Section:  .. / 0905-exploits  /

Page 7 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 150 - 175 of 276
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: harland-exec.txt
Description:
Remote command execution exploit for eleven products from Harland Scripts.It performs authentication bypass and php code injection.
Author:G4N0K
File Size:6535
Last Modified:May 15 14:24:38 2009
MD5 Checksum:d80babba6ab69693162c58a71b58f86f

 ///  File Name: eggwindrop-dos.txt
Description:
Remote denial of service exploit for Eggdrop and Windrop version 1.6.19.
Author:Thomas Sader
File Size:1900
Last Modified:May 15 14:21:20 2009
MD5 Checksum:4e034932b09089d4d087358edf97005a

 ///  File Name: shoryuken.c
Description:
This is a local root exploit for the Linux 2.6.29 ptrace_attach() race condition that allows a process to gain elevated privileges under certain conditions.
Author:prdelka
Homepage:https://prdelka.blackart.org.uk/
File Size:4385
Last Modified:May 15 14:18:23 2009
MD5 Checksum:2406d30eaa6ecc2fd2340203ddef7c7a

 ///  File Name: audioactiveplayer-overflow.txt
Description:
Audioactive Player version 1.93b local buffer overflow exploit that creates a malicious .m3u file.
Author:hack4love
File Size:1416
Last Modified:May 15 14:17:01 2009
MD5 Checksum:6b74b0df6be83a0e8cef3afb749e3255

 ///  File Name: ramacms-disclose.txt
Description:
Rama CMS versions 0.9.8 and below suffer from a file disclosure vulnerability in download.php.
Author:Br0ly
File Size:1440
Last Modified:May 15 14:15:45 2009
MD5 Checksum:360007268d1543a72c6984be23e5f480

 ///  File Name: strawberry-lfiexec.txt
Description:
StrawBerry version 1.1.1 local file inclusion and remote command execution exploit.
Author:[AVT]
Homepage:http://antichat.ru/
File Size:3894
Last Modified:May 15 14:14:12 2009
MD5 Checksum:676d137e46a41ca53d3f6f328312ff3d

 ///  File Name: belive-lfi.txt
Description:
beLive version 0.2.3 suffers from a local file inclusion vulnerability in arch.php.
Author:Kacper
Homepage:http://devilteam.pl/
File Size:340
Last Modified:May 15 14:13:21 2009
MD5 Checksum:b52f98fc6ff2dcfb84e6f3470fca8403

 ///  File Name: digimodemaya-overflow.txt
Description:
DigiMode Maya version 1.0.2 buffer overflow proof of concept exploits that create malicious .m3u and .m3l files.
Author:SirGod
Homepage:http://www.insecurity.ro/
File Size:1175
Last Modified:May 14 11:58:49 2009
MD5 Checksum:00c696a39381d569a261e2390efe2b3f

 ///  File Name: jieqicms15-exec.txt
Description:
Jieqi CMS versions 1.5 and below remote code execution exploit.
Author:Securitylab Security Research
Homepage:http://securitylab.ir/
File Size:1134
Last Modified:May 14 11:47:01 2009
MD5 Checksum:39fcc2862a2a43548cba95aceae08df3

 ///  File Name: maxcms-sql.txt
Description:
Max CMS version 2.0 suffers from a remote SQL injection vulnerability.
Author:Securitylab Security Research
Homepage:http://securitylab.ir/
File Size:1263
Last Modified:May 14 11:46:03 2009
MD5 Checksum:42bf338da3cf634a2d64524c41ea2764

 ///  File Name: mygamescript-sql.txt
Description:
My Game Script version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:ThE g0bL!N
Homepage:http://h4ckf0ru.com/
File Size:875
Last Modified:May 14 11:37:46 2009
MD5 Checksum:0f02ecac59b439f691a7fe4f020d04d2

 ///  File Name: ascad-insecure.txt
Description:
Ascad Networks 5 products suffer from an insecure cookie handling vulnerability.
Author:G4N0K
File Size:2617
Last Modified:May 14 11:36:49 2009
MD5 Checksum:0d10095589f80de85d5abeffb2c47656

 ///  File Name: miffat-insecure.txt
Description:
Miffat version 2.1 suffers from an insecure cookie handling vulnerability.
Author:Qabandi
File Size:856
Last Modified:May 14 01:08:02 2009
MD5 Checksum:77741e12ad5e3271664fa10934d92d95

 ///  File Name: ptrace-privescalation.txt
Description:
Linux 2.6 kernel ptrace_attach local privilege escalation exploit.
Author:s0m3b0dy
File Size:2258
Last Modified:May 14 01:03:13 2009
MD5 Checksum:000a69c57a289aa97e6a372c281c2eba

 ///  File Name: dlink-bypass.txt
Description:
A flaw in the D-Link CAPTCHA authentication system allows an attacker to glean your WiFi WPA pass phrase from the router with only user-level access, and without properly solving the CAPTCHA.
Homepage:http://www.sourcesec.com/
File Size:2862
Last Modified:May 14 00:59:38 2009
MD5 Checksum:debaf87c3001b7c58d2febc44a0aec7e

 ///  File Name: maxcms-admin.txt
Description:
MaxCMS version 2.0 create new administrative account exploit that uses a SQL injection vulnerability in the cookie passed.
Author:Securitylab Security Research
Homepage:http://securitylab.ir/
File Size:2190
Last Modified:May 13 13:39:43 2009
MD5 Checksum:a8058ea534edcae098d6e97ec7c16cbe

 ///  File Name: racoon-isakmp-dos.c
Description:
ipsec-tools racoon frag-isakmp denial of service proof of concept exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:3375
Last Modified:May 13 13:29:16 2009
MD5 Checksum:f2c0039b2353671a4cbc676f11726e6c

 ///  File Name: familyconn-sql.txt
Description:
Family Connections CMS versions 1.9 and below remote SQL injection exploit.
Author:YEnH4ckEr
File Size:12009
Last Modified:May 13 13:28:00 2009
MD5 Checksum:abb3577aa27498e67e7ecdb11166b952

 ///  File Name: pinnaclestudio-traversal.txt
Description:
Pinnacle Studio 12 "Hollywood FX Compressed Archive" (.hfz) directory traversal proof of concept exploit.
Author:Nine:Situations:Group
Homepage:http://retrogod.altervista.org/
File Size:6039
Last Modified:May 13 13:26:33 2009
MD5 Checksum:fe336948e9b83ceaaca47b005fd301bc

 ///  File Name: ppsd-insecure.txt
Description:
Password Protector SD version 1.3.1 suffers from an insecure cookie handling vulnerability.
Author:Mr.tro0oqy
File Size:1133
Last Modified:May 13 13:18:08 2009
MD5 Checksum:f1598a84ef72118166c54815209d2cd8

 ///  File Name: tinybutstrong-disclose.txt
Description:
TinyButStrong version 3.4.0 suffers from a local file disclosure vulnerability.
Author:ahmadbady
File Size:2144
Last Modified:May 13 13:16:49 2009
MD5 Checksum:0e5c0574c274a597dce7d78554fa2300

 ///  File Name: castripperpls-overflow.txt
Description:
CastRipper version 2.50.70 universal stack overflow that creates a malicious .pls file.
Author:zAx
File Size:1303
Last Modified:May 13 12:50:19 2009
MD5 Checksum:049bfcc992eb1e38e9f0d19f5903d576

 ///  File Name: castripperpy-overflow.txt
Description:
CastRipper version 2.50.70 universal stack overflow that creates a malicious .m3u file. Written in Python.
Author:Super Cristal
Homepage:http://www.snakespc.com/sc
File Size:2295
Last Modified:May 13 12:47:06 2009
MD5 Checksum:ebabd62cc7d028cc56176e339220cf2f

 ///  File Name: castripperuniv-overflow.txt
Description:
CastRipper version 2.50.70 universal stack overflow that creates a malicious .m3u file.
Author:Stack
Homepage:http://v4-team.com/
File Size:2041
Last Modified:May 13 12:45:08 2009
MD5 Checksum:cbad231afa5a1a04c49f331afad07532

 ///  File Name: castripperm3u-overflow.txt
Description:
CastRipper version 2.50.70 local buffer overflow exploit that creates a malicious .m3u file.
Author:hashteck
File Size:2071
Last Modified:May 13 12:42:12 2009
MD5 Checksum:e386dbdf8e3760898e7ecc7ad1ab4187