Section:  .. / 0602-exploits  /

Page 4 of 7
<< 1 2 3 4 5 6 7 >> Files 75 - 100 of 152
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: imap4d_expl.c
Description:
GNU mailutils imap4d format string vulnerability exploit.
Author:crash-x
File Size:15404
Last Modified:Feb 2 00:14:29 2006
MD5 Checksum:3e5f51b8cef911e8d64bec8c9636a0c8

 ///  File Name: ipswitch_dos.txt
Description:
IPSwitch WhatsUp Professional 2006 is susceptible to a denial of service condition. Details provided.
Author:Josh Zlatin-Amishav
File Size:1330
Last Modified:Feb 26 02:37:45 2006
MD5 Checksum:aac876847b84a06fa4cdc5291afbe90d

 ///  File Name: kadu-fun.txt
Description:
When Kadu receives large number of image send requests from an attacker it crashes. POC included.
Author:Piotr Bania
Homepage:http://www.piotrbania.com/all/adv/kadu-fun.txt
File Size:9677
Last Modified:Feb 17 02:53:49 2006
MD5 Checksum:dc00a0f29d5f803409a3e1183ba1680a

 ///  File Name: kapda-26.txt
Description:
MyTopix 1.2.3 suffers from Sql Injection and Path Disclosure vulnerabilities.
Author:cvh
Homepage:http://www.KAPDA.ir
File Size:1748
Last Modified:Feb 6 05:01:39 2006
MD5 Checksum:e0a222ad9a9a548153d2e337bcf483e4

 ///  File Name: linpha_10_local.txt
Description:
Linpha versions 1.0 and below arbitrary local inclusion exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:4729
Last Modified:Feb 13 07:51:35 2006
MD5 Checksum:728fd5a06a165fdce10e7a9aba5c01d1

 ///  File Name: loudblog_04_incl_xpl.txt
Description:
LoudBlog 0.4 remote command execution exploit.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:10130
Last Modified:Feb 6 04:43:12 2006
MD5 Checksum:f13d714e162f41c68b162fe17f8d7039

 ///  File Name: mambo453.txt
Description:
Mambo versions 4.5.3h and below are susceptible to SQL injection and file inclusion attacks. Full details provided.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:8049
Last Modified:Feb 26 05:42:19 2006
MD5 Checksum:065a2f9828389a6ddc970cd0e7a1d9a5

 ///  File Name: minimuke.pl.txt
Description:
Mininuke version 1.8.2 and below remote SQL injection exploit that changes a user's password.
Author:nukedx, Hessam-x
Homepage:http://www.Hackerz.ir
File Size:2245
Last Modified:Feb 2 03:33:19 2006
MD5 Checksum:544595b3b60bc72452197c7bafd21e2f

 ///  File Name: MiniNukeCMS.txt
Description:
The MiniNuke CMS system suffers from a SQL injection vulnerability in pages.asp. Detailed exploitation provided.
Author:nukedx a.k.a nuker
Homepage:http://www.nukedx.com/
File Size:3418
Last Modified:Feb 22 20:29:47 2006
MD5 Checksum:fefcb5dd1aeaff6889c62dfd06aface4

 ///  File Name: mozThunDoS.txt
Description:
Mozilla Thunderbird's WYSIWYG rendering engine insufficiently filters javascript scripts. It is possible to write javascript in the SRC attribute of the IFRAME tag. This leads to execution when the email is edited (for instance when replying to the email), even if javascript is disabled in the preferences. Versions 1.0.7 and below are affected.
Author:nono2357
File Size:1957
Last Modified:Feb 26 02:41:46 2006
MD5 Checksum:9b25ea654be43f4e46167eb5b6bda9f8

 ///  File Name: MS06-005.c
Description:
Windows Media Player BMP Heap Overflow (MS06-005) exploit.
Author:atmaca
Homepage:http://www.spyinstructors.com
File Size:3723
Last Modified:Feb 18 03:21:09 2006
MD5 Checksum:15fe36ec72315f3f4372205888a87f17

 ///  File Name: MyBB-1.03.txt
Description:
MyBB 1.03 suffers from multiple SQL injection vulnerabilities. POC included.
Author:HACKERS PAL
Homepage:http://WwW.SoQoR.NeT
File Size:14802
Last Modified:Feb 15 00:51:12 2006
MD5 Checksum:093be3134f64c642c65ed7b31820c1c9

 ///  File Name: MyBB1.0.3-managegroup.txt
Description:
MyBB v1.0.3 suffers from XSS and SQL injection in moderation.php.
Author:imei addmimistrator
Homepage:http://security.myimei.com
File Size:1213
Last Modified:Feb 16 23:51:05 2006
MD5 Checksum:152ddc36f99cc72003a45519e2419155

 ///  File Name: MyBB1.0.3-private.txt
Description:
MyBB v1.0.3 suffers from SQL injection and XSS in private.php.
Author:imei addmimistrator
Homepage:http://security.myimei.com
File Size:1435
Last Modified:Feb 16 23:52:33 2006
MD5 Checksum:ce7cb7e0ad0f784e200898e1a66a0c7f

 ///  File Name: MyPHPNuke188.txt
Description:
MyPHPNuke versions 1.8.8 and below are susceptible to multiple cross site scripting vulnerabilities. Details provided.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:975
Last Modified:Feb 26 05:40:40 2006
MD5 Checksum:bd1d88960738101f0b46b4df7e606232

 ///  File Name: myquiz101.pl.txt
Description:
MyQuiz version 1.01 remote command execution exploit.
Author:Hessam-x
Homepage:http://www.hessamx.net
File Size:906
Last Modified:Feb 8 06:13:03 2006
MD5 Checksum:7900c395f52e9f8a89832ae176214813

 ///  File Name: mysql-4x50.c
Description:
Local privilege escalation exploit for MySQL 4.x and 5.0 that makes use of UDFs.
Author:Marco Ivaldi
File Size:3178
Last Modified:Feb 26 06:13:53 2006
MD5 Checksum:80e3856c846d6dcafeb92c1d3ef8eecf

 ///  File Name: neomailXSS.txt
Description:
Neomail is susceptible to cross site scripting attacks.
Author:_6m0_HaCk
Homepage:http://www.morx.org/
File Size:2312
Last Modified:Feb 4 15:45:16 2006
MD5 Checksum:88aeea8ef919caf59647315ad9b84868

 ///  File Name: NoahMultiple.txt
Description:
Noah's Classifieds versions 1.3 and below are susceptible to path disclosure, SQL injection, cross site scripting, local file inclusion, and remote code execution flaws.
Author:trueend5
Homepage:http://www.kapda.ir
File Size:3827
Last Modified:Feb 26 02:39:39 2006
MD5 Checksum:8467134875225b6b9062ea09abb89bdd

 ///  File Name: noccw_10_incl_xpl.txt
Description:
NOCC Webmail versions 1.0 and below suffer from arbitrary local file inclusion, PHP injection, remote code execution, and cross site scripting flaws. Exploit included.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:26011
Last Modified:Feb 26 04:40:59 2006
MD5 Checksum:4d3b9d4aac222e9b667ee87dabc67164

 ///  File Name: NSAG-195-23.02.2006.txt
Description:
NSA Group Advisory - FCKeditor version 2.0 FC is susceptible to a directory creation and browsing flaw.
Homepage:http://www.nsag.ru/
File Size:1516
Last Modified:Feb 26 05:01:45 2006
MD5 Checksum:d33ba6e53dfb508844378cd1569df0f9

 ///  File Name: NSAG-196-23.02.2006.txt
Description:
NSA Group Advisory - FCKeditor version 2.2 allows for arbitrary file creation.
Homepage:http://www.nsag.ru/
File Size:1651
Last Modified:Feb 26 05:03:00 2006
MD5 Checksum:fca5e35b66c0300213711861c96d9103

 ///  File Name: NSAG-197-23.02.2006.txt
Description:
NSA Group Advisory - A flaw in CubeCart versions 3.0.0 through 3.0.6 allows for removed users to load arbitrary files onto the system.
Homepage:http://www.nsag.ru/
File Size:1861
Last Modified:Feb 26 05:18:39 2006
MD5 Checksum:19108f66edbe964b3b55093e82d88ff6

 ///  File Name: NSAG-200-24.02.2006.txt
Description:
NSA Group Advisory - The ArGoSoft Mail Server Pro version 1.8 IMAP server suffers from improper input validation when RENAME is being used.
Homepage:http://www.nsag.ru/
File Size:1238
Last Modified:Feb 26 05:25:20 2006
MD5 Checksum:548ffc621afef361e0a99b7389eb5ece

 ///  File Name: NSAG-201-24.02.2006.txt
Description:
NSA Group Advisory - The ArGoSoft Mail Server Pro version 1.8 POP server discloses system information to removed users.
Homepage:http://www.nsag.ru/
File Size:2167
Last Modified:Feb 26 05:23:35 2006
MD5 Checksum:a664eb4bc5ad9a128cee065c95a6b8f4