Section:  .. / 0503-exploits  /

Page 6 of 6
<< 1 2 3 4 5 6 >> Files 125 - 142 of 142
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: simpgbSQL.txt
Description:
SimpGB from Boesch IT-Consulting is susceptible to a SQL injection attack.
Author:visus
File Size:991
Last Modified:Mar 17 08:08:41 2005
MD5 Checksum:f21faa133e650a81c877189a42b17c9c

 ///  File Name: phpmcnews13.txt
Description:
PHP mcNews version 1.3 is susceptible to an arbitrary file inclusion flaw.
Author:Filip Groszynski
Homepage:http://shell.homeunix.org
File Size:987
Last Modified:Mar 15 05:38:54 2005
MD5 Checksum:0f8e95db89039b6974280302a757144c

 ///  File Name: eth0day.c
Description:
Exploit for the Ethereal 3G-A11 dissector remote buffer overflow vulnerability. All versions that have support for the 3G-A11 dissector are affected up to version 0.10.9.
Author:Leon Juranic
Homepage:http://security.lss.hr/en/
Related File:LSS-2005-03-04.txt
File Size:973
Last Modified:Mar 15 05:55:52 2005
MD5 Checksum:a441e0b038a18e8111f7bdd0a8a8402f

 ///  File Name: ACSblog111.txt
Description:
ACS Blog version 1.1.1 is susceptible to multiple cross site scripting attacks.
Author:Dan Crowley
File Size:915
Last Modified:Mar 29 08:12:09 2005
MD5 Checksum:57849662df466151336be8e56f7b2d01

 ///  File Name: includercgi.txt
Description:
The Includer is susceptible to a classic directory traversal flaw.
Author:cout
File Size:908
Last Modified:Mar 22 06:51:49 2005
MD5 Checksum:f00b6976e57e90bcad4e40829c7116f4

 ///  File Name: vortex.txt
Description:
The Vortex Portal is susceptible to a remote file inclusion vulnerability.
Author:Dominus Vis
File Size:894
Last Modified:Mar 24 07:01:01 2005
MD5 Checksum:966e906c82963047f5b074fca315e8fe

 ///  File Name: phpMyFamily140.txt
Description:
phpMyFamily version 1.4.0 is susceptible to SQL injection attacks. Proof of concept included.
Author:kreon
Homepage:http://adz.void.ru/
File Size:887
Last Modified:Mar 22 16:21:55 2005
MD5 Checksum:83f6ea22f5ac9250fd29761f0cd5750d

 ///  File Name: foros32.txt
Description:
FOROS version 3.2 allows for account compromise by changing the username and forumid in a cookie to someone else's.
Author:Black Angel
File Size:879
Last Modified:Mar 4 05:39:12 2005
MD5 Checksum:0719f7a4d7744c6076f3ed3194c1aacc

 ///  File Name: getr00t.sh
Description:
This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.
Author:ri0t
Related File:12.20.04-1.txt
File Size:701
Related OSVDB(s):12531
Related CVE(s):CAN-2004-1054
Last Modified:Mar 25 17:38:20 2005
MD5 Checksum:2c24407cabeaf323f2d9de28c288acfc

 ///  File Name: mailenable.tar.gz
Description:
Denial of service exploit that makes use of a format string vulnerability in MailEnable Standard Edition 1.8.
Author:Mati Aharoni
Homepage:http://www.see-security.com
File Size:603
Last Modified:Mar 22 07:00:01 2005
MD5 Checksum:d359cd11dc5351aa169b3cce17f5410c

 ///  File Name: phpMyDirectory1013.txt
Description:
phpMyDirectory version 10.1.3-rel is susceptible to a classic cross site scripting bug.
Author:mircia
File Size:599
Last Modified:Mar 26 00:34:38 2005
MD5 Checksum:6b4e7fd7dc643687862c7e27a87e0adf

 ///  File Name: oracleXSS10g.txt
Description:
The Oracle Reports Server 10.g (9.0.4.3.3) is susceptible to cross site scripting attacks in an example jsp.
Author:Paolo
File Size:394
Last Modified:Mar 25 06:23:55 2005
MD5 Checksum:daab618212007a31361ddc2208b57c02

 ///  File Name: knowledgeBuilder.txt
Description:
KnowledgeBuilder from ActiveCampaign Inc. is susceptible to a remote file inclusion flaw.
Author:Dominus_Vis
File Size:327
Last Modified:Mar 17 07:33:45 2005
MD5 Checksum:607d9b336b229869f16df6d9fddebd21

 ///  File Name: eXPerience2.txt
Description:
eXPerience2 suffers from remote file inclusion and path disclosure flaws.
Author:Francisco Alisson
File Size:325
Last Modified:Mar 15 05:47:47 2005
MD5 Checksum:73628d6dd20afa74b1217a0b384552e3

 ///  File Name: includerExec.txt
Description:
The Includer is susceptible to a remote command execution flaw.
Author:Francisco Alisson
File Size:275
Last Modified:Mar 15 05:19:50 2005
MD5 Checksum:3de883cdaf8d1cffca5cc39f71c749fb

 ///  File Name: osCommerce2.txt
Description:
osCommerce versions 2.x suffer from a directory traversal attack that allows for access to directories outside of the webroot. Besides using the download action, the read action is also usable.
Author:Megasky
File Size:246
Last Modified:Mar 24 06:46:58 2005
MD5 Checksum:bba5fef32c2d3ad380a12417f41d46de

 ///  File Name: aspjarXSS.txt
Description:
ASPjar Tell-a-Friend is susceptible to a cross site scripting attack.
Author:farhad koosha
File Size:228
Last Modified:Mar 22 06:35:37 2005
MD5 Checksum:f76c7b11c996f70f1a193f766746e9de