Section:  .. / 0611-exploits  /

Page 7 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 150 - 175 of 258
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: mosreport-rfi.txt
Description:
MosReporter Joomla Component remote file inclusion exploit.
Author:Crackers_Child
File Size:3162
Last Modified:Nov 19 02:48:07 2006
MD5 Checksum:4154fa2fb4eecaaccf71a16dbbb47be8

 ///  File Name: ms06070-2.c
Description:
Microsoft Windows Wkssvc NetrJoinDomain2 stack overflow exploit that works against the vulnerability described in MS06-070. Fixed by S A Stevens.
Author:cocoruder, S A Stevens
Homepage:http://ruder.cdut.net/default.asp
File Size:12087
Last Modified:Nov 20 18:03:14 2006
MD5 Checksum:95bc617d247f39dd3011dc8d9d277937

 ///  File Name: ms06070-py.txt
Description:
Microsoft Windows NetpManageIPCConnect stack overflow exploit that works against the vulnerability described in MS06-070. Written in Python.
Author:Winny Thomas
File Size:4353
Last Modified:Nov 20 18:05:20 2006
MD5 Checksum:0210686b4f18932df18a30cbe244212d

 ///  File Name: ms06070.c
Description:
Microsoft Windows Wkssvc NetrJoinDomain2 stack overflow exploit that works against the vulnerability described in MS06-070.
Author:cocoruder
Homepage:http://ruder.cdut.net/default.asp
File Size:11836
Last Modified:Nov 16 17:27:51 2006
MD5 Checksum:5f345c7860fdf68e10b87e540f99880d

 ///  File Name: multicalendars.txt
Description:
MultiCalendars suffers from SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:450
Last Modified:Nov 16 16:58:20 2006
MD5 Checksum:a6880ede243c366024ad551626cfc908

 ///  File Name: mwchat-rfi.txt
Description:
MWChat Pro version 7.0 is susceptible to a remote file inclusion vulnerability.
Author:Mr.3FReeT
File Size:1416
Last Modified:Nov 7 06:22:56 2006
MD5 Checksum:5bec3e8aeb8b325a9b428b2ff6529f9d

 ///  File Name: myalbum302.txt
Description:
MyAlbum versions 3.02 and below remote file inclusion exploit.
Author:the_Edit0r
File Size:3146
Last Modified:Nov 21 07:39:57 2006
MD5 Checksum:a4fcf79f1e8ac37ae65b7f2d68561835

 ///  File Name: mybic065-rfi.pl.txt
Description:
My-BIC versions 0.6.5 and below remote file inclusion exploit.
Author:the_Edit0r
File Size:2459
Last Modified:Nov 18 01:48:05 2006
MD5 Checksum:0acc1dba19e0d1d67320c0d46dfc4bb7

 ///  File Name: Myphotos-rfi.pl.txt
Description:
Myphotos remote file inclusion exploit.
Author:the_Edit0r
File Size:4227
Last Modified:Nov 18 01:48:59 2006
MD5 Checksum:0cfc3111cf1f30205dc39ac658464540

 ///  File Name: mystats-108.txt
Description:
MyStats version 1.0.8 and below suffer from SQL injection, cross site scripting, and path disclosure vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:1026
Last Modified:Nov 14 08:12:16 2006
MD5 Checksum:aee6636099bb225a1ff8f6283f59a292

 ///  File Name: Newspublicationsystem.txt
Description:
If register_globals is on, News publication system suffers from a remote file inclusion vulnerability.
Author:navairum
File Size:1103
Last Modified:Nov 9 01:43:08 2006
MD5 Checksum:88a67f1b19cdc02bafed0ada17c58a7c

 ///  File Name: novelleDir88.pl.txt
Description:
Novell eDirectory 8.8 NDS server remote stack overflow exploit.
Author:Manuel Santamarina Suarez
File Size:4345
Last Modified:Nov 7 05:47:47 2006
MD5 Checksum:5daed4de215b093baea043c39238ece5

 ///  File Name: nst-29.txt
Description:
The Journal module in PHP-Nuke 7.9 and prior suffers from SQL injection in search.php. POC exploit included that grabs the password hash of the first admin.
Author:[NST]
Homepage:http://www.neosecurityteam.net/
File Size:12842
Last Modified:Nov 1 00:34:23 2006
MD5 Checksum:93c7fef47bb65bcdc704a49530dd541c

 ///  File Name: nst-30.txt
Description:
[N]eo [S]ecurity [T]eam [NST] - Advisory 30 - 2006-11-24: PHP-Nuke versions 7.9 and below suffer from a SQL injection vulnerability in the sid variable of the news module.
Author:[NST]
Homepage:http://www.neosecurityteam.net/
File Size:4111
Last Modified:Nov 28 07:00:49 2006
MD5 Checksum:24a019bab3794e026aa656d258745069

 ///  File Name: nucommunity-10.txt
Description:
NuCommunity version 1.0 remote SQL injection exploit that makes use of cl_CatListing.asp.
Author:ajann
File Size:2990
Last Modified:Nov 14 06:55:55 2006
MD5 Checksum:934117b72399164b41d2dd4b3d86a60f

 ///  File Name: nurems-10.txt
Description:
NuRems version 1.0 remote SQL injection exploit that makes use of propertysdetails.asp.
Author:ajann
File Size:2625
Last Modified:Nov 14 06:56:36 2006
MD5 Checksum:b8ed0c7f959dbe6f0ed00db1442b5b62

 ///  File Name: nuschool-10.txt
Description:
NuSchool version 1.0 remote SQL injection exploit that makes use of CampusNewsDetails.asp.
Author:ajann
File Size:2328
Last Modified:Nov 14 06:57:54 2006
MD5 Checksum:70090ea1070526a1872c76718e7cdc3c

 ///  File Name: nustore-10.txt
Description:
NuStore version 1.0 remote SQL injection exploit that makes use of Products.asp.
Author:ajann
File Size:662
Last Modified:Nov 14 06:57:19 2006
MD5 Checksum:560671e9b5d4ae664a41e0e6f2bdf4e8

 ///  File Name: nvidia.c
Description:
NVIDIA nView suffers from a local denial of service condition in keystone.exe.
Author:Hessam-x
Homepage:http://www.hessamx.net
File Size:709
Last Modified:Nov 27 04:11:01 2006
MD5 Checksum:0119226346eec65acd6e338519cf1eea

 ///  File Name: odyssessusblog100.txt
Description:
OdysseusBlog versions 1.0.0 and below suffer from a cross site scripting flaw.
Author:the_Edit0r
File Size:1099
Last Modified:Nov 18 01:43:47 2006
MD5 Checksum:5c07859fa0325c57ed869451b1183634

 ///  File Name: omnistar-SQL.txt
Description:
The Omnistar Article Manager suffers from a lack of input validation allowing for SQL injection attacks.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:320
Last Modified:Nov 10 17:05:55 2006
MD5 Checksum:03640db8cfaea519ab3e2a89f9f8bcbe

 ///  File Name: onlineer-20.txt
Description:
Online Event Registration versions 2.0 and below remote user password change exploit that makes use of save_profile.asp.
Author:ajann
File Size:1054
Last Modified:Nov 14 07:03:43 2006
MD5 Checksum:9f93b9a96d68f1bc54efb9ad14f092d9

 ///  File Name: openexec_createfile.pl.txt
Description:
Local exploit for the openexec binary in OpenBase SQL versions 10.0 and below which creates a root owned file with 0666 privileges.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related File:DMA-2006-1107a.txt
File Size:2216
Last Modified:Nov 9 04:05:19 2006
MD5 Checksum:3862c06a21e9f0614f76b2e49e50b4d4

 ///  File Name: openexec_duh.pl.txt
Description:
Local root exploit for the openexec binary in OpenBase SQL versions 10.0 and below which makes poor use of system().
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related File:DMA-2006-1107a.txt
File Size:1752
Last Modified:Nov 9 04:03:48 2006
MD5 Checksum:137c087bac477a82a55180f1cc1f459e

 ///  File Name: oscommerce-xss.txt
Description:
osCommerce contains a flaw in the admin section that allows a remote cross site scripting attack.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/2006/11/
File Size:3767
Last Modified:Nov 22 03:35:16 2006
MD5 Checksum:3cb37dc6e040a3c9c250f622a85e47c0