Section:  .. / 0704-exploits  /

Page 9 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 200 - 225 of 225
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: monkeycms-rfi.txt
Description:
Monkey CMS version 0.0.3 is susceptible to a remote file inclusion vulnerability.
Author:the_Edit0r
Homepage:http://www.xmors-security.com/
File Size:1338
Last Modified:Apr 5 04:24:08 2007
MD5 Checksum:9c397c68426202236dc1c9ad0233f231

 ///  File Name: kcms-rfi.txt
Description:
K-CMS version 1.0 is susceptible to a remote file inclusion vulnerability.
Author:the_Edit0r
Homepage:http://www.xmors-security.com/
File Size:1339
Last Modified:Apr 5 04:23:32 2007
MD5 Checksum:42b8eeb9c33f8476caf5a67a32d2b437

 ///  File Name: iXon-rfi.txt
Description:
iXon_CMS version 0.30 is susceptible to a remote file inclusion vulnerability.
Author:the_Edit0r
Homepage:http://www.xmors-security.com/
File Size:1618
Last Modified:Apr 5 04:22:50 2007
MD5 Checksum:21e457c20ee39a7211980d8ba74d8ebf

 ///  File Name: litecms-rfi.txt
Description:
lite-cms-0.2.1 is susceptible to a remote file inclusion vulnerability.
Author:the_Edit0r
Homepage:http://www.xmors-security.com/
File Size:1316
Last Modified:Apr 5 04:19:45 2007
MD5 Checksum:2f941c7bb717c774700e153bf3dc9858

 ///  File Name: stat12-rfi.txt
Description:
The stat12 script from samphp.com suffers from a remote file inclusion vulnerability.
Author:Hasadya Raed
File Size:336
Last Modified:Apr 5 00:49:37 2007
MD5 Checksum:15a12b92b7cff2c52dc478d8bd0f9aac

 ///  File Name: mybb-exec.txt
Description:
MyBulletinBoard aka MyBB versions 1.2.3 and below remote code execution exploit.
Author:DarkFig
Homepage:http://www.acid-root.new.fr/
File Size:10892
Last Modified:Apr 5 00:48:41 2007
MD5 Checksum:9f62415a2c97c74174c70e1aeba91341

 ///  File Name: HP_MQC_Run_Any_Query.txt
Description:
HP Mercury Quality Center runQuery exploit that performs a blind SQL attack.
Author:Isma Khan
File Size:5201
Last Modified:Apr 5 00:45:01 2007
MD5 Checksum:0a73a78ef56bc9c95eea50157b9e0672

 ///  File Name: ani_loadimage_chunksize-email.rb.tx..>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
Author:skape, H D Moore
File Size:9237
Related CVE(s):CVE-2007-1765, CVE-2007-0038
Last Modified:Apr 3 02:46:58 2007
MD5 Checksum:07a517f1fb87b03537a4fddfc3b6be68

 ///  File Name: ani_loadimage_chunksize-browser.rb...>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Internet Explorer (6 and 7) by using the CURSOR style sheet directive to load a malicious .ANI file. Internet Explorer will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen.
Author:skape, H D Moore
File Size:9252
Related CVE(s):CVE-2007-1765, CVE-2007-0038
Last Modified:Apr 3 02:45:49 2007
MD5 Checksum:19caa5e95a067243786ca88f30fd6667

 ///  File Name: rspa-rfi.txt
Description:
Really Simple PHP and Ajax, or RSPA, is susceptible to a remote file inclusion vulnerability. Version RSPA-2007-03-23 is susceptible.
Author:Hamid Ebadi
Homepage:http://www.bugtraq.ir/
File Size:2072
Last Modified:Apr 3 02:40:26 2007
MD5 Checksum:581bf6080fd3144d9b4bca2462dedb00

 ///  File Name: directadmin1293-xss.txt
Description:
DirectAdmin versions below 1.29.3 are susceptible to a persistent cross site scripting attack.
Author:Kanedaaa Bohater
Homepage:http://kaneda.bohater.net/
File Size:5296
Last Modified:Apr 3 02:38:27 2007
MD5 Checksum:f8984bf347d4ae6cc799babd9ed49593

 ///  File Name: 2bgal-rfi.txt
Description:
2BGal version 3.1.1 suffers from a remote file inclusion vulnerability.
Author:BorN To K!LL
File Size:1004
Last Modified:Apr 3 02:12:01 2007
MD5 Checksum:539b4668e6150a43db758bca3a868f1f

 ///  File Name: xoopszmag-sql.txt
Description:
Xoops module Zmagazine version 1.0 remote SQL injection exploit that makes use of print.php.
Author:ajann
File Size:2653
Last Modified:Apr 3 02:07:04 2007
MD5 Checksum:7ef70ea218c2d1d04467b05712c18483

 ///  File Name: xoopsxfsec-sql.txt
Description:
Xoops module XFsection versions 1.07 and below blind SQL injection exploit.
Author:ajann
File Size:10249
Last Modified:Apr 3 02:05:43 2007
MD5 Checksum:99d6ef1ce0d3848efc3234fe6a0ebc59

 ///  File Name: xoopswfsec-sql.txt
Description:
Xoops module WF-Section versions 1.01 and below remote blind SQL injection exploit.
Author:ajann
File Size:2679
Last Modified:Apr 3 02:04:32 2007
MD5 Checksum:18ecb71834428390a71b2626bdb1f85e

 ///  File Name: xoopsvirii-rfi.txt
Description:
Xoops module Virii Info versions 1.10 and below remote file inclusion exploit that makes use of index.php.
Author:ajann
File Size:2547
Last Modified:Apr 3 02:03:19 2007
MD5 Checksum:558ef94f655c805d65ffcbdbdbe7deb0

 ///  File Name: frontbase427v2-remote.txt
Description:
Frontbase for Windows versions 4.2.7 and below remote buffer overflow exploit. Version 2.2 of this exploit.
Author:Heretic2
File Size:22219
Last Modified:Apr 3 01:59:43 2007
MD5 Checksum:1e98242efbaf54407af7e325df96da85

 ///  File Name: dbms_aq-enqueue.txt
Description:
Oracle 10g DBMS_AQ.ENQUEUE remote SQL injection exploit that allows you to grant or revoke dba permission to an unpriviileged user.
Author:bunker
Homepage:http://rawlab.mindcreations.com/
File Size:3653
Related CVE(s):CVE-2007-0268
Last Modified:Apr 3 01:58:01 2007
MD5 Checksum:9f23af7318c2c6ebd3b09e68dd6638d6

 ///  File Name: ipswitch505-overflow.txt
Description:
Local buffer overflow exploit for Ipswitch WS_FTP version 5.05 server manager that launches calc.exe.
Author:Marsu
File Size:3176
Last Modified:Apr 3 01:55:25 2007
MD5 Checksum:96368be76a319d7da33b8093901f63f2

 ///  File Name: irfanview-ani.txt
Description:
IrfanView version 3.99 .ANI file local buffer overflow exploit. Tested against Windows XP SP2 FR. This is not related to the LoadAniIcon stack overflow.
Author:Marsu
File Size:3240
Last Modified:Apr 3 01:54:11 2007
MD5 Checksum:5563946777fa2ffd19cd8213024e4364

 ///  File Name: BTP00000P002NF.zip
Description:
Symantec Norton Personal Firewall hooks many functions in SSDT and in at least two cases it fails to validate arguments that come from the user mode. This exploit demonstrates this vulnerability.
Homepage:http://www.matousec.com/
Related File:BTP00000P002NF.txt
File Size:3384
Last Modified:Apr 3 01:13:05 2007
MD5 Checksum:fdc7023165c36f1ace4158846a58485e

 ///  File Name: msani.c
Description:
Microsoft Windows Animated Cursor (.ANI) local buffer overflow exploit.
Author:Marsu
File Size:3166
Related CVE(s):CVE-2007-1765
Last Modified:Apr 3 00:44:01 2007
MD5 Checksum:8784081f135750715341646279e27e68

 ///  File Name: phpfusion-sql.txt
Description:
PHP-Fusion module Arcade version 1.0 suffers from a remote SQL injection vulnerability.
Author:xoron
File Size:569
Last Modified:Apr 3 00:40:45 2007
MD5 Checksum:c50e98690c778b4d77712a036f5c14f5

 ///  File Name: wls-xss.txt
Description:
Windows Live Spaces suffers from a cross site scripting vulnerability in NetworkSetup.aspx.
Author:Paolo Di Febbo
File Size:489
Last Modified:Apr 2 23:06:04 2007
MD5 Checksum:3d2606b7735818570272e6d534aba011

 ///  File Name: advanced-rfi.txt
Description:
Advanced Login versions 0.7 and below suffer from a remote file inclusion vulnerability.
Author:Zeni Susanto
File Size:2671
Last Modified:Apr 2 23:05:10 2007
MD5 Checksum:3c444eff4749aac5aac05651d3620fd3