Section:  .. / 0509-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 78
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: cjXSS.txt
Description:
CjTagBoard 3.0, CjLinkOut 1.0, and CjWeb2Mail 3.0 all suffer from an excessive amount of cross site scripting flaws. Example exploitation provided.
Author:Psymera
File Size:5357
Last Modified:Sep 13 09:40:16 2005
MD5 Checksum:7d1b9d785f7d758fb684fbace584702b

 ///  File Name: snortrigger.c
Description:
Snort versions 2.4.0 and below remote proof of concept exploit that creates a malformed TCP/IP packet that will trigger a vulnerability in the PrintTcpOptions() function from log.c.
Author:nitrous
File Size:5119
Last Modified:Sep 13 08:54:52 2005
MD5 Checksum:993ecdbce275e7849475e0e39000105e

 ///  File Name: dl-mancgi.c
Description:
Man-cgi/Man2web/ManView remote command execution exploit. Tested against Man-cgi 1.11. All versions are affected.
Author:tracewar
File Size:4900
Last Modified:Sep 7 09:07:32 2005
MD5 Checksum:85812cee9ec0565cb9e394e09991259d

 ///  File Name: atutor-151.txt
Description:
ATutor 1.5.1 is susceptible to SQL injection, credential disclosure, user impersonation, and remote code execution attacks.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:4705
Last Modified:Sep 15 05:30:49 2005
MD5 Checksum:3fb019435285fba2fabf0dcd960c1594

 ///  File Name: 2005.1.txt
Description:
The Barracuda Spam Firewall Appliance firmware versions 3.1.17 and below suffer from directory traversal, remote command execution, and password retrieval vulnerabilities.
Author:Francois Harvey
Homepage:http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1
File Size:4453
Last Modified:Sep 5 08:46:34 2005
MD5 Checksum:b0000488614fe541cc3161be683560c0

 ///  File Name: pblang465.php.txt
Description:
PBLang 4.65 and below remote command execution exploit. Written in PHP.
Author:Pengo
Homepage:http://rst.void.ru
File Size:4237
Last Modified:Sep 8 09:43:13 2005
MD5 Checksum:71ccc7f98383698fd3bb92a718f29fce

 ///  File Name: commbankXSS.txt
Description:
A cross site scripting flaw exists in the Commonwealth Bank of Australia's web site.
Author:Calum Power
File Size:3995
Last Modified:Sep 14 09:01:49 2005
MD5 Checksum:2896835c00a1efef82aba36e33f51662

 ///  File Name: GeSHi.txt
Description:
GeSHi version 1.0.72 is susceptible to a local file inclusion vulnerability.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:3120
Last Modified:Sep 26 07:17:14 2005
MD5 Checksum:f1aa4004e9b285d93d41b03809a4bab1

 ///  File Name: OS2A_1003.txt
Description:
Hesk versions 0.93 and prior are vulnerable to authentication bypass and path disclosure vulnerabilities caused due to improper validation of the HTTP header. This vulnerability can be exploited to bypass authentication mechanism, and also made to reveal system specific information.
Author:Rajesh Sethumadhavan, Rahul Mohandas, Jayesh K.S
File Size:3080
Last Modified:Sep 23 07:20:11 2005
MD5 Checksum:54b5909937e6613e9be199a944bd444c

 ///  File Name: cybsecApps.txt
Description:
Multiple vendor web scanning utilities suffer from script injection vulnerabilities. These include N-Stealth Commercial Edition versions below 5.8.0.38, N-Stealth Free Edition versions below 5.8.1.03, and Nikto versions 1.35 and below.
Author:mnunez
Homepage:http://www.cybsec.com
File Size:3079
Last Modified:Sep 5 08:48:37 2005
MD5 Checksum:7d45be9fc959f3bd67d24fc2fd803a96

 ///  File Name: phpSession.txt
Description:
PHP Session versions 3.x and 4.x are susceptible to a user login bypass vulnerability due to sharing session id information in the same location for multiple instances.
Author:unknow, adam_i
Homepage:http://www.uw-team.org
File Size:3011
Last Modified:Sep 22 08:40:43 2005
MD5 Checksum:5a147f9756ac66bbbec602abe3266a52

 ///  File Name: chitchat.html
Description:
Cyber-Cats ChitChat 2.0 permits cross site scripting attacks, allows for user launched attacks, permits insecure file deletion, and suffers from other vulnerabilities.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:2953
Last Modified:Sep 5 09:17:13 2005
MD5 Checksum:f266a7158672df8a2cac3d031bd26c58

 ///  File Name: realchat_PoC.tgz
Description:
Proof of concept exploit for Realchat version 3.5.1b that allows for user impersonation.
Author:Andreas
Homepage:http://www.bedatec.de/
Related File:bedatecRealchat.txt
File Size:2931
Last Modified:Sep 7 08:21:13 2005
MD5 Checksum:3b28ecb9b72cbfacc956ea5a2c740977

 ///  File Name: cpanel-9x_RCE.c
Description:
Exploit for cPanel versions below and equal to 9x that takes advantage of a remote command execution vulnerability.
Author:lympex
Homepage:http://l-bytes.ne
File Size:2660
Last Modified:Sep 1 08:14:21 2005
MD5 Checksum:b3cb28851cd689683bd079e8f6b054e4

 ///  File Name: PHPNuke78.txt
Description:
PHPNuke 7.8 is susceptible to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.
Author:onkel_fisch
File Size:2515
Last Modified:Sep 13 09:06:22 2005
MD5 Checksum:47bf31b52e5b98f242d45a4a740813bc

 ///  File Name: symantecPassword.txt
Description:
Symantec Anti Virus Corporate Edition version 9.x suffers from a local password disclosure flaw where anyone on a machine can view the LiveUpdate password.
Author:golovast
File Size:2487
Last Modified:Sep 1 08:44:55 2005
MD5 Checksum:1671caf407757f5ecc6b846d70580f7a

 ///  File Name: phpcal.txt
Description:
phpCommunityCalendar 4.0.3 suffers from login bypass, SQL injection, and cross site scripting vulnerabilities. Full exploitation details are provided.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:2438
Last Modified:Sep 7 09:09:59 2005
MD5 Checksum:45e9b6694028deb005356f830802fa90

 ///  File Name: freeSMTP.pl.txt
Description:
Proof of concept exploit for the Free SMTP server versions 2.2 and below spam filter vulnerability.
Homepage:http://nfamous.2hell.com/
File Size:2339
Last Modified:Sep 7 09:00:00 2005
MD5 Checksum:61087dc9d7f27d06ec3546b22ef58928

 ///  File Name: aMemberPro234.txt
Description:
aMember Pro 2.3.4 is susceptible to a remote PHP file include vulnerability.
Author:NewAngels Team
File Size:2323
Last Modified:Sep 7 08:22:41 2005
MD5 Checksum:e63a88a6ec724c8692573a397772918d

 ///  File Name: noahSQLXSS.txt
Description:
Noah's Classifieds are vulnerable to SQL injection and cross site scripting attacks. Flaws have been tested against version 1.3, others are possibly susceptible.
Author:trueend5
File Size:2198
Last Modified:Sep 22 07:35:16 2005
MD5 Checksum:57eb733a6a38d31506bc9cd201c588a8

 ///  File Name: EXPL-A-2005-014.txt
Description:
Perldiver versions 1.x and 2.x suffer from cross site scripting flaws.
Author:Donnie Werner
Homepage:http://exploitlabs.com
File Size:2167
Last Modified:Sep 23 08:29:49 2005
MD5 Checksum:f972471c8c7a2fe83c55efcb0fab0724

 ///  File Name: mkZebedeeDoS.c
Description:
Zebedee 2.4.1 is susceptible to a denial of service attack when receiving a zero as a port number in the protocol option header. Sample exploit is provided.
Author:Mitsuaki Shiraishi, Tomoki Sanaki, Mutallip Ablimit
File Size:2154
Last Modified:Sep 13 08:39:48 2005
MD5 Checksum:602aabf1e44b2c2568c22b1b45e58eac

 ///  File Name: spymac-web-os-40-variable-xss.txt
Description:
Spymac Web Os 4.0 is susceptible to cross site scripting attacks due to a lack of variable sanitization.
Author:Lostmon
File Size:1995
Last Modified:Sep 13 08:48:54 2005
MD5 Checksum:55718523f27cf8aceed4a6203201f981

 ///  File Name: dl-cups.c
Description:
CUPs 1.x denial of service exploit.
Author:tracewar
File Size:1979
Last Modified:Sep 7 09:06:03 2005
MD5 Checksum:b650d33eba4a186d7579dee6006ffd21

 ///  File Name: phpLDAPadmin.pl.txt
Description:
phpLDAPadmin 0.9.6 - 0.9.7/alpha5 Remote Command Execution exploit written in perl.
Author:Johnnie Walker
Related Exploit:phpldap.html"
File Size:1899
Last Modified:Sep 1 04:57:30 2005
MD5 Checksum:a6a8f190f8ce2d3360461aaa7be7bc65