Section:  .. / 0511-exploits  /

Page 3 of 6
<< 1 2 3 4 5 6 >> Files 50 - 75 of 132
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: guestbook-2.2.txt
Description:
Guestbook v2.2 is vulnerable to a classic SQL admin bypass vulnerability.
Author:bhs_team
Homepage:http://www.Babol-Hackers.com
File Size:541
Last Modified:Nov 8 19:57:00 2005
MD5 Checksum:2e4a2d709870136d7d20ecd20e2c59bc

 ///  File Name: guppy459_xpl.txt
Description:
Guppy versions 4.5.9 and below suffer from remote code execution and arbitrary inclusion flaws. Full exploit provided.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:11863
Last Modified:Dec 1 10:26:19 2005
MD5 Checksum:83a8d5b3a3aac83c65477271b85ac2a5

 ///  File Name: H4-CREW-000003.txt
Description:
Superclick is susceptible to cross site scripting attacks in popup.php.
Author:h4 Crew
File Size:2025
Last Modified:Nov 4 18:10:55 2005
MD5 Checksum:a5a8e07c7b62bd8fb8b16ed975c2b627

 ///  File Name: HYSA-2005-009.txt
Description:
Elite Forum version 1.0.0.0 is susceptible to a cross site scripting vulnerability.
Author:Gladiator.KHF
Homepage:http://www.h4cky0u.org
File Size:2709
Last Modified:Nov 2 02:18:03 2005
MD5 Checksum:9e1933a9385b71ef068a854793671d64

 ///  File Name: ibProArcade.txt
Description:
The ibProArcade module versions 2.x that are commonly used in vBulletin and Invision Power board software are susceptible to SQL injection flaws. Details provided.
Author:bhfh01
File Size:608
Last Modified:Nov 8 15:53:25 2005
MD5 Checksum:7915f9ca08502f0a0f2bfd7e7f7f1d9a

 ///  File Name: ieDoS.pm.txt
Description:
Microsoft Internet Explorer denial of service metafile exploit. Raises CPU utilization up to 100%.
Author:Winny Thomas
File Size:2570
Last Modified:Dec 1 10:34:01 2005
MD5 Checksum:5c1c28310a0cdee182a606b0c706306f

 ///  File Name: invision203-SQL.txt
Description:
Invision Gallery version 2.0.3 is susceptible to SQL injection attacks.
Author:aLMaSTeR HaCKeR
File Size:1022
Last Modified:Nov 1 06:36:15 2005
MD5 Checksum:79cf67583cbd59a5cf9d3e7345b59c4a

 ///  File Name: ipb.2.1-english.txt
Description:
Invision Power Board version 2.1 is susceptible to javascript injection and cross site scripting attacks. English version of this advisory translated by Jerome Athias. Exploitation details provided.
Author:benjilenoob
Homepage:http://www.redkod.org/
File Size:2874
Last Modified:Nov 8 16:51:41 2005
MD5 Checksum:ff9ecbf8c1b28e47c93b281cd1d1ebd9

 ///  File Name: ipb.2.1.txt
Description:
Invision Power Board version 2.1 is susceptible to javascript injection and cross site scripting attacks. Advisory is in French. Exploitation details provided.
Author:benjilenoob
Homepage:http://www.redkod.org/
File Size:2394
Last Modified:Nov 8 15:38:01 2005
MD5 Checksum:89b3e1fa2d80d76844065e5fceb1fb07

 ///  File Name: kapda-12.txt
Description:
KAPDA Advisory - ekinboard version 1.0.3 is susceptible to cross site scripting and html injection flaws.
Author:trueend5
Homepage:http://www.KAPDA.ir
File Size:1728
Last Modified:Nov 15 11:46:58 2005
MD5 Checksum:0341bc458a30a7f9e3967c42871d32ae

 ///  File Name: kapda-13.txt
Description:
KAPDA Advisory - XMB version 1.9.3 Nexus (Final) and 1.9.2 Nexus are susceptible to cross site scripting and html injection flaws.
Author:trueend5
Homepage:http://www.KAPDA.ir
File Size:1629
Last Modified:Nov 20 20:17:17 2005
MD5 Checksum:26adfdcd295c6710644cdc27254a3631

 ///  File Name: kapda-phpp.txt
Description:
PHPP version 1.0 is susceptible to cross site scripting vulnerabilities. Exploitation details provided.
Author:trueend5
Homepage:http://www.KAPDA.ir
File Size:1644
Last Modified:Nov 30 19:52:31 2005
MD5 Checksum:d12e98e779e7391494a526a4f58b87db

 ///  File Name: lnxFTPDssl_warez.c
Description:
linux-ftpd-ssl version 0.17 remote root exploit.
Author:kcope
File Size:10885
Last Modified:Nov 8 15:43:10 2005
MD5 Checksum:dfca0fc230c74c2aa44559b28c6104b5

 ///  File Name: mailenable154.pm.txt
Description:
This Metasploit module exploits a buffer overflow in the W3C logging functionality of the MailEnable IMAPD service. Logging is not enabled by default and this exploit requires a valid username and password to exploit the flaw. MailEnable Professional version 1.6 and prior and MailEnable Enterprise version 1.1 and prior are affected.
Author:y0
Related Exploit:mailenable.cpp"
File Size:3986
Last Modified:Nov 20 20:32:14 2005
MD5 Checksum:e5740ecdc8ee4ed1a44f270d02a429e1

 ///  File Name: mailEnableDoS.txt
Description:
MailEnable Pro version 1.7 and MailEnable Enterprise version 1.1 are susceptible to a remote IMAP related denial of service flaw when a rename request with non existent mailbox names is presented.
Author:Josh Zlatin-Amishav
File Size:1436
Last Modified:Nov 30 20:47:39 2005
MD5 Checksum:12e54d884208e23d488683b508a71535

 ///  File Name: midicartSQL.txt
Description:
Midicart is susceptible to a SQL injection attack in search_list.asp.
Author:crazy frog
File Size:1098
Last Modified:Nov 15 07:11:17 2005
MD5 Checksum:0f4219e3f84a6efeafb3393aa11bb254

 ///  File Name: moodle16dev.txt
Description:
Moodle versions 1.6dev and below suffer from blind SQL injection, remote command execution, and cross site scripting flaws. Exploitation details provided.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:12628
Last Modified:Nov 12 04:00:55 2005
MD5 Checksum:ea87ac16f14f20aaa2e75d08a6957896

 ///  File Name: msdtc.cpp
Description:
Microsoft Windows Distributed Transaction Coordinator remote proof of concept exploit for the flaw listed in MS05-051.
Author:Swan
File Size:23557
Last Modified:Dec 1 10:49:02 2005
MD5 Checksum:e282b6dc7e4a918aca6f891d45beca90

 ///  File Name: n13SQL.php.txt
Description:
N-13 News remote SQL injection exploit that performs a PHP shell injection.
Author:KingOfSka
Homepage:http://contropotere.altervista.org
File Size:1785
Last Modified:Dec 2 17:32:31 2005
MD5 Checksum:3f276643d6c7430cfe8f0558e7316aa8

 ///  File Name: namesXSS.txt
Description:
names.co.uk, an English registrar and web hosting company, has an cross site scripting vulnerability allowing injection of arbitrary Javascript.
Author:reuben.31
File Size:601
Last Modified:Nov 8 17:50:57 2005
MD5 Checksum:8a4a5966f0874e223608846ea8dcc14a

 ///  File Name: NeroNet1202.txt
Description:
NeroNET versions 1.2.0.2 and below suffer from a directory traversal vulnerability. Details provided.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:2137
Last Modified:Nov 3 02:54:08 2005
MD5 Checksum:953852b90b8d3d216380c70216335626

 ///  File Name: News2NetSQL.txt
Description:
News2Net, a newspaper, magazine and newsletter publication manager, is susceptible to SQL injection attacks.
Author:BiPi_HaCk
Homepage:http://www.NightmareTeAmZ.altervista.org
File Size:1422
Last Modified:Nov 2 04:16:46 2005
MD5 Checksum:47534e0b942cd123d9b629713663ac2c

 ///  File Name: NukeETSQL32.txt
Description:
Nuke ET version 3.2 is susceptible to a remote SQL injection vulnerability. Exploit details provided.
Author:Lostmon
File Size:1564
Last Modified:Nov 30 08:34:23 2005
MD5 Checksum:3b3097b5afd617fc1aeeb96acc1a70f9

 ///  File Name: oste1.0.txt
Description:
The OSTE toplist script v1.0 is vulnerable to remote code execution.
Author:khc
File Size:337
Last Modified:Nov 8 20:01:40 2005
MD5 Checksum:0e7c053243418a09d49fcafa1f9e835b

 ///  File Name: OTRSXSS.txt
Description:
OTRS versions 1.x and 2.x are susceptible to cross site scripting and blind SQL injection attacks.
Author:Moritz Naumann
Homepage:http://moritz-naumann.com/
File Size:7842
Last Modified:Nov 30 20:28:02 2005
MD5 Checksum:e1e1639a87d80fd00a177c548b662a2b