Section:  .. / 0507-exploits  /

Page 4 of 4
<< 1 2 3 4 >> Files 75 - 91 of 91
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: druppy461.pl.txt
Description:
Exploit that makes use of a PHP injection vulnerability in Drupal.
Author:dab
File Size:4145
Last Modified:Jul 7 10:08:59 2005
MD5 Checksum:81951daa3052f541a863856b7b3dc803

 ///  File Name: kpopper10.txt
Description:
kpopper versions 1.0 and below suffer from an insecure temporary file creation vulnerability. Exploit included.
Author:Eric Romang
Homepage:http://www.zataz.net/
File Size:1530
Last Modified:Jul 7 10:07:07 2005
MD5 Checksum:22369ea4a48f2e5c26fc9a5c9ee0e9ab

 ///  File Name: aspjarSQL.txt
Description:
ASPJar is susceptible to a SQL injection attack via the password variable when logging in.
Author:arash setayeshi
File Size:546
Last Modified:Jul 7 10:02:05 2005
MD5 Checksum:216708d337ffbb73b349af3d44fdab02

 ///  File Name: dosPlanet.txt
Description:
PlanetFileServer version 2.0.1.3 is susceptible to a denial of service attack that causes the server to crash. Exploit provided.
Author:fRoGGz, SecuBox Labs
File Size:2633
Last Modified:Jul 7 09:57:11 2005
MD5 Checksum:266810817f0afeceb334e20eb179f510

 ///  File Name: phpsource.traverse.txt
Description:
The Quick and Dirty PHPSource Printer version 1.0 is susceptible to a directory traversal attack. Exploitation provided.
Author:Seth Alan Woolley
File Size:1732
Last Modified:Jul 7 09:51:30 2005
MD5 Checksum:054dab738a266804cb82dea256d5ab2f

 ///  File Name: xmlrpcAnti.pl.txt
Description:
XMLRPC remote command execution exploit. Original flaw discovered by the people at gulftech.org.
Author:dukenn
Homepage:http://asteam.org
File Size:2550
Last Modified:Jul 7 09:47:27 2005
MD5 Checksum:31d402a21fca21b53f7c2c8d3d2c50b8

 ///  File Name: idm405.txt
Description:
Internet Download Manager input URL stack overflow exploit that affects versions 4.05 and below.
Author:c0d3r
Homepage:http://www.ihsteam.com/
File Size:6888
Last Modified:Jul 7 09:30:25 2005
MD5 Checksum:49a92c946b9d68852ee9164b0f29e840

 ///  File Name: r57xoops.pl
Description:
Remote SQL injection exploit for xmlrpc.php that makes use of Xoops versions 2.0.11 and below.
Author:1dt.w0lf
Homepage:http://rst.void.ru
File Size:3652
Last Modified:Jul 7 09:26:59 2005
MD5 Checksum:5637d751a81db26e75464412b59ea4fa

 ///  File Name: phpbb2015dad.txt
Description:
phpBB 2.0.15 exploit that makes use of the flaw in viewtopic.php and retrieves all details related to the database.
Author:SecureD
File Size:5423
Last Modified:Jul 7 09:24:39 2005
MD5 Checksum:d4dd013f5b6ea90e76193341984a5446

 ///  File Name: btftp.txt
Description:
Nokia Affix btftp remote client exploit that affect versions below 3.2.0.
Author:Kevin Finisterre
File Size:6451
Last Modified:Jul 7 09:20:14 2005
MD5 Checksum:81d9123bb8534643aa65f2ebadceb739

 ///  File Name: iejavaprxyexploit.pl.txt
Description:
Microsoft Internet Explorer javaprxy.dll COM object exploit that binds a shell to port 28876. Tested on Internet Explorer 6 on Microsoft Windows XP SP1 and SP2.
Author:FrSIRT
File Size:4623
Last Modified:Jul 7 09:17:42 2005
MD5 Checksum:85b3ff1c3b9ffb9b9b514df63ca757b9

 ///  File Name: phpbb2015.py.txt
Description:
php 2.0.15 remote command execution exploit for viewtopic.php. Written in Python.
Author:rattle
File Size:1661
Last Modified:Jul 7 09:14:48 2005
MD5 Checksum:4938584821c2e832604dc49ae8616f04

 ///  File Name: pearxmlrpc.pl.txt
Description:
Pear XML-RPC Library 1.3.0 remote PHP code execution exploit.
File Size:2686
Last Modified:Jul 7 09:13:15 2005
MD5 Checksum:978fb4153547584645cc895a7c8598d6

 ///  File Name: ZH2005-14SA.txt
Description:
Multiple problems exist on support.msn.com, permitting to a possible attacker to conduct phishing attacks against a user.
Author:Giovanni Delvecchio
Homepage:http://www.zone-h.org
File Size:1541
Last Modified:Jul 2 01:50:59 2005
MD5 Checksum:b5c67526c566a57939a7b3f9d1a5185b

 ///  File Name: pear130.txt
Description:
PEAR XML_RPC is vulnerable to a very high risk PHP code injection vulnerability due to unsanitized data being passed into an eval() call. Versions 1.3.0 and below are affected.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:3934
Last Modified:Jul 2 01:35:45 2005
MD5 Checksum:4f028a69b6014e640b03edd28e8da86d

 ///  File Name: multihtml.c.exploit.txt
Description:
The multihtml.c exploit from r00tabega suffers from a format string vulnerability.
Homepage:http://potkettle.net
File Size:4078
Last Modified:Jul 1 07:21:21 2005
MD5 Checksum:43651182da596a64ec6e9807431a4710