VP-ASP suffers from a SQL injection vulnerability. Details provided.
688110bd3b6796180b031f9d3cd1dc83a93d1a47dc937364764b82c320563468
VP-ASP versions 6.00 through 6.08 suffer from a remote SQL injection vulnerability.
1b5495f9c3740506d9edae8c1736c015f16f163c6fc0bb4ef38ccbaa0eb08332
VP-ASP version 6.00 is susceptible to SQL injection attacks. Exploitation details provided.
88610c2c58aeabbf0a85467404b623b0dd9f1bf34a86fdf0a43adf16f0eafb0b
VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.
332f445af6a6c5c47f068cb8d8c03ed007441924b9c1604249e696ad8d996b1f
Man-cgi/Man2web/ManView remote command execution exploit. Tested against Man-cgi 1.11. All versions are affected.
3300bb4e9b0b107c205b3358667f3e44b2322107d91b974768b345a5d6beebc5
CUPs 1.x denial of service exploit.
ff8f9da2b2ed05af80951b23e43eb74ed987f6722dc4d1ea584c2d80c7787aa3
Simple replacement binaries for netstat, ls, and ps that enable an attacker or administrator to hide specific strings.
60b4569d41899121ba50b99fc410a2bd24142d5f2c7bf9931f2512e999cf5ae0
Backdoor for login where the original binary must be renamed and only gets called whenever the remote user's TERM variable is not set to the magic password. If the magic password is set, the user gets the option of a shell with or without logging.
e3fb9f9f65c704ddf3602b2cf854c54524ca1cacb73518276e083cfaff3953db
IMAP4rev1(lsub) remote exploit. Tested against v12.264, 12.250, 11.241, and 10.223. Requires username and password. Includes offsets for Red Hat and Slackware.
fab9c3c9f5c88eb5ccef31cc210a623985245fd8043724121dc1b172c2b35492
Class a/b/c ip list generator.
cab6ef757f8875a2ca483e53e574b580bfad6bc37676c6d0f66b6c4194a221b6
SnmpXdmid auto rooter based on snmpXdmid exploit from https://lsd-pl.net.
94ebe956f7f5a101e3099ef94b7ebd458085d3ce2490d32e37966d74a51c61e6