Section:  .. / 0802-exploits  /

Page 11 of 14
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 >> Files 250 - 275 of 334
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: diane_lane_fucked_hard.c
Description:
Linux kernel versions 2.6.23 through 2.6.24 vmsplice local root exploit.
Author:qaaz
File Size:2856
Last Modified:Feb 11 15:55:32 2008
MD5 Checksum:8123ba9a532639b010143d80373a1c7d

 ///  File Name: jessica_biel_naked_in_my_bed.c
Description:
Linux kernel versions 2.6.17 through 2.6.24.1 vmslice local root exploit.
Author:qaaz
File Size:6264
Last Modified:Feb 11 15:53:54 2008
MD5 Checksum:e3e4fa55ccc07d69a5f0667786003924

 ///  File Name: imagestationsony-overflow.txt
Description:
ImageStation ActiveX buffer overflow exploit that makes use of SonylSUpload.cab version 1.0.0.38 and can spawn calc.exe or bind a shell.
Author:Elazar Broad
File Size:6717
Last Modified:Feb 11 15:51:50 2008
MD5 Checksum:a454ae1c00730c64fe88ecbedfc7dffa

 ///  File Name: vwar-sql.txt
Description:
VWar version 1.5.0 suffers from a SQL injection vulnerability in calendar.php. This particular version of VWar is already known to suffer from many other SQL injection vulnerabilities.
Author:Pouya_server
Related Exploit:vwarSQL.txt
File Size:172
Last Modified:Feb 11 14:30:18 2008
MD5 Checksum:27cd142b44ba4f8c647397575db483c6

 ///  File Name: msdirectspeech-overflow.txt
Description:
Microsoft DirectSpeechSynthesis module remote buffer overflow exploit that makes use of XVoice.dll version 4.0.4.3303.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:3949
Last Modified:Feb 11 14:25:28 2008
MD5 Checksum:2eb987a41f571fad1ca6e410894fec4a

 ///  File Name: mixsys-sql.txt
Description:
Mix Systems CMS remote SQL injection exploit that makes use of index.php.
Author:halkfild
File Size:2107
Last Modified:Feb 11 14:23:40 2008
MD5 Checksum:bf2d5fa1987b8e348cc7127d422bc748

 ///  File Name: pacercms-exec.txt
Description:
PacerCMS version 0.6 suffers from a remote code execution vulnerability.
Author:GolD_M
Homepage:http://www.tryag.cc/
File Size:448
Last Modified:Feb 11 14:22:32 2008
MD5 Checksum:f123fb000d7a1a6a04a8dd7aa7256ec9

 ///  File Name: sapidcmf-exec.txt
Description:
SAPID CMF build 87 suffers from a remote code execution vulnerability.
Author:GolD_M
Homepage:http://www.tryag.cc/
File Size:687
Last Modified:Feb 11 14:21:24 2008
MD5 Checksum:8f96bb0d96d7e587c3c11e8377646ec0

 ///  File Name: f5big-xsrf.txt
Description:
The F5 BIG-IP web management console version 9.4.3 suffers from a cross site request forgery vulnerability that can allow for arbitrary code execution.
Author:nnposter
File Size:1333
Last Modified:Feb 11 14:20:17 2008
MD5 Checksum:76dae7ad1ce4e2c843d41fb9f457bfe7

 ///  File Name: itechbids60-sql.txt
Description:
ITechBids version 6.0 suffers from a remote SQL injection vulnerability in detail.php.
Author:SoSo H H
File Size:1789
Last Modified:Feb 11 14:15:35 2008
MD5 Checksum:2842c0b74316e85d8d80067ebca7dcbf

 ///  File Name: pks-sql.txt
Description:
PKs Movie Database version 3.0.3 suffers from cross site scripting and SQL injection vulnerabilities.
Author:H-T Team
Homepage:http://no-hack.fr/
File Size:948
Last Modified:Feb 11 14:14:35 2008
MD5 Checksum:ad685f9d10e289e477470c71a3f92b34

 ///  File Name: mambocom-sql.txt
Description:
The Mambo Comments component versions 0.5.8.5g and below suffer from a SQL injection vulnerability.
Author:CheebaHawk215
Homepage:http://www.always420forum.com/
File Size:1013
Last Modified:Feb 11 14:13:47 2008
MD5 Checksum:7585fd787041a99a2da7f8853bdf6ccc

 ///  File Name: journalness-exec.txt
Description:
Journalness versions 4.1 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.
Author:Iron
Homepage:http://ironwarez.info/
File Size:987
Last Modified:Feb 11 14:12:24 2008
MD5 Checksum:2916af349ed255e4800fca79d90afcaf

 ///  File Name: openrealty-exec.txt
Description:
Open-Realty versions 2.4.3 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.
Author:Iron
Homepage:http://ironwarez.info/
File Size:975
Last Modified:Feb 11 14:11:30 2008
MD5 Checksum:6aba7d960417aef3a30810cf71227bbb

 ///  File Name: domphp-lfi.txt
Description:
DomPHP version 0.82 suffers from a local file inclusion vulnerability in index.php.
Author:H-T Team
Homepage:http://no-hack.fr/
File Size:1121
Last Modified:Feb 11 14:10:04 2008
MD5 Checksum:931ef2843ea43f0b952529e1765a9ac3

 ///  File Name: jetaudioasx-overflow.txt
Description:
jetAudio version 7.0.5 suffers from remote stack overflow vulnerability during the parsing of .ASX files.
Author:laurent gaffi
File Size:2357
Last Modified:Feb 8 17:32:33 2008
MD5 Checksum:fd7dfbfd2458ba9e87fb6cb1e47d82be

 ///  File Name: serendipityfreetag-xss.txt
Description:
The Serendipity Freetag-plugin versions 2.95 and below suffers from a cross site scripting vulnerability.
Author:Alexander Brachmann
File Size:3304
Last Modified:Feb 8 17:29:19 2008
MD5 Checksum:010d3142279bbc16e61aecbf456a0bf9

 ///  File Name: joomla1014-rfi.txt
Description:
Joomla versions 1.0.14-RC1 and below suffer from a remote file inclusion flaw in index.php.
Author:Fegla
File Size:1552
Last Modified:Feb 8 17:24:20 2008
MD5 Checksum:b5916d1655ffe2e2c25e54d742b744cd

 ///  File Name: DSECRG-08-014.txt
Description:
PowerNews version 2.5.6 suffers from multiple local file inclusion vulnerabilities.
Author:Sh2kerr, Stas Svistunovich
Homepage:http://www.dsec.ru/
File Size:2623
Last Modified:Feb 8 17:22:44 2008
MD5 Checksum:bc6e9907638581cb3f9c6c7e12a68168

 ///  File Name: joovili-rfi.txt
Description:
Joovili version 2.1 suffers from a remote file inclusion vulnerability.
Author:Cr@zy_King
File Size:541
Last Modified:Feb 8 17:17:30 2008
MD5 Checksum:662b60affb5f5908fa5a7f97bfad6998

 ///  File Name: joomlagal-sql.txt
Description:
The Joomla component Gallery suffers from a SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:1213
Last Modified:Feb 8 17:16:42 2008
MD5 Checksum:a0e2b96227fb3db10e83f5f2fa6bc883

 ///  File Name: joomlaneogal-sql.txt
Description:
The Joomla component NeoGallery version 1.1 suffers from a SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:1697
Last Modified:Feb 8 17:15:56 2008
MD5 Checksum:4f3be63b4a0bdf75d71200177111b2e9

 ///  File Name: imagestation-overflow.txt
Description:
ImageStation ActiveX buffer overflow proof of concept exploit that takes advantage of SonylSUpload.cab version 1.0.0.38.
Author:Trancek
File Size:1266
Last Modified:Feb 8 17:13:59 2008
MD5 Checksum:4524b9966e4a7f28f02da12cc946e1d6

 ///  File Name: rintintin.zip
Description:
TinTin++ / WinTin++ versions 1.97.9 and below exploit that demonstrates buffer overflow and file creation vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:rintintin.txt
File Size:7694
Last Modified:Feb 7 23:23:05 2008
MD5 Checksum:899aa4767fec8ef6ea9ec8b063300e02

 ///  File Name: ipsimene.zip
Description:
Proof of concept exploit for Ipswitch Instant Messaging versions 2.0.8.1 and below which suffer from format string, NULL pointer, and file creation vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:ipsimene.txt
File Size:19981
Last Modified:Feb 7 23:20:05 2008
MD5 Checksum:d7ebc94c062efb4a4a0165ae3b41fe63