Section:  .. / 0604-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 59
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: fenice.c
Description:
Fenice - Open Media Streaming Server remote BOF exploit
Author:c0d3r
File Size:8724
Last Modified:Apr 26 09:10:27 2006
MD5 Checksum:5981750e77bd79d72f52447225412f18

 ///  File Name: VWar-1.2.1.txt
Description:
VWar versions less than or equal to 1.21 remote code execution exploit.
Author:Iran Hackerz Security Team
Homepage:http://www.hackerz.ir
File Size:1480
Last Modified:Apr 26 09:08:34 2006
MD5 Checksum:a492cb65b0e6f9d32035905f677dc333

 ///  File Name: DbbS-2.0.txt
Description:
DbbS versions 2.0 and below suffer from many vulnerabilities including XSS, code execution, and SQL injection. POC included.
Author:yamcho
File Size:969
Last Modified:Apr 20 00:07:30 2006
MD5 Checksum:a6d8ca62287a90b37f69b061503fc8f6

 ///  File Name: noHeaven.txt
Description:
Local DOS exploit for Linux kernel 2.6 which uses sys_timer_create() to exhaust system memory.
Author:fingerout
File Size:2119
Last Modified:Apr 20 00:04:52 2006
MD5 Checksum:0df9f053688c9ef79d6cccd30d39326a

 ///  File Name: MyEvent-1.2.txt
Description:
MyEvent v1.2 suffers from a remote code execution vulnerability in Event.php.
Author:botan
File Size:1005
Last Modified:Apr 19 23:55:20 2006
MD5 Checksum:64ed934a22be30d1b3eb5b3951ce3199

 ///  File Name: PHPAlbum-0.3.2.3
Description:
PHP Album versions less than or equal to 0.3.2.3 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6305
Last Modified:Apr 19 23:29:16 2006
MD5 Checksum:a77c4a51f9e173b94244b8a2c9431e7b

 ///  File Name: WD-SMPL.txt
Description:
SimpleBBS v1.1(posts.php) remote command execution exploit.
Author:World Defacers TeaM
Homepage:http://www.worlddefacers.de
File Size:2830
Last Modified:Apr 19 22:03:55 2006
MD5 Checksum:f8dacbf5578bc4223a9c98750055d40f

 ///  File Name: VBulletinImpEx.txt
Description:
VBulletin ImpEx suffers from a remote file inclusion vulnerability. POC included.
Author:dr.jr7
File Size:658
Last Modified:Apr 19 21:36:16 2006
MD5 Checksum:789fc85d93c77de5f8333073024b426c

 ///  File Name: pajax-0.5.1.txt
Description:
PAJAX versions less than pajax-0.5.2 suffer from remote code injection and arbitrary file inclusion. POC included.
Author:RedTeam Pentesting
Homepage:http://www.redteam-pentesting.de
File Size:3961
Last Modified:Apr 18 01:01:08 2006
MD5 Checksum:ff73104679ac250ec3259570364bbeb7

 ///  File Name: php121im_14_sql_xpl
Description:
PHP121 Instant Messenger versions less than or equal to 1.4 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:9114
Last Modified:Apr 14 02:34:57 2006
MD5 Checksum:c00a00973c2cb86344288665904fb60a

 ///  File Name: sphider_13_xpl_pl
Description:
Sphider versions less than or equal to 1.3 remote file inclusion exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:2044
Last Modified:Apr 14 02:29:39 2006
MD5 Checksum:a38b9757c691fed9bb7607739bdcd53f

 ///  File Name: PHPList-2.10.2
Description:
PHPList versions less than or equal to 2.10.2 remote command execution exploit. Requires register_globals to be on.
Author:rgod
File Size:7409
Last Modified:Apr 14 02:27:09 2006
MD5 Checksum:9706f79e9be15885de674e3b2caea147

 ///  File Name: r57phpbba2e2.pl
Description:
phpBB remote command execution exploit. Requires administrative access on the forum. Tested on 2.0.12, 2.0.13, 2.0.19.
Homepage:http://rst.void.ru
File Size:3573
Last Modified:Apr 14 02:24:51 2006
MD5 Checksum:dccfb9fe0d59e25b6af6a4f146c939b6

 ///  File Name: PhpOpenChat3.0.xADODB.txt
Description:
PhpOpenChat 3.0.x and ADODB versions less than 4.70 SQL injection exploit. Requires a blank mysql root password.
Author:rgod
File Size:5083
Last Modified:Apr 14 02:16:36 2006
MD5 Checksum:0f86ebfe2fb7849f3f24dbb4aac8d0fa

 ///  File Name: AzDGVote.txt
Description:
AzDGVote suffers from a remote file inclusion vulnerability.
Homepage:http://www.lezr.com
File Size:600
Last Modified:Apr 12 20:40:21 2006
MD5 Checksum:0c2aa928a80f8a8d4cffef582b8ea365

 ///  File Name: UltrVNC1.0.1.py.txt
Description:
Ultr@VNC 1.0.1 Client Buffer Overflow exploit. Spawns an instance of calc.exe.
Author:Paul Haas
Homepage:http://Redspin.com
File Size:2342
Last Modified:Apr 12 20:39:26 2006
MD5 Checksum:fddff6e4506ff5a5488ad349c73d6c11

 ///  File Name: Sire2.0Nws.txt
Description:
If register_globals is on, Sire 2.0 Nws suffers from a remote file inclusion vulnerability.
Author:Moroccan Security Team
File Size:1096
Last Modified:Apr 12 20:03:21 2006
MD5 Checksum:c54fffc224ee1f8625ba5e1b7b61e854

 ///  File Name: adv28-K-159-2006.txt
Description:
Clever Copy versions less than or equal to 3.0 allows one of its configuration files to be read remotely, resulting in critical information disclosure. Exploit included.
Author:eufrato
Homepage:http://advisories.echo.or.id
File Size:5096
Last Modified:Apr 12 19:56:39 2006
MD5 Checksum:509703859e9cfdb8fe028e0863c43e8f

 ///  File Name: Indexu-5.0.1.txt
Description:
Indexu versions less than or equal to 5.0.1 theme_path and base_path remote file inclusion exploit
Author:SnIpEr_SA
Homepage:http://www.3asfh.com
File Size:2343
Last Modified:Apr 12 08:32:35 2006
MD5 Checksum:6516fb103fcf1f412272d3d811738fe1

 ///  File Name: simplog_092_incl_xpl
Description:
Simplog versions less than or equal to 0.9.2 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5086
Last Modified:Apr 12 06:10:29 2006
MD5 Checksum:0c8523c310fd549fb920a1065f8d2013

 ///  File Name: horde_help_module.pm.txt
Description:
Horde versions less than or equal to 3.0.9 and 3.1.0 help viewer Metasploit Framework exploit.
Author:Inkubus Theo
File Size:3359
Last Modified:Apr 11 08:48:32 2006
MD5 Checksum:03781eabaf824513bd40c55c1d4dca18

 ///  File Name: phplist_2102_incl_xpl
Description:
PHPList versions less that or equal to 2.10.2 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:7430
Last Modified:Apr 11 08:42:34 2006
MD5 Checksum:7b9a6d5867fb33a881e3ae9f2d937f98

 ///  File Name: AngelineCMS0.8.1.txt
Description:
Exploit for AngelineCMS 0.8.1 remote php include vulnerability in loadkernel.php.
Author:M.Hasran Addahroni
Homepage:http://www.echo.or.id
File Size:5306
Last Modified:Apr 11 03:19:05 2006
MD5 Checksum:b58c4ce7b452387b824722119ad5018b

 ///  File Name: ReloadCMS-1.2.5.txt
Description:
ReloadCMS versions less than 1.2.5 do not properly sanitize the user-agent request header before storing in stats.dat leading to XSS when the admin views the site statistics. Permissions can be escalated further ones logged in as admin.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:4343
Last Modified:Apr 11 03:07:44 2006
MD5 Checksum:99b485cdf47d45a2e6a18491f6dfc907

 ///  File Name: horddy.pl.txt
Description:
Horde Help Viewer remote PHP code execution exploit.
Author:deese
Homepage:http://www.514.es/
File Size:2803
Last Modified:Apr 6 21:26:03 2006
MD5 Checksum:c33a87b0b499b8b10172a4145b3ea5e3