Section:  .. / 0602-exploits  /

Page 4 of 7
<< 1 2 3 4 5 6 7 >> Files 75 - 100 of 152
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: dotProject-2.0.1.txt
Description:
dotProject versions 2.0.1 and below are vulnerable to multiple arbitrary code execution and information disclosure problems.
Author:Robin Verton
File Size:2186
Last Modified:Feb 15 00:43:07 2006
MD5 Checksum:0ed37715952044d9f805a8838e0b4b4a

 ///  File Name: waraxe-2006-SA-044.txt
Description:
waraxe-2006-SA#044 - XSS in phpNuke version 7.8 and older.
Author:waraxe
Homepage:http://www.waraxe.us/advisory-44.html
File Size:4584
Last Modified:Feb 15 00:40:06 2006
MD5 Checksum:3338c2a46ee42df46377927af922e7ef

 ///  File Name: PHPClassifieds.txt
Description:
PHP Classifieds version 6.2 and lower suffer from an authentication bypass vulnerability.
Author:Audun Larsen
File Size:1438
Last Modified:Feb 15 00:38:14 2006
MD5 Checksum:aee4bd6d2912e9bc74b9c164000f48b0

 ///  File Name: gexp-powerd.c
Description:
Power Daemon versions 2.0.2 and below remote format string exploit.
Author:barros, xgc
Homepage:http://gotfault.net/
File Size:9813
Last Modified:Feb 14 09:00:32 2006
MD5 Checksum:bf56b8e1706fc8e7b5799af013ff3a49

 ///  File Name: gexp-openvmpsd.c
Description:
OpenVMPSd versions 1.3 and below remote format string exploit. Binds a shell to port 31337.
Author:barros, xgc
Homepage:http://gotfault.net/
File Size:8061
Last Modified:Feb 14 08:59:15 2006
MD5 Checksum:9c0d6272bd7bf0b699a00bbb8cac7440

 ///  File Name: htmlws.c
Description:
Microsoft HTML Help Workshop .hhp file compiled file header buffer overflow exploit.
Author:k3xji, darkeagle
Homepage:http://www.guvenliklab.com
File Size:2196
Last Modified:Feb 14 08:56:43 2006
MD5 Checksum:2209e4c4bd89df614b3e6c8b6b192f0f

 ///  File Name: firefox_queryinterface_mac.pm.txt
Description:
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface(). Max OS X version.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:5654
Related CVE(s):CVE-2006-0295
Last Modified:Feb 14 08:54:46 2006
MD5 Checksum:0be0c57d21ee5289218310e4269f47de

 ///  File Name: eudora_imap.pm.txt
Description:
This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0).
Author:y0
Homepage:http://www.metasploit.com
File Size:3554
Related CVE(s):CVE-2005-4267
Last Modified:Feb 14 08:53:24 2006
MD5 Checksum:b4d3dce552bdd96a74351c34818fce93

 ///  File Name: firefox_queryinterface.pm.txt
Description:
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface().
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:5646
Related CVE(s):CVE-2006-0295
Last Modified:Feb 14 08:50:00 2006
MD5 Checksum:a331d364987cfd9feedeb9eeb5761a26

 ///  File Name: flyspray_097_php5_incl_xpl.html
Description:
FlySpray version 0.9.7 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14634
Last Modified:Feb 14 08:42:27 2006
MD5 Checksum:edcfc76d9d4a66b86c4959ed7c147718

 ///  File Name: egs_10rc4_php5_incl_xpl.php.txt
Description:
EGS Enterprise Groupware System versions 1.0 rc4 and below remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14946
Last Modified:Feb 14 08:40:38 2006
MD5 Checksum:9b8239760e4f2fe3b077fb38481d07b9

 ///  File Name: guestbookPHP.txt
Description:
gastbuch versions 1.3.2 and below are susceptible to cross site scripting.
Author:Micha Borrmann
File Size:1092
Last Modified:Feb 14 08:37:21 2006
MD5 Checksum:144ce0b21664236abeb439e709045dc9

 ///  File Name: EveryoneXSS.txt
Description:
everyone.net suffers from a cross site scripting vulnerability.
Author:Simo Ben youssef
Homepage:http://www.morx.org
File Size:2860
Last Modified:Feb 14 06:17:23 2006
MD5 Checksum:8fafb9701be58a46551e5886bcc89d87

 ///  File Name: EV0064.txt
Description:
Clever Copy version 3 is susceptible to cross site scripting attacks.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1330
Related CVE(s):CVE-2006-0627
Last Modified:Feb 14 06:13:35 2006
MD5 Checksum:eafe9c2f664a9d93884cbbf881e4dda4

 ///  File Name: EV0061.txt
Description:
phpstatus version 1.0 is susceptible to authentication bypass via SQL injection and an issue with cookie verification.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1617
Related CVE(s):CVE-2006-0570, CVE-2006-0571, CVE-2006-0572
Last Modified:Feb 14 06:11:52 2006
MD5 Checksum:29fbf97903cf1a4808c34d06d38e187a

 ///  File Name: EV0060.txt
Description:
phphd version 1.0 is susceptible to authentication bypass, SQL injection, and cross site scripting attacks.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:2251
Related CVE(s):CVE-2006-0607, CVE-2006-0608, CVE-2006-0609
Last Modified:Feb 14 06:08:51 2006
MD5 Checksum:ab7bdb372f3ebe013ba4ba8e0e4c6031

 ///  File Name: srvcheck2.zip
Description:
Privilege escalation exploit for Windows networks using weak service restrictions.
Author:aT4r
Homepage:http://www.haxorcitos.com
Related File:winval.pdf
File Size:36799
Last Modified:Feb 14 05:54:07 2006
MD5 Checksum:ad3eb5a3df759022d366d2a22d076536

 ///  File Name: DBeSession102.txt
Description:
DB_eSession 1.0.2 is susceptible to SQL injection attacks. Details provided.
Homepage:http://www.gulftech.org/
File Size:2812
Last Modified:Feb 14 05:45:03 2006
MD5 Checksum:1689d07a74662034a1dc635361cb6f16

 ///  File Name: Fortinet-url.txt
Description:
It is possible to bypass Fortinet URL blocker by making special HTTP requests. Proof of concept perl script provided.
Author:Mathieu Dessus
File Size:2540
Last Modified:Feb 14 01:36:23 2006
MD5 Checksum:5f931ff8373ea0ff85abc57ef3100446

 ///  File Name: ArmySystemv2.1.txt
Description:
Invision Power Board Army System Mod Version 2.1 and earlier SQL injection exploit.
Author:fRoGGz SecuBox Labs
Homepage:http://secubox.shadock.net
File Size:4588
Last Modified:Feb 13 11:08:38 2006
MD5 Checksum:e950f502d08387c09b0a8e2fc3d8bf53

 ///  File Name: VCardLITE-2.4.txt
Description:
The default installation of VCardLITE does not remove install.php leading to remote code execution.
Author:disruptor
File Size:1266
Last Modified:Feb 13 10:58:52 2006
MD5 Checksum:20935c52523feda376b3c35386e27b9b

 ///  File Name: docmgr_0542_incl_xpl
Description:
DocMGR versions less than or equal to 0.54.2 arbitrary remote inclusion exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/docmgr_0542_incl_xpl.html
File Size:12812
Last Modified:Feb 13 10:55:09 2006
MD5 Checksum:5fd6d96849de8d6d12deb7e2e93d7ba3

 ///  File Name: EV0059.txt
Description:
phpht Topsites suffers from Authentication Bypass and SQL injection vulnerabilities.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/59/summary.html
File Size:2240
Last Modified:Feb 13 10:50:48 2006
MD5 Checksum:1a5e0c872c771f2748bfff7b43de0fe4

 ///  File Name: EV0058.txt
Description:
phphg Guestbook suffers from SQL injection and XSS vulnerabilities.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/58/summary.html
File Size:2340
Last Modified:Feb 13 10:46:43 2006
MD5 Checksum:d40292f3d9c83a7d32e2fcea7e7de0de

 ///  File Name: siteframe5.0.1a_xss.txt
Description:
Unavailable.
File Size:2109
Last Modified:Feb 13 10:19:27 2006
MD5 Checksum:ca84390a45d096ed4d9f813090796434