Section:  .. / 0507-exploits  /

Page 4 of 4
<< 1 2 3 4 >> Files 75 - 92 of 92
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: pluggedBlog.txt
Description:
Plugged-Blog 0.4.8 suffers from multiple cross site scripting, SQL injection, and other flaws. Detailed exploitation provided.
Author:FalconDeOro
File Size:4757
Last Modified:Aug 5 07:45:31 2005
MD5 Checksum:561b5c650671ccdc4cc6e3e0fd4d5556

 ///  File Name: probeExec.txt
Description:
probe.cgi allows for remote command execution due to a lack of a properly sanitized olddat variable.
Author:spher3
Homepage:http://www.badroot.org/
File Size:1081
Last Modified:Jul 7 10:48:02 2005
MD5 Checksum:f4de7c6ebe8aa807ef8d8c2ba1e7bb18

 ///  File Name: qlite.html
Description:
qliteNews arbitrary database manipulation and cross site scripting proof of concept exploit.
Author:rgod
Homepage:http://www.rgod.altervista.org/
File Size:6501
Last Modified:Aug 5 07:40:00 2005
MD5 Checksum:2c8ef5b4e893b6077a239dae97667d55

 ///  File Name: r57xoops.pl
Description:
Remote SQL injection exploit for xmlrpc.php that makes use of Xoops versions 2.0.11 and below.
Author:1dt.w0lf
Homepage:http://rst.void.ru
File Size:3652
Last Modified:Jul 7 09:26:59 2005
MD5 Checksum:5637d751a81db26e75464412b59ea4fa

 ///  File Name: redslim-slimftpd.c
Description:
SlimFTPd versions 3.15 and 3.16 remote buffer overflow exploit.
Author:redsand
File Size:11418
Last Modified:Jul 28 07:32:14 2005
MD5 Checksum:6de66a6620ad884289395e9b9cb90a4f

 ///  File Name: SiemensSANTIS50.txt
Description:
By sending trigger packets to the management port (280/http-mgmt) of a Siemens Santis 50 wireless router, the device freezes the web interface and allows unauthenticated access to the telnet CLI.
Author:Luca Carettoni
File Size:4612
Last Modified:Jul 28 07:51:16 2005
MD5 Checksum:542df31af7cbf3ce01745403d2ca6cd4

 ///  File Name: simplephpBlog040.txt
Description:
SimplePHPBlog 0.4.0 suffers from a remote password hash disclosure vulnerability due to the password file for the system being downloaded and in the webroot.
Author:pjphem, LazyCrs
File Size:4227
Last Modified:Jul 8 09:09:21 2005
MD5 Checksum:2ab4c73dd001c1f85a161ba3262f1408

 ///  File Name: simplicityRemote.txt
Description:
Simplicity OF Upload 1.3 allows for remote code execution and cross site scripting attacks.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:5540
Last Modified:Jul 28 08:18:42 2005
MD5 Checksum:c1c29ac201c7889dd7f93fb2b306a1e1

 ///  File Name: smb20b1XSS.txt
Description:
Simple Message Board version 2.0 beta 1 is susceptible to cross site scripting attacks in forum.cfm.
Author:rUnViRuS
Homepage:http://www.security-arab.com
File Size:705
Last Modified:Jul 15 07:45:48 2005
MD5 Checksum:703c47d1dc63c20bbe0c7630368d18ff

 ///  File Name: solsockjack.c
Description:
Solaris has a bug in the use of SO_REUSEADDR in that the kernel favors any socket binding operation that is more specific than the general *.* wildcard bind(). Due to this, a malicious socket can bind to an already bound interface if a specific IP address is used. Exploit included.
Author:c0ntex
File Size:30428
Last Modified:Jul 7 10:54:21 2005
MD5 Checksum:7950a3e21801d1f24dc251082d058b05

 ///  File Name: sqlChinese.txt
Description:
A SQL injection vulnerability exists in a Chinese ASP webcounter.
Author:r_i_t_b_15
File Size:1034
Last Modified:Jul 21 07:50:30 2005
MD5 Checksum:33e8fbc8ab8111a17f4371fa573ef138

 ///  File Name: webc.html
Description:
Web Content Management News System administrative account creation and cross site scripting proof of concept exploit.
Author:rgod
Homepage:http://www.rgod.altervista.org/
File Size:966
Last Modified:Aug 5 07:16:53 2005
MD5 Checksum:8c384ffa562818b79786f14e70f0140b

 ///  File Name: wms_poc.pl.txt
Description:
SoftiaCom's wMailserver version 1.0 remote denial of service exploit.
Author:fRoGGz
File Size:1517
Last Modified:Jul 13 08:44:35 2005
MD5 Checksum:db53312822f03753ee24a07bbf2d64b8

 ///  File Name: xmlrpc.py.txt
Description:
Pear XML-RPC Library 1.3.0 remote PHP code execution exploit. Written in Python.
Author:k3rn3lp4nic
File Size:4893
Last Modified:Jul 13 09:00:54 2005
MD5 Checksum:b1aca5d1cd600fa463195b2ab7cc7458

 ///  File Name: xmlrpcAnti.pl.txt
Description:
XMLRPC remote command execution exploit. Original flaw discovered by the people at gulftech.org.
Author:dukenn
Homepage:http://asteam.org
File Size:2550
Last Modified:Jul 7 09:47:27 2005
MD5 Checksum:31d402a21fca21b53f7c2c8d3d2c50b8

 ///  File Name: xmlrpcGeneric.txt
Description:
Basic XMLRPC exploit written for Metasploit.
Author:peasant
File Size:2597
Last Modified:Jul 13 08:40:49 2005
MD5 Checksum:8d3074f1510918dfea2f402a421c43f9

 ///  File Name: ZH2005-14SA.txt
Description:
Multiple problems exist on support.msn.com, permitting to a possible attacker to conduct phishing attacks against a user.
Author:Giovanni Delvecchio
Homepage:http://www.zone-h.org
File Size:1541
Last Modified:Jul 2 01:50:59 2005
MD5 Checksum:b5c67526c566a57939a7b3f9d1a5185b