Section:  .. / 0611-exploits  /

Page 3 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 50 - 75 of 258
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: blogtorrent092xss.txt
Description:
BlogTorrent-preview versions 0.92 and below suffer from a cross site scripting flaw.
Author:the_Edit0r
File Size:1109
Last Modified:Nov 18 01:40:59 2006
MD5 Checksum:15bc8394acbb73fcfa99f285c5beaf61

 ///  File Name: bloo100-rfi.txt
Description:
Bloo versions 1.00 and below suffer from a remote file inclusion vulnerability.
Author:the_Edit0r
File Size:1134
Last Modified:Nov 18 01:45:24 2006
MD5 Checksum:c3d21f2da432a1da7c98efb7ef9955f2

 ///  File Name: bloo100.txt
Description:
Bloo versions 1.00 and below suffer from a cross site scripting flaw.
Author:the_Edit0r
File Size:1120
Last Modified:Nov 18 01:43:00 2006
MD5 Checksum:15eb5f4985a2cef966e8388226b54ff2

 ///  File Name: bpg.txt
Description:
The BPG Content Management System suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:464
Last Modified:Nov 16 16:20:37 2006
MD5 Checksum:f1ea5ef9d217d4aa19c30dd0328e25d1

 ///  File Name: broadcom_wifi_ssid.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Broadcom Wireless driver that allows remote code execution in kernel mode by sending a 802.11 probe response that contains a long SSID. The target MAC address must be provided to use this exploit. The two cards tested fell into the 00:14:a5:06:XX:XX and 00:14:a4:2a:XX:XX ranges.
Author:Chris Eagle, Johnny Cache, skape, H D Moore
Homepage:http://projects.info-pull.com/mokb/
File Size:5063
Last Modified:Nov 14 08:59:18 2006
MD5 Checksum:8e29a33ce3fa0dea0811bce89496dec2

 ///  File Name: BTP00001P004AO.zip
Description:
Testing program that exploits Output Firewall PRO version 4.0 which fails to sufficiently protect the \Device\SandBox driver.
Author:Matousec - Transparent security Research
Homepage:http://www.matousec.com/
Related File:outpost40.txt
File Size:3642
Last Modified:Nov 3 02:54:45 2006
MD5 Checksum:66fe7c28ff74483aeadc66d19a8918dd

 ///  File Name: BytesFall-exp.txt
Description:
BytesFall Explorer suffers from an input sanitization vulnerability in login/doLogin.php which can lead to SQL injection. POC included that resets the admin password.
Author:RedTeam Pentesting
Homepage:http://www.redteam-pentesting.de
File Size:3438
Last Modified:Nov 1 23:45:19 2006
MD5 Checksum:3a4ad2fdc37704e9a590d3cdb1f816ed

 ///  File Name: CA-kmxfw-exploit.zip
Description:
Local privilege escalation exploit for the kmxfw.sys Computer Associates "Host Intrusion Prevention System" engine driver version 6.5.4.31.
Author:Rubén Santamarta
Homepage:http://www.reversemode.com/
Related File:CA-local.txt
File Size:1628
Last Modified:Nov 19 02:37:38 2006
MD5 Checksum:704e651a18de67b95d94a52912c1f5a6

 ///  File Name: CA-kmxstart-exploit.zip
Description:
Local privilege escalation exploit for the kmxstart.sys Computer Associates "Host Intrusion Prevention System" engine driver version 6.5.4.10.
Author:Rubén Santamarta
Homepage:http://www.reversemode.com/
Related File:CA-local.txt
File Size:1705
Last Modified:Nov 19 02:38:26 2006
MD5 Checksum:988852af8d371e26c8b03925074ad5ab

 ///  File Name: calsnails106.txt
Description:
mxBB calsnails module version 1.06 remote file inclusion exploit.
Author:the_Edit0r
File Size:3158
Last Modified:Nov 21 07:38:46 2006
MD5 Checksum:a90f6e486864a60f10b13055ee0b535c

 ///  File Name: candypress.txt
Description:
CandyPress Store suffers from SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:326
Last Modified:Nov 18 00:56:05 2006
MD5 Checksum:02f5b93dc7c12e8497ad063d4efa01c6

 ///  File Name: carsite.txt
Description:
Car Site Manager suffers from SQL injection and cross site scripting vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:555
Last Modified:Nov 16 16:45:20 2006
MD5 Checksum:12a4433760c57a35806538d5dc666656

 ///  File Name: cidstats.txt
Description:
@cid stats version 2.3 suffers from a remote file inclusion vulnerability.
Author:Mahmood_ali
File Size:1003
Last Modified:Nov 7 06:31:10 2006
MD5 Checksum:e634e8a4c567507e82b84620ae011a5c

 ///  File Name: classsys.txt
Description:
The Classified System suffers from cross site scripting and SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:789
Last Modified:Nov 21 10:52:02 2006
MD5 Checksum:581ec3bead4bcf37690b4f8420730a64

 ///  File Name: cmsmelborp.txt
Description:
CMSmelborp Beta remote file inclusion exploit that makes use of user_standard.php.
Author:DeltahackingSecurityTEAM
Homepage:http://www.deltahacking.ir
File Size:2821
Last Modified:Nov 14 08:05:52 2006
MD5 Checksum:7cd71b7c54f9bfb02a8ec2ca427d22e0

 ///  File Name: comdev41.txt
Description:
Comdev One Admin Pro version 4.1 is susceptible to a remote file inclusion vulnerability.
Author:AG-Spider
File Size:1336
Last Modified:Nov 18 01:06:28 2006
MD5 Checksum:ee11b7721121c94f7774e09003d084a8

 ///  File Name: contentnow-130-2.txt
Description:
ContentNow version 1.30 suffers from directory traversal and cross site scripting vulnerabilities.
Author:Timq
Homepage:http://securitydb.org/
File Size:910
Last Modified:Nov 14 07:59:02 2006
MD5 Checksum:bfd4b266567da6fe861d2b11f9dbc6c7

 ///  File Name: contentnow-130.txt
Description:
ContentNow version 1.30 suffers from local file inclusion, file upload and command execution vulnerabilities.
Author:r0ut3r
File Size:3711
Last Modified:Nov 14 07:57:36 2006
MD5 Checksum:794cdef9f3f1d363b50f92e9eb4517da

 ///  File Name: contentnow_139_sqlinj.pl.txt
Description:
ContentNow CMS version 1.39 'pageid' SQL injection exploit that discloses administrative credentials. Works regardless of magic quotes.
Author:revenge
Homepage:http://www.0xcafebabe.it/
Related File:contentnow_139_sqlinjection.txt
File Size:3302
Last Modified:Nov 22 03:58:19 2006
MD5 Checksum:6ba3307da59901cb75fc5c7ce34506b5

 ///  File Name: cpanel10-xss.txt
Description:
CPanel version 10 is susceptible to cross site scripting attacks via the file manager.
Homepage:http://aria-security.net/
File Size:756
Last Modified:Nov 14 07:26:41 2006
MD5 Checksum:feeb6ec6b27206ac9a279075e921fa0d

 ///  File Name: cpanel10-xss2.txt
Description:
CPanel version 10 is susceptible to cross site scripting attacks via the network tools.
Homepage:http://aria-security.net/
File Size:450
Last Modified:Nov 19 02:42:36 2006
MD5 Checksum:5848cd1ff3a63917cefc418b82e9355a

 ///  File Name: cra.pl.txt
Description:
PHP-Nuke Mermaid module version 1.2 remote file inclusion exploit that makes use of formdisp.php.
Author:Crackers_Child
File Size:3094
Last Modified:Nov 29 16:23:56 2006
MD5 Checksum:7bcc1b4093a59a3640bb2084e33eb419

 ///  File Name: creadirector.txt
Description:
creadirectory suffers from SQL injection and cross site scripting flaws.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:310
Last Modified:Nov 27 02:32:33 2006
MD5 Checksum:5a28c046dc1050d5674ee4fd250a8e65

 ///  File Name: daringphucball.rb
Description:
The Apple Airport driver provided with Orinoco-based Airport cards (1999-2003 PowerBooks, iMacs) is vulnerable to a remote memory corruption flaw. When the driver is placed into active scanning mode, a malformed probe response frame can be used to corrupt internal kernel structures, leading to arbitrary code execution. This vulnerability is triggered when a probe response frame is received that does not contain valid information element (IE) fields after the fixed-length header. The data following the fixed-length header is copied over internal kernel structures, resulting in memory operations being performed on attacker-controlled pointer values. This is the Metasploit module for this vulnerability.
Author:H D Moore
Homepage:http://metasploit.com/
File Size:6172
Last Modified:Nov 3 03:08:16 2006
MD5 Checksum:b3bece5770fb6b8baf288b1f5e1f6148

 ///  File Name: datingbypass.txt
Description:
Dating Site suffers from a login bypass vulnerability via SQL injection and also suffers from a cross site scripting flaw.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:282
Last Modified:Nov 18 01:02:25 2006
MD5 Checksum:2877189d8b1fa443a5c94394ef9f5054