Section:  .. / 0505-exploits  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 149
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: DSL-504T.txt
Description:
The DSL-504T D-Link router allows for user authentication bypass.
Author:Alessandro Audero
File Size:2272
Last Modified:Aug 15 00:20:35 2005
MD5 Checksum:c1fde8173df26f4825a68bad081f7d4d

 ///  File Name: invision203Login.pl.txt
Description:
Invision Power Board versions 2.0.3 and below Login.PHP SQL injection exploit.
Author:Tony Little Lately, Petey Beege
File Size:2216
Last Modified:May 27 07:42:42 2005
MD5 Checksum:e9c22ab586524a017c5eab7d4912d4f0

 ///  File Name: easymsgb_advisory.txt
Description:
Easy Message Board suffers from a remote directory traversal and code execution flaw.
Homepage:http://www.soulblack.com.ar
File Size:2114
Last Modified:Aug 7 08:12:47 2005
MD5 Checksum:d7499b0e14aaaf7c5aadb419771a82b3

 ///  File Name: UltimatePHPBoard.txt
Description:
Ultimate PHP Board (UPB) versions 1.8 through 1.9.6 suffer from HTML and SQL injection flaws.
Author:Morinex
File Size:2091
Last Modified:Aug 7 09:19:53 2005
MD5 Checksum:6de7083474e0a548359b9581a793c32f

 ///  File Name: quickCart.txt
Description:
QuickCart version 0.3.0 is susceptible to cross site scripting and SQL injection attacks.
Author:Lostmon
File Size:2069
Last Modified:Aug 7 08:50:44 2005
MD5 Checksum:add403d368191a13dc8677f3721d50fd

 ///  File Name: raidenftpdTraverse.txt
Description:
RaidenFTPD versions below 2.4.2241 allow for a directory traversal attack via urlget.
Author:Lachlan. H
File Size:2041
Last Modified:Jul 2 03:15:53 2005
MD5 Checksum:081190cf221cb7d0438bccf07c920ea0

 ///  File Name: postnukeInclusion.txt
Description:
Postnuke versions 0.750 through 0.760rc4 suffer from a local file inclusion flaw.
Author:pokley
File Size:1995
Last Modified:May 27 07:16:16 2005
MD5 Checksum:c7bf3e85f259547ac562e3a9fb60225f

 ///  File Name: invisionCookie.pl.txt
Description:
SQL injection exploit for Invision Power Board versions 1.x and 2.x that allows for valid cookie retrieval.
Author:Tony Little Lately, Petey Beege
File Size:1954
Last Modified:Aug 15 00:08:22 2005
MD5 Checksum:1cdd2bd1f5decde80384fe4d0a2c071c

 ///  File Name: maxwebportal136-2.txt
Description:
Maxwebportal versions 1.36 and below password.asp Change Password exploit using php.
Author:s d
File Size:1931
Last Modified:May 27 07:45:16 2005
MD5 Checksum:302aa48df93961153e18933592ec3faf

 ///  File Name: NukeETXSS.txt
Description:
NukeET versions prior to 3.2 are susceptible to cross site scripting.
Author:Lostmon
File Size:1906
Last Modified:Aug 7 08:38:55 2005
MD5 Checksum:ac1e4b2416162350a85b8f0734edbe4b

 ///  File Name: hpuxFTPd112144.c
Description:
HP-UX ftpd versions 1.1.214.4 and below REST remote brute force exploit.
Author:phased
File Size:1893
Last Modified:May 27 06:42:41 2005
MD5 Checksum:847b9081f154787d62abd73b02b63645

 ///  File Name: f3r4.txt
Description:
INMOLUXE Premium 2.0 is susceptible to SQL injection attacks.
Author:F3R4_R4PP3R
File Size:1842
Last Modified:Aug 14 10:16:15 2005
MD5 Checksum:0a200f78eefdacbf9b0bd4836fddb430

 ///  File Name: mybloggie.pl.txt
Description:
SQL injection exploit for myBloggie versions 2.1.1 through 2.1.2.
Author:Alberto Trivero
Related File:codebug-9.txt
File Size:1835
Last Modified:Aug 15 00:39:55 2005
MD5 Checksum:e8e2d46a8f65e4d55ff93b8524f884bb

 ///  File Name: PowerDownloadExec.txt
Description:
PowerDownload versions 3.0.2 and 3.0.3 suffer from remote file inclusion and arbitrary code execution flaws.
Homepage:http://soulblack.com.ar
File Size:1800
Last Modified:Aug 15 01:10:10 2005
MD5 Checksum:159b4c127f500730bc9414ca9ac4e6ef

 ///  File Name: dc_metacart_sqling.txt
Description:
Multiple SQL injection vulnerabilities in metacart2 for payflow. Example exploit URL included in advisory.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:1710
Last Modified:May 7 17:44:18 2005
MD5 Checksum:36ed40131025266df8227f13f7a39b67

 ///  File Name: hosting061.txt
Description:
Hosting Controller versions 0.6.1 and below unauthenticated user registration exploit.
File Size:1664
Last Modified:May 27 06:44:03 2005
MD5 Checksum:1be4ab8d6be384bde9bb82d9238ddb69

 ///  File Name: firefoxSploit-2.txt
Description:
Mozilla Suite and Firefox script objections command execution exploit.
Author:moz_bug_r_a4
File Size:1649
Last Modified:May 27 07:39:41 2005
MD5 Checksum:968300b6c9f85deacba9a7890c01eeb6

 ///  File Name: Skull-splitter_adv.txt
Description:
Skull-Splitter's Guestbook is susceptible to cross site scripting and html injection flaws.
Author:Morinex Eneco
Homepage:http://w00pie.nl
File Size:1617
Last Modified:Aug 14 07:18:26 2005
MD5 Checksum:dd753ddfc2dcca01e410a7ebd06bfaa5

 ///  File Name: nexusway.txt
Description:
Neteyes Nexusway is susceptible to remote command execution flaws.
Author:pokley
File Size:1602
Last Modified:Aug 7 08:46:53 2005
MD5 Checksum:794ccb0c0a6d02aab8744f5daa3737a8

 ///  File Name: jawsGlossary.txt
Description:
Jaws Glossary version 0.4 through 0.5.1 suffer from cross site scripting flaws.
Author:Paulino Calderon
Homepage:http://nah.suckea.com/
File Size:1594
Last Modified:Aug 15 00:53:50 2005
MD5 Checksum:bf422f6a1a2633f0d57847877c7c73bf

 ///  File Name: simplecam12.txt
Description:
SimpleCam 1.2 suffers from a directory traversal flaw.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1563
Last Modified:Aug 6 08:54:10 2005
MD5 Checksum:efa8b935cd345212fecb783cb0ced6f0

 ///  File Name: dt_Multiple_vuln.txt
Description:
Directtopics versions 2 beta, DT2 final, 2.1, and 2.2 suffer from SQL injection and cross site scripting flaws, amongst others.
Author:Morinex
File Size:1544
Last Modified:Aug 7 08:10:36 2005
MD5 Checksum:46c49b0024e2d2d17ae67a14fdfd5781

 ///  File Name: phpPoll.txt
Description:
PHP Poll Creator version 1.01 is susceptible to a remote file inclusion vulnerability.
Author:rash
Homepage:http://www.svt.nukleon.us
File Size:1517
Last Modified:Aug 14 22:44:47 2005
MD5 Checksum:f188026876e79f14353cfb5a8db70547

 ///  File Name: serverscheck.html
Description:
Serverscheck Monitoring Software versions 5.9.0 through 5.10.0 suffer from directory traversal bugs.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:1479
Last Modified:Aug 15 00:33:09 2005
MD5 Checksum:ad3825807573321e34d43ecc46580de5

 ///  File Name: maxwebportal136-1.txt
Description:
Maxwebportal versions 1.36 and below password.asp Change Password exploit using html.
Author:Soroush Dalili
File Size:1410
Last Modified:May 27 07:43:57 2005
MD5 Checksum:b68ee3614c49826f12f1b68c0251ad82