
MD5 Checksum:c6ca4a78777cbf9d2ea5dfb5d43f4fd1

 ///  File Name: vbulletin352.txt
Description:
vBulletin version 3.5.2 is susceptible to cross site scripting attacks.
Author:Ejder, The_BeKiR, Liz0Zim, CyberLord
Homepage:http://Savsak.com/
File Size:944
Last Modified:Jan 10 05:18:23 2006
MD5 Checksum:a252ebafc6891c125991d75f192893f3

 ///  File Name: veritasOverflow.c
Description:
Veritas NetBackup v4/v5 "Volume Manager Daemon" remote stack overflow exploit.
Author:Patrick Thomassen
Related File:11.10.05-1.txt
File Size:7128
Related CVE(s):CAN-2005-3116
Last Modified:Jan 22 00:31:39 2006
MD5 Checksum:b11e3f4058ad407ccbf6866adcf1295d

 ///  File Name: vis.pl.txt
Description:
Vis.pl is a perl script which manages files as part of e-cms. It suffers from a directory transversal vulnerability.
Author:spher3
Homepage:http://www.hackerscenter.com/
File Size:1374
Last Modified:Jan 27 09:08:49 2006
MD5 Checksum:f835573c3d690ce10f395098c3e0078e

 ///  File Name: vsexploit.zip
Description:
Visual Studio 2005 and below code execution exploit.
Author:priestmaster
Homepage:http://www.priestmasters.org/
File Size:34277
Last Modified:Jan 21 08:15:37 2006
MD5 Checksum:8ba7e1406c8791a84942a6e0968d2a96

 ///  File Name: webftpInclude.txt
Description:
A file inclusion vulnerability exists in WebFTP version 1.2.6 in webftp.php.
Author:Thomas Henlich
File Size:1260
Last Modified:Jan 8 03:01:11 2006
MD5 Checksum:28b26f75d55cc9d465dd46388dec480d

 ///  File Name: WebspotBlogging.txt
Description:
WebspotBlogging v3.0 suffers from SQL injection due to improper input sanitization. POC included.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com
File Size:1200
Last Modified:Jan 25 09:13:29 2006
MD5 Checksum:ffbbb0a988c82b4301c83de6e0777cde