Section:  .. / 0507-exploits  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 92
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: CMSimpleXSS.txt
Description:
CMSimple versions 2.4 and below are susceptible to cross site scripting attacks. Exploitation details provided.
Author:Lostmon
File Size:2438
Last Modified:Jul 21 18:08:02 2005
MD5 Checksum:d9db787f4ba0a912fd6df82362a74ed5

 ///  File Name: mfsa2005-47exploit.txt
Description:
Mozilla Firefox versions 1.0.4 and below 'Set As Wallpaper' code execution exploit.
Author:Michael Krax
File Size:2186
Last Modified:Jul 15 07:40:55 2005
MD5 Checksum:4edb4b62ae413afc0a51e8a7fc4eb985

 ///  File Name: phpeasynews.html
Description:
Phpeasynews version 1.13 RC2 is susceptible to cross site scripting, path disclosure, and user check bypass vulnerabilities.
Author:rgod
Homepage:http://www.rgod.altervista.org/
File Size:2144
Last Modified:Aug 5 07:54:05 2005
MD5 Checksum:88d33b4f87015b77fdc764fd3c416ee1

 ///  File Name: beehiveVulns.txt
Description:
Beehive Forum is susceptible to cross site scripting, SQL injection, and path disclosure vulnerabilities.
Author:tgo
File Size:2052
Last Modified:Jul 28 07:41:52 2005
MD5 Checksum:bfd0c8a2c6531cd60da87cd3fb4944e6

 ///  File Name: 47slimftpd_bof.pl.txt
Description:
SlimFTPd 3.16 remote proof of concept exploit.
Author:Raphael Rigo
Related File:SlimFTPd316.txt
File Size:1999
Last Modified:Jul 23 18:19:02 2005
MD5 Checksum:2e7eb9c4b2ae73c39b60f185bec85026

 ///  File Name: netmandos.cpp
Description:
Microsoft Windows Netman server local denial of service exploit.
Author:bkbll
File Size:1953
Last Modified:Jul 15 07:21:26 2005
MD5 Checksum:30bb8a646a6adde4d55b3bcb5facb686

 ///  File Name: mfsa2005-55exploit.txt
Description:
Mozilla Firefox and Suite setWallpaper() remote code execution exploit.
Author:moz_bug_r_a4
File Size:1950
Last Modified:Jul 15 07:38:33 2005
MD5 Checksum:4d5111f77186d80bb31b528dcc51e96c

 ///  File Name: FTPshellDoS.txt
Description:
Logging into FTPshell server version 3.38 will cause the ftpshelld.exe process to die, resulting in a denial of service.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/
File Size:1863
Last Modified:Jul 28 08:05:09 2005
MD5 Checksum:ac2ac8e4a10f4136e3188793d8eb0872

 ///  File Name: hostingCreate.txt
Description:
Hosting Controller allows for unauthenticated session and user creation.
Author:kehieuhoc
File Size:1778
Last Modified:Jul 12 16:39:11 2005
MD5 Checksum:25c4c6f75be02b08237ed5dd01f1f5c6

 ///  File Name: phpsource.traverse.txt
Description:
The Quick and Dirty PHPSource Printer version 1.0 is susceptible to a directory traversal attack. Exploitation provided.
Author:Seth Alan Woolley
File Size:1732
Last Modified:Jul 7 09:51:30 2005
MD5 Checksum:054dab738a266804cb82dea256d5ab2f

 ///  File Name: idboard113SQL.txt
Description:
ID Board 1.1.3 is susceptible to a SQL injection vulnerability. Exploitation details provided.
Author:defa
File Size:1731
Last Modified:Jul 12 16:20:14 2005
MD5 Checksum:5abbe8873515204ab27ffcd8e881b683

 ///  File Name: netquery31.txt
Description:
netquery 3.1 allows for remote command execution, cross site scripting, and information disclosure attacks. Detailed exploitation provided.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:1718
Last Modified:Jul 22 09:04:10 2005
MD5 Checksum:1142d8a9552c58a851ee7f6b12d8d3af

 ///  File Name: eventum.pl.txt
Description:
MySQL AB Eventum versions 1.5.5 and below proof of concept SQL injection exploit.
Author:James Bercegay
Homepage:http://www.gulftech.org
Related Exploit:mysqlEventum.txt"
File Size:1700
Last Modified:Aug 5 07:56:55 2005
MD5 Checksum:e5b1ffe7254aad864d06c87eebd15e8f

 ///  File Name: myguestbook_advisory.txt
Description:
MyGuestbook version 0.6.1 suffers from a remote code execution vulnerability. Detailed exploitation provided.
Author:SoulBlack Security Research
Homepage:http://soulblack.com.ar
File Size:1678
Last Modified:Jul 7 10:40:49 2005
MD5 Checksum:492c6b5f3b4e3cd56209422f948ae609

 ///  File Name: phpbb2015.py.txt
Description:
php 2.0.15 remote command execution exploit for viewtopic.php. Written in Python.
Author:rattle
File Size:1661
Last Modified:Jul 7 09:14:48 2005
MD5 Checksum:4938584821c2e832604dc49ae8616f04

 ///  File Name: BusMail_SMTPDOS.pl.txt
Description:
A buffer overflow in BusinessMail email server system 4.60.00 allows for a denial of service attack. Proof of concept exploit included.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/
File Size:1626
Last Modified:Aug 5 08:01:34 2005
MD5 Checksum:f3fa06fa76a7d8c2d9706b6e4b130403

 ///  File Name: blogtorrent092.txt
Description:
BlogTorrent versions 0.92 and below allow for direct access to the file storing users' password hashes and logins.
Author:LazyCrs, pjphem
File Size:1624
Last Modified:Jul 12 16:48:36 2005
MD5 Checksum:4da758b9fa72d9db2e2536418981f646

 ///  File Name: kshoutaxs.txt
Description:
Kshout versions 2.x and 3.x allow for direct file access to their configuration files.
Author:SoulBlack
Homepage:http://soulblack.com.ar
File Size:1603
Last Modified:Aug 5 07:41:55 2005
MD5 Checksum:fd54c77c253ed96ef9fbab2190066717

 ///  File Name: cleverXSS.txt
Description:
Clever copy versions 2.0 and 2.0a suffer from a cross site scripting flaw in calendar.php.
Author:Lostmon
File Size:1581
Last Modified:Jul 15 18:27:02 2005
MD5 Checksum:9b71a40636684cfd2a1a5a36db8be71d

 ///  File Name: altn-mdaemon.txt
Description:
Multiple remote vulnerabilities exist in ALT-N MDaemon's imapd that include two denial of service vulnerabilities and a buffer overflow in the CREATE statement.
Author:kcope
File Size:1578
Last Modified:Jul 19 16:45:44 2005
MD5 Checksum:01134c83cdacabe9dc7b4bf0e10e48ee

 ///  File Name: ZH2005-14SA.txt
Description:
Multiple problems exist on support.msn.com, permitting to a possible attacker to conduct phishing attacks against a user.
Author:Giovanni Delvecchio
Homepage:http://www.zone-h.org
File Size:1541
Last Modified:Jul 2 01:50:59 2005
MD5 Checksum:b5c67526c566a57939a7b3f9d1a5185b

 ///  File Name: kpopper10.txt
Description:
kpopper versions 1.0 and below suffer from an insecure temporary file creation vulnerability. Exploit included.
Author:Eric Romang
Homepage:http://www.zataz.net/
File Size:1530
Last Modified:Jul 7 10:07:07 2005
MD5 Checksum:22369ea4a48f2e5c26fc9a5c9ee0e9ab

 ///  File Name: phpnews.html
Description:
PHP News Manager versions 1.45 through 1.47 are susceptible to login bypass, SQL injection, cross site scripting and path disclosure flaws.
Author:rgod
Homepage:http://rgod.altervista.org/
File Size:1529
Last Modified:Aug 5 07:07:04 2005
MD5 Checksum:f6ac2b10357b4417f4691d349a47b070

 ///  File Name: wms_poc.pl.txt
Description:
SoftiaCom's wMailserver version 1.0 remote denial of service exploit.
Author:fRoGGz
File Size:1517
Last Modified:Jul 13 08:44:35 2005
MD5 Checksum:db53312822f03753ee24a07bbf2d64b8

 ///  File Name: ECIrouter.txt
Description:
The ECI B-FOCuS router 312+ allows a remote, unauthenticated attacker the ability to download the configuration file containing the system passwords in clear text.
Author:D
File Size:1419
Last Modified:Jul 28 07:37:16 2005
MD5 Checksum:86a3d0646afa2279f429cefb4e617e67