Section:  .. / 0804-exploits  /

Page 5 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 100 - 125 of 238
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: joovili-sql.txt
Description:
Joovili version 3.1 suffers from a SQL injection vulnerability in browse.videos.php.
Author:HaCkeR_EgY
Homepage:http://www.PaL-HaCker.com/
File Size:1519
Last Modified:Apr 29 19:45:24 2008
MD5 Checksum:f6d847f5d10bf8432cba6c95daee39dc

 ///  File Name: kantaris-overflow.txt
Description:
Kantaris version 0.3.4 media player local buffer overflow exploit. Creates a film.ssa file and upon successful exploitation binds a shell to port 4444.
Author:j0rgan
Homepage:http://www.jorgan.users.cg.yu/
File Size:4179
Last Modified:Apr 25 20:03:08 2008
MD5 Checksum:4b7836ddbca8f4c532518e3da2d34f13

 ///  File Name: koobicms-multisql.txt
Description:
Koobi CMS versions 4.2.4, 4.2.5, and 4.3.0 suffer from multiple remote SQL injection vulnerabilities.
Author:JosS
Homepage:http://www.spanish-hackers.com/
File Size:2070
Last Modified:Apr 14 18:51:25 2008
MD5 Checksum:25815beab0f8a5d9985a2a039cc72a3b

 ///  File Name: koobigal-sql.txt
Description:
Koobi versions 4.4 and 5.4 gallery suffer from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:1047
Last Modified:Apr 8 23:35:55 2008
MD5 Checksum:8442d86917b8521d23b818e8126672f8

 ///  File Name: koobiprogal-sql.txt
Description:
Koobi Pro version 6.25 gallery suffers from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:858
Last Modified:Apr 8 23:34:55 2008
MD5 Checksum:6dc640394f456374f19124f7b6ee0c11

 ///  File Name: koobiprolinks-sql.txt
Description:
Koobi Pro version 6.25 links suffers from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:912
Last Modified:Apr 8 23:33:42 2008
MD5 Checksum:46e2c5d71223f4260d2bdbc0904510b6

 ///  File Name: koobipropoll-sql.txt
Description:
Koobi Pro version 6.25 poll suffers from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:885
Last Modified:Apr 14 18:50:08 2008
MD5 Checksum:0184bff7a5e6903772676f344650f828

 ///  File Name: koobiproshop-sql.txt
Description:
Koobi Pro version 6.25 shop suffers from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:904
Last Modified:Apr 8 23:34:20 2008
MD5 Checksum:7dd6f1073862407ce10ab7f834981730

 ///  File Name: koobiproshowimages-sql.txt
Description:
Koobi Pro version 6.25 showimages suffers from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:861
Last Modified:Apr 8 23:36:31 2008
MD5 Checksum:2e86f952a3a202e5d05387489a2317e5

 ///  File Name: kq-admin.txt
Description:
KnowledgeQuest version 2.5 arbitrary add administrator exploit.
Author:t0pp8uzz
File Size:1133
Last Modified:Apr 10 16:08:35 2008
MD5 Checksum:ec0f4f0b0085f8e9ebeb5021b952f616

 ///  File Name: kq-sql.txt
Description:
KnowledgeQuest version 2.6 suffers from multiple SQL injection vulnerabilities.
Author:hadihadi
Homepage:http://www.virangar.org/
File Size:2028
Last Modified:Apr 10 16:58:14 2008
MD5 Checksum:c34a68ed590ca1bb221e7e93180b2a21

 ///  File Name: ksemail-lfi.txt
Description:
Ksemail suffers from a local file inclusion vulnerability in index.php.
Author:dun
File Size:971
Last Modified:Apr 10 17:16:11 2008
MD5 Checksum:d07d4e75885f846d98210e457317ed6c

 ///  File Name: kubelance-lfi.txt
Description:
Kubelance suffers from a local file inclusion vulnerability in ipn.php.
Author:Crackers_Child
File Size:558
Last Modified:Apr 21 17:09:50 2008
MD5 Checksum:c1c5d18ef98a52c90c3040c4d3e7160d

 ///  File Name: kwsphp-exec.txt
Description:
KwsPHP remote code execution exploit that leverages upload functionality.
Author:Ajax
Homepage:http://4j4x.net/
File Size:17964
Last Modified:Apr 14 18:44:50 2008
MD5 Checksum:d221056208fd2e321ac85c0a9e01f57f

 ///  File Name: kwsphparc-sql.txt
Description:
The KwsPHP Archives module suffers from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:1263
Last Modified:Apr 4 17:38:39 2008
MD5 Checksum:5b4c1ef6c0c987e7499439503ae6a9ab

 ///  File Name: kwsphpconcor-sql.txt
Description:
The KwsPHP ConcoursPhoto module suffers from a remote SQL injection vulnerability.
Author:Stack-Terrorist
Homepage:http://v4-team.com/
File Size:889
Last Modified:Apr 4 17:40:35 2008
MD5 Checksum:1a835d7a8abff248f5d7a28f04a32bbe

 ///  File Name: kwsphpgal-sql.txt
Description:
The KwsPHP Galerie module suffers from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:921
Last Modified:Apr 4 17:38:06 2008
MD5 Checksum:f1740ab02d3451700a660b0e1fd75778

 ///  File Name: kwsphpjeux-sql.txt
Description:
The KwsPHP jeuxflash module suffers from a remote SQL injection vulnerability.
Author:H-T Team
Homepage:http://no-hack.fr/
File Size:765
Last Modified:Apr 4 17:39:30 2008
MD5 Checksum:b4a33b8108bb27d767cfb61cac6fa67b

 ///  File Name: landesk-traverse.txt
Description:
LANDesk Management Suite versions 8.80.1.1 and below suffer from a directory traversal vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:1627
Last Modified:Apr 3 01:18:09 2008
MD5 Checksum:49ae26af7308c703bb6ce82ee7fbf4a1

 ///  File Name: lasernetcms-sql.txt
Description:
Lasernet CMS version 1.5 suffers from a remote SQL injection vulnerability.
Author:c02
Homepage:http://www.dz-secure.com/
File Size:698
Last Modified:Apr 15 22:24:19 2008
MD5 Checksum:ba34c8b6cc62515f8997cc28bcb03bd9

 ///  File Name: lightneasy-hash.txt
Description:
LightNEasy version 1.2 remote administrative hash retrieval exploit.
Author:__GiReX__
Homepage:http://girex.altervista.org/
File Size:1982
Last Modified:Apr 11 14:46:16 2008
MD5 Checksum:7b7023ddd21553d6d8fd681944da77c9

 ///  File Name: lightneasy-multi.txt
Description:
LightNEasy SQLite / no database versions 1.2.2 and below suffer from code execution, SQL injection, file disclosure, and other vulnerabilities.
Author:__GiReX__
Homepage:http://girex.altervista.org/
File Size:3523
Last Modified:Apr 15 21:52:54 2008
MD5 Checksum:2e911597b2cae4852cf49dbb4cf6e0c6

 ///  File Name: lightnhard-multi.txt
Description:
LightNEasy version 1.2.2 suffers from cross site scripting, directory traversal, and arbitrary file creation vulnerabilities.
Author:Attila Gerendi
File Size:1375
Last Modified:Apr 18 14:17:42 2008
MD5 Checksum:99a44b61dfac128a58014fe0de832e24

 ///  File Name: links-sql.txt
Description:
Links Directory version 1.1 suffers from a SQL injection vulnerability.
Author:t0pp8uzz,xprog
File Size:1392
Last Modified:Apr 7 23:59:21 2008
MD5 Checksum:4b6941ef5e8f4a62087314e394165412

 ///  File Name: linpha-exec.txt
Description:
LinPHA versions 1.3.2 and below remote command execution exploit.
Author:EgiX
File Size:4737
Last Modified:Apr 8 01:11:23 2008
MD5 Checksum:6e61cfd24e087a3500b27a57c6a95114