Section:  .. / 0604-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 59
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: MyBB1.1.1.txt
Description:
MyBB 1.1.1 suffers from several SQL injections in the administration panel.
Author:o.y.6
File Size:2693
Last Modified:Apr 29 03:45:35 2006
MD5 Checksum:1b2edbdb14193710dc304b9468c50648

 ///  File Name: MyEvent-1.2.txt
Description:
MyEvent v1.2 suffers from a remote code execution vulnerability in Event.php.
Author:botan
File Size:1005
Last Modified:Apr 19 23:55:20 2006
MD5 Checksum:64ed934a22be30d1b3eb5b3951ce3199

 ///  File Name: NeonResponder-5.4.txt
Description:
Neon Responder 5.4 for Windows suffers from a DOS - sending it a specially crafted "Clock Synchronization" packet causes it to crash. POC included.
Homepage:http://www.xion-security.at
File Size:3284
Last Modified:Apr 28 23:16:33 2006
MD5 Checksum:a03fdc22463117f2bc324e0f2f615e20

 ///  File Name: noHeaven.txt
Description:
Local DOS exploit for Linux kernel 2.6 which uses sys_timer_create() to exhaust system memory.
Author:fingerout
File Size:2119
Last Modified:Apr 20 00:04:52 2006
MD5 Checksum:0df9f053688c9ef79d6cccd30d39326a

 ///  File Name: ocrshopxtr_freebie.pl.txt
Description:
A perl script to bypass the OCR Shop XTR vvlicense validation scheme.
Author:VeNoMouS
File Size:2665
Last Modified:Apr 28 20:41:34 2006
MD5 Checksum:5a8d344a74f43c4c874f00d2f4884b1c

 ///  File Name: openPHPNuke233.txt
Description:
A remote file inclusion vulnerability exists in OpenPHPNuke versions 2.3.3 and below.
Author:[Oo]
File Size:234
Last Modified:Apr 30 03:31:13 2006
MD5 Checksum:5c313a5ff18c962da58bb473050a9014

 ///  File Name: Oracle10g10.2.0.2.0.txt
Description:
exploit for Oracle 10g 10.2.0.2.0.
Author:putosoft softputo
File Size:1550
Last Modified:Apr 28 20:44:01 2006
MD5 Checksum:79f77b624d7570912c3028d56fd38c5c

 ///  File Name: pajax-0.5.1.txt
Description:
PAJAX versions less than pajax-0.5.2 suffer from remote code injection and arbitrary file inclusion. POC included.
Author:RedTeam Pentesting
Homepage:http://www.redteam-pentesting.de
File Size:3961
Last Modified:Apr 18 01:01:08 2006
MD5 Checksum:ff73104679ac250ec3259570364bbeb7

 ///  File Name: PCPINChat-5.0.4.txt
Description:
PCPIN Chat versions less than or equal to 5.0.4 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7798
Last Modified:Apr 28 00:17:59 2006
MD5 Checksum:635b404ed19c960df6e376bb8db8bbfe

 ///  File Name: php121im_14_sql_xpl
Description:
PHP121 Instant Messenger versions less than or equal to 1.4 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:9114
Last Modified:Apr 14 02:34:57 2006
MD5 Checksum:c00a00973c2cb86344288665904fb60a

 ///  File Name: PHPAlbum-0.3.2.3
Description:
PHP Album versions less than or equal to 0.3.2.3 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6305
Last Modified:Apr 19 23:29:16 2006
MD5 Checksum:a77c4a51f9e173b94244b8a2c9431e7b

 ///  File Name: PHPList-2.10.2
Description:
PHPList versions less than or equal to 2.10.2 remote command execution exploit. Requires register_globals to be on.
Author:rgod
File Size:7409
Last Modified:Apr 14 02:27:09 2006
MD5 Checksum:9706f79e9be15885de674e3b2caea147

 ///  File Name: phplist_2102_incl_xpl
Description:
PHPList versions less that or equal to 2.10.2 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:7430
Last Modified:Apr 11 08:42:34 2006
MD5 Checksum:7b9a6d5867fb33a881e3ae9f2d937f98

 ///  File Name: phpMyAgenda-3.0.txt
Description:
22:27:51 2006 phpMyAgenda 3.0 Final suffers from a Remote File Include Vulnerability in agenda.php3.
Author:Aesthetico
File Size:1299
Last Modified:Apr 28
MD5 Checksum:602b82cf0b5b871c177b8903c06a345c

 ///  File Name: phpmychat_0145_xpl
Description:
PHPMyChat less than or equal to 0.14.5 "SYS enter" remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5801
Last Modified:Apr 6 21:21:02 2006
MD5 Checksum:c092bfdea11e03ca72cf74524f25a423

 ///  File Name: phpmychat_015dev_xpl
Description:
PHPMyChat "SYS enter" remote command execution exploit patched to work on the 0.14.6dev to 0.15.0dev branch.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6307
Last Modified:Apr 6 21:24:10 2006
MD5 Checksum:b0a0a679030dd2a4f98c333789b927c2

 ///  File Name: PhpOpenChat3.0.xADODB.txt
Description:
PhpOpenChat 3.0.x and ADODB versions less than 4.70 SQL injection exploit. Requires a blank mysql root password.
Author:rgod
File Size:5083
Last Modified:Apr 14 02:16:36 2006
MD5 Checksum:0f86ebfe2fb7849f3f24dbb4aac8d0fa

 ///  File Name: phpsurveyor_0995_xpl
Description:
PHPSurveyor versions less than or equal to 0.995 save.php/surveyid remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7106
Last Modified:Apr 28 00:19:39 2006
MD5 Checksum:2107ac047716ab96fd8d77388c0d8aad

 ///  File Name: pnc.pl.txt
Description:
23:39:45 2006 PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit
Author:uid0
Homepage:http://www.exploitercode.com
File Size:2632
Last Modified:Apr 4
MD5 Checksum:55cc530547edfc51ab101d2ca4e63e93

 ///  File Name: r57phpbba2e2.pl
Description:
phpBB remote command execution exploit. Requires administrative access on the forum. Tested on 2.0.12, 2.0.13, 2.0.19.
Homepage:http://rst.void.ru
File Size:3573
Last Modified:Apr 14 02:24:51 2006
MD5 Checksum:dccfb9fe0d59e25b6af6a4f146c939b6

 ///  File Name: ReloadCMS-1.2.5.txt
Description:
ReloadCMS versions less than 1.2.5 do not properly sanitize the user-agent request header before storing in stats.dat leading to XSS when the admin views the site statistics. Permissions can be escalated further ones logged in as admin.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:4343
Last Modified:Apr 11 03:07:44 2006
MD5 Checksum:99b485cdf47d45a2e6a18491f6dfc907

 ///  File Name: ronpoll.txt
Description:
poll.pl in ronpoll is susceptible to a remote command execution flaw.
Author:CrAzY CrAcKeR
Homepage:http://www.alshmokh.com
File Size:579
Last Modified:Apr 30 06:09:34 2006
MD5 Checksum:3d9303dbb91e5951e45d2430ec08b824

 ///  File Name: SA-03.txt
Description:
An example of a return into libc exploit that possibly works though grsecurity patch protection.
Homepage:http://pinkhat.org
Related File:grsec.png
File Size:3555
Last Modified:Apr 28 23:23:52 2006
MD5 Checksum:fb96640bf2648c2a5f3ec348f79a5079

 ///  File Name: simplog_092_incl_xpl
Description:
Simplog versions less than or equal to 0.9.2 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5086
Last Modified:Apr 12 06:10:29 2006
MD5 Checksum:0c8523c310fd549fb920a1065f8d2013

 ///  File Name: Sire2.0Nws.txt
Description:
If register_globals is on, Sire 2.0 Nws suffers from a remote file inclusion vulnerability.
Author:Moroccan Security Team
File Size:1096
Last Modified:Apr 12 20:03:21 2006
MD5 Checksum:c54fffc224ee1f8625ba5e1b7b61e854