Section:  .. / 0506-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 88
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: NsT-phpBBDoS.c
Description:
phpBB versions 2.0.15 and below denial of service exploit that makes use of a flaw that relates to registering multiple users. C version of the exploit.
Author:HaCkZaTaN
File Size:7726
Last Modified:Jun 23 09:48:01 2005
MD5 Checksum:7f83013c968358ef1bcad6e2a9bb7c86

 ///  File Name: whoiscartInsert.txt
Description:
Saeven.net's WhoisCart is susceptible to an arbitrary javascript injection flaw and also suffers from a directory traversal vulnerability.
Author:Elzar Stuffenbach
File Size:6190
Last Modified:Jun 23 09:44:22 2005
MD5 Checksum:dd25be9f27aad102003c487aada7f0db

 ///  File Name: cacti.pl.txt
Description:
Cacti versions 0.8.6d and below remote command execution exploit.
Author:Alberto Trivero
File Size:1364
Last Modified:Jun 23 09:37:23 2005
MD5 Checksum:129bbc13dc26c639b3050ca8f8b72254

 ///  File Name: adv19-theday-2005.txt
Description:
A huge slew of SQL injection flaws exist in the DUWARE product inline, including but not limited to DUportal Pro, DUamazon Pro, and more.
Author:the_day
Homepage:http://theday.echo.or.id/
File Size:3653
Last Modified:Jun 23 09:23:53 2005
MD5 Checksum:c5fe79c7777b3ae8f5b10525761c8ff8

 ///  File Name: igallery33.txt
Description:
i-Gallery versions 3.3 and below suffer from a directory traversal vulnerability and cross site scripting flaws.
Author:Seyed Hamid Kashfi
Homepage:http://www.hat-squad.com/
File Size:2351
Last Modified:Jun 23 09:20:50 2005
MD5 Checksum:3f1cc193ca9ed14b18f053dc22bc804c

 ///  File Name: r57mercury.pl
Description:
MercuryBoard versions 1.1.4 and below remote SQL injection exploit.
Author:RST/GHC
Homepage:http://rst.void.ru/
File Size:3839
Last Modified:Jun 23 09:15:12 2005
MD5 Checksum:8c4f150082c0f6eff5d752ddc287a647

 ///  File Name: r57wp.pl
Description:
WordPress versions 1.5.1.1 and below SQL injection exploit that makes use of a bug in users.php to add a new admin user.
Author:RST/GHC
Homepage:http://rst.void.ru/
File Size:3582
Last Modified:Jun 23 09:13:29 2005
MD5 Checksum:ca93b5c505d9448b6472a9fb2bd3a80b

 ///  File Name: r57frb.pl
Description:
Forum Russian Board 4.2 Full remote command execution exploit which takes advantage of a bug in style_edit.php. Tested against Unix and Windows.
Author:RST/GHC
Homepage:http://rst.void.ru
File Size:4434
Last Modified:Jun 23 01:01:10 2005
MD5 Checksum:2032590c942efe08588f72b5e356ad76

 ///  File Name: r57mambo.pl
Description:
Mambo <= 4.5.2.1, MySQL => 4.1 exploit which injects SQL into the rating_count variable.
Author:RST/GHC
Homepage:http://rst.void.ru
File Size:7366
Last Modified:Jun 23 00:51:52 2005
MD5 Checksum:94824de4346157e8d1560f85e15c8b55

 ///  File Name: p33r-b33r.c
Description:
PeerCast versions 0.1211 and below HTTP Requests remote format string exploit.
Author:Darkeagle
Homepage:http://unl0ck.org
File Size:3942
Last Modified:Jun 21 07:56:17 2005
MD5 Checksum:00f67cfea4ab785ecf052066a2de5a86

 ///  File Name: enterasys.txt
Description:
Enterasys Vertical Horizon switches have a default account embedded in them. Additionally, a denial of service vulnerability exists.
Author:Jacek Lipkowski
File Size:2216
Last Modified:Jun 21 07:28:28 2005
MD5 Checksum:3c55a0c2a378a2559de3b5e1742f103a

 ///  File Name: pafaq.pl.txt
Description:
paFaq version 1.0 Beta 4 add administrator proof of concept exploit.
Author:James Bercegay
Homepage:http://www.gulftech.org/
Related Exploit:paFaq10beta4.txt"
File Size:1697
Last Modified:Jun 21 07:24:50 2005
MD5 Checksum:e4b23110de0d22452069c17a74f0f323

 ///  File Name: paFaq10beta4.txt
Description:
paFaq version 1.0 Beta 4 suffers from SQL injection and remote command execution vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
Related Exploit:pafaq.pl.txt"
File Size:4727
Last Modified:Jun 21 07:24:00 2005
MD5 Checksum:c5a17775ac9f8c3830caec2f48aa4d7b

 ///  File Name: adv18-theday-2005.txt
Description:
Multiple SQL injection vulnerabilities exist in Ublog Reload version 1.0.5.
Author:Dedi Dwianto
Homepage:http://echo.or.id/adv/adv18-theday-2005.txt
File Size:3196
Last Modified:Jun 21 07:17:38 2005
MD5 Checksum:2653ef9ff31d1fb8373b63f08748f37d

 ///  File Name: KCcol-xpl.pl
Description:
Perl version of the Claroline e-Learning version 1.6 and below remote password hash extraction SQL injection exploit.
Author:K-C0d3r
File Size:1457
Last Modified:Jun 21 07:09:54 2005
MD5 Checksum:0ac46af2ede123a753211fce255eebfe

 ///  File Name: claroline16.txt
Description:
Claroline e-Learning versions 1.6 and below remote password hash extraction SQL injection exploit.
Author:Sieg Fried, MH_p0rtal
File Size:2089
Last Modified:Jun 21 07:07:50 2005
MD5 Checksum:4a6202bc89d4af70e45042da387bf656

 ///  File Name: EXPL-A-2005-009.txt
Description:
Cool Cafe Chat 1.2.1 suffers from a SQL injection vulnerability via an unsanitized password variable.
Author:Donnie Werner
Homepage:http://exploitlabs.com
File Size:1790
Last Modified:Jun 21 07:01:29 2005
MD5 Checksum:e392b48b21b9e092a495d83dbad304b0

 ///  File Name: phpforum11.txt
Description:
Phpforum McGallery version 1.1 suffers from a directory traversal vulnerability.
Author:d_bug
File Size:657
Last Modified:Jun 21 06:57:05 2005
MD5 Checksum:c2aeb62cbb91fe79e5d6ca5260055752

 ///  File Name: bitrix40xInclusion.txt
Description:
Bitrix Site Manager 4.0.x suffers from a remote file inclusion and execution vulnerability.
Author:d_bug
File Size:1005
Last Modified:Jun 21 06:56:05 2005
MD5 Checksum:36b1b7457acd7c67150480cd54c8d2f1

 ///  File Name: virobot_ex.pl
Description:
ViRobot UNIX/Linux Server web user interface remote root exploit which takes advantage of the setuid addschup cgi. Adds a root user to the system.
Author:Kevin Finisterre
Related File:DMA-2005-0614a.txt
File Size:1654
Last Modified:Jun 21 06:52:21 2005
MD5 Checksum:4798c8571a63dd8076df666acd7ea84a

 ///  File Name: paFiledb31vuln.txt
Description:
paFileDB versions 3.1 and below suffer from multiple cross site scripting, SQL injection, and local file inclusion vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:5745
Last Modified:Jun 21 06:48:48 2005
MD5 Checksum:65b8166812623165efdbd97fd9d7fccc

 ///  File Name: mast.txt
Description:
MAST RunAsP.exe version 3.5.1 suffers from a local privilege escalation vulnerability.
Author:traxx
File Size:1344
Last Modified:Jun 21 06:39:57 2005
MD5 Checksum:a82c309e523a3fc714770b3a124244c2

 ///  File Name: fusionBB.txt
Description:
FusionBB versions .11 Beta and earlier suffer from local file inclusion and SQL injection flaws.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2845
Last Modified:Jun 21 06:38:07 2005
MD5 Checksum:26d84d86e210a2af225ece325d416cc8

 ///  File Name: pico33.txt
Description:
Pico Server (pServ) versions 3.3 and below suffer from directory traversal, remote command execution, and heap overflow vulnerabilities.
Author:Raphael Rigo
File Size:3680
Last Modified:Jun 21 06:25:08 2005
MD5 Checksum:6dfe54e5edc36347d81bed1e11f3ec80

 ///  File Name: eping.txt
Description:
eping, the ping plugin for the e107 portal system, has an arbitrary command execution flaw.
Homepage:http://www.RedC0de.org
File Size:1156
Last Modified:Jun 21 06:19:39 2005
MD5 Checksum:530e9ab0c93aca92d494ba14a45ab9da