Section:  .. / 0601-exploits  /

Page 2 of 6
<< 1 2 3 4 5 6 >> Files 25 - 50 of 137
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: xmame-expl.c
Description:
Xmame 0.102 and below local root exploit for Linux.
Author:sj
File Size:3015
Last Modified:Jan 26 10:22:58 2006
MD5 Checksum:1003466f064d3d3e07be0fc3c01e5fdd

 ///  File Name: RCBlog-1.0.3.txt
Description:
RCBlog v1.0.3 suffers from several vulnerabilities which can be used to open arbitrary files and compromise the admin's md5 password hash.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1337
Last Modified:Jan 26 08:49:06 2006
MD5 Checksum:62859679907231bd1f64813cbc0459b7

 ///  File Name: msvc-featurebug-POC.zip
Description:
POC Exploit for the MSVC 6.0 run file bug.
Author:Morning Wood
Homepage:http://exploitlabs.com/
Related File:msvc-featurebug.txt
File Size:2666
Last Modified:Jan 26 07:05:55 2006
MD5 Checksum:b4e54a2fd586637af385f4b6701a97c9

 ///  File Name: geoBlog-MOD_1.0.txt
Description:
geoBlog MOD_1.0 suffers from an SQL injection vulnerability in the $tmpCategory variable.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/33/summary/bt/
File Size:1245
Last Modified:Jan 26 06:20:04 2006
MD5 Checksum:3747e3e14c10b3aeca505ddb2462b3c5

 ///  File Name: sqmailchpasswd.c
Description:
Multiple buffer overflows are present in the handling of command line arguments in chpasswd leading to the execution of arbitrary code.
Author:rod hedor
Homepage:http://lezr.com
File Size:1524
Last Modified:Jan 25 09:20:16 2006
MD5 Checksum:185e1fca8a67c4be6a34dff677df1376

 ///  File Name: Critical-006.txt
Description:
Critical Security - 22:03 2006.01.19 - Tftpd32 2.81 Format String + DoS PoC
Author:Critical Security
Homepage:http://www.critical.lt
File Size:1227
Last Modified:Jan 25 09:17:13 2006
MD5 Checksum:bf21480dd37e3cf8eacfc12738f2255a

 ///  File Name: WebspotBlogging.txt
Description:
WebspotBlogging v3.0 suffers from SQL injection due to improper input sanitization. POC included.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com
File Size:1200
Last Modified:Jan 25 09:13:29 2006
MD5 Checksum:ffbbb0a988c82b4301c83de6e0777cde

 ///  File Name: ldu-inject.txt
Description:
Land Down Under website engine is vulnerable to HTML injection via a stylesheet tag.
Author:Night_Warrior
File Size:337
Last Modified:Jan 25 09:07:15 2006
MD5 Checksum:7761067c75c3793a56993882a1a17ec7

 ///  File Name: MyBB-sig.txt
Description:
MyBB suffers from HTML code injection in the signature field via an image tag.
Author:Night_Warrior
File Size:328
Last Modified:Jan 25 09:05:15 2006
MD5 Checksum:5155da837b5d1533e1991ecd6aab9446

 ///  File Name: XMB-XSS.txt
Description:
XMB Forum suffers from HTML code injection in image tags.
Author:Night_Warrior
File Size:250
Last Modified:Jan 25 09:03:59 2006
MD5 Checksum:48c106fc3656baf52d860767b5202fe7

 ///  File Name: SaralBlog-sql.txt
Description:
SaralBlog 1.0 suffers from XSS and SQL injection due to lack of sanitized user input.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1301
Last Modified:Jan 25 08:52:39 2006
MD5 Checksum:556ea9849aac0689c41740364ae1f22d

 ///  File Name: eggblog-sql.txt
Description:
eggblog v2.0 is vulnerable to XSS and SQL injection.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1177
Last Modified:Jan 25 08:51:02 2006
MD5 Checksum:e06afd90aa34dde57e03d9993b8c3647

 ///  File Name: icq-xss.txt
Description:
An ICQ.com search script (search_result.php) is vulnerable to cross-site scripting attacks. An attacker can exploit the vulnerable script to have arbitrary script code executed in the browser of an authenticated ICQ user in the context of the ICQ webpage. resulting in the theft of cookie-based authentication giving the attacker temporary access to the victim's account, as well as other type of attacks.
Author:_6mO_HaCk
Homepage:http://www.morx.org/iseekyowned.html
File Size:2959
Last Modified:Jan 25 08:37:37 2006
MD5 Checksum:3b1bcaf74df52280df7119519cc15c27

 ///  File Name: ar-blogv5.2.txt
Description:
ar-blog v 5.2 suffers from several XSS vulnerabilities.
Author:SAUDI
Homepage:http://www.lezr.com
File Size:576
Last Modified:Jan 25 08:34:47 2006
MD5 Checksum:87c39c8b95c824b042532ce88fb64d1c

 ///  File Name: phpxplorer.txt
Description:
phpxplorer allows anyone to view any file on the system via a specially crafted URL.
Author:Liz0ziM&Cyberlord
Homepage:http://www.biyosecurity.be/bugs/phpxplorer.txt
File Size:827
Last Modified:Jan 25 08:19:45 2006
MD5 Checksum:fcfddf42633f287d3c84e671535f23ab

 ///  File Name: Phpclanwebsite.txt
Description:
Phpclanwebsite is vulnerable to XSS in the img tag.
Author:Night_Warrior
File Size:299
Last Modified:Jan 25 08:11:41 2006
MD5 Checksum:dfdd055019a7ca0d0e866cb1a0120cf6

 ///  File Name: cubecartXSS.txt
Description:
CubeCart version 3.0.7-p11 is susceptible to multiple cross site scripting flaws.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/
File Size:4230
Last Modified:Jan 22 01:05:49 2006
MD5 Checksum:2b95fbc1a0ca0c7303f48d0beaa41035

 ///  File Name: EV0024.txt
Description:
CaLogic Calendars version 1.2.2 is susceptible to cross site scripting attacks.
Author:Aliaksandr Hartsuyeu
File Size:1070
Last Modified:Jan 22 01:04:38 2006
MD5 Checksum:a34ce177aa9b5e8a5a00d098a66db7b2

 ///  File Name: adv20060116.txt
Description:
phpXplorer version 0.9.33 is susceptible to a classic directory traversal attack.
Author:Oriol Torrent Santiago
File Size:1100
Last Modified:Jan 22 00:52:49 2006
MD5 Checksum:9409f34c07ef0adb602d6742c40dbcc0

 ///  File Name: eyeBeam_dos.c
Description:
eyeBeam softphone remote denial of service SIP header mishandling exploit.
Author:ZwelL
File Size:3619
Last Modified:Jan 22 00:42:15 2006
MD5 Checksum:2d22cac710562f5f5ed1b16714e701f8

 ///  File Name: whitealbum.txt
Description:
WHITEAlbum is susceptible to SQL injection attacks via pictures.php.
Author:Liz0ziM
Homepage:http://www.biyosecurity.be
File Size:686
Last Modified:Jan 22 00:33:05 2006
MD5 Checksum:7ee03dcccbe3989e2d1d5395735f5daa

 ///  File Name: veritasOverflow.c
Description:
Veritas NetBackup v4/v5 "Volume Manager Daemon" remote stack overflow exploit.
Author:Patrick Thomassen
Related File:11.10.05-1.txt
File Size:7128
Related CVE(s):CAN-2005-3116
Last Modified:Jan 22 00:31:39 2006
MD5 Checksum:b11e3f4058ad407ccbf6866adcf1295d

 ///  File Name: EV0032.txt
Description:
Bit 5 Blog version 8.01 is susceptible to arbitrary javascript injection. Exploitation details provided.
Author:Aliaksandr Hartsuyeu
File Size:925
Last Modified:Jan 21 22:10:12 2006
MD5 Checksum:a664ffd29c32aaa80b641274f0f74ab8

 ///  File Name: EV0031.txt
Description:
Bit 5 Blog version 8.01 is susceptible to SQL injection attacks. Exploitation details provided.
Author:Aliaksandr Hartsuyeu
File Size:1057
Last Modified:Jan 21 22:07:49 2006
MD5 Checksum:66d8fcf4a63578928449c544f89f0c8e

 ///  File Name: EV0030.txt
Description:
Benders Calendar version 1.0 is susceptible to SQL injection attacks. Exploitation details provided.
Author:Aliaksandr Hartsuyeu
File Size:936
Last Modified:Jan 21 21:59:22 2006
MD5 Checksum:7ebb2ba13608faf7ca94d6dce5959253