Section:  .. / 0509-exploits  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 78
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: flatnuke256.txt
Description:
FlatNuke version 2.5.6 suffers from directory traversal, cross site scripting, and path disclosure flaws. Detailed exploitation provided.
Author:rgod
Homepage:http://www.rgod.altervista.org/
File Size:1094
Last Modified:Sep 1 08:18:47 2005
MD5 Checksum:ef2acec961bba663e45f93a3be00e275

 ///  File Name: freeSMTP.pl.txt
Description:
Proof of concept exploit for the Free SMTP server versions 2.2 and below spam filter vulnerability.
Homepage:http://nfamous.2hell.com/
File Size:2339
Last Modified:Sep 7 09:00:00 2005
MD5 Checksum:61087dc9d7f27d06ec3546b22ef58928

 ///  File Name: froxRead.txt
Description:
frox is susceptible to an arbitrary file reading vulnerability.
Author:c1zc0
Homepage:http://c1zc0.com/
File Size:986
Last Modified:Sep 5 08:28:29 2005
MD5 Checksum:a8c2c3678e6149edaf495a8ec325ed5e

 ///  File Name: GeSHi.txt
Description:
GeSHi version 1.0.72 is susceptible to a local file inclusion vulnerability.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:3120
Last Modified:Sep 26 07:17:14 2005
MD5 Checksum:f1aa4004e9b285d93d41b03809a4bab1

 ///  File Name: greymatterXSS.txt
Description:
The Greymatter web log is susceptible to cross site scripting attacks due to a lack of sanitizing user input variables.
Homepage:http://www.securityinfo.ru
File Size:1665
Last Modified:Sep 1 08:22:35 2005
MD5 Checksum:5414bda33084e874c1fc5d1fec45ab83

 ///  File Name: httpXSS.txt
Description:
Orion 1.3.8, 1.4.5, and CompaqHTTPServer 2.1 all fail to sanitize user supplied data when providing a 404 response with the information, allowing for cross site scripting attacks.
Author:Josh Zlatin-Amishav
File Size:260
Last Modified:Sep 22 07:36:47 2005
MD5 Checksum:dbaf85767533b85956050aa8316b63b3

 ///  File Name: HYA-2005-008-alstrasoft-epay-pro.tx..>
Description:
Alstrasoft Epay Pro versions 2.0 and below suffer from a directory traversal vulnerability. Exploitation details provided.
Author:GeMe-GeMeS
Homepage:http://www.h4cky0u.org
File Size:1693
Last Modified:Sep 22 08:52:57 2005
MD5 Checksum:5ecd27e84eb62f836a70722f165d85bd

 ///  File Name: imap4d_FreeBSD_exploit.c
Description:
GNU Mailutils version 0.6 imap4d 'search' format string exploit. Written to be used against FreeBSD.
Author:Johnny Mast, Angelo Rosiello
Homepage:http://www.rosiello.org/
Related File:09.09.05.txt
File Size:12843
Last Modified:Sep 29 03:59:21 2005
MD5 Checksum:642b5fb9f407325048f6e9666e719172

 ///  File Name: jPortalSQL.txt
Description:
jPortal versions 2.2.1 through 2.3.1 suffer from a SQL injection vulnerability. Exploitation details provided.
Author:krasza
Homepage:http://www.krewniacy.pl
File Size:1180
Last Modified:Sep 24 03:55:03 2005
MD5 Checksum:7e6fd7142e87e934196bf671c73c2b53

 ///  File Name: lucidCMS.txt
Description:
lucidCMS version 1.0.11 is susceptible to a cross site scripting flaw. Exploitation details provided.
Author:X1ngBox
File Size:523
Last Modified:Sep 28 00:56:00 2005
MD5 Checksum:f332478664fc332178c3e9ebd169085b

 ///  File Name: maildisgust.txt
Description:
MailGust 1.9 is vulnerable to a SQL injection attack that allows for board takeover. Exploit provided.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:9176
Last Modified:Sep 26 06:49:54 2005
MD5 Checksum:2af5368ea3e4eb646f7368060ac87c62

 ///  File Name: mailitnow.html
Description:
The contact.php code from Mail-it Now! version 1.5 is susceptible to a remote code execution flaw. Exploit included.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:9660
Last Modified:Sep 13 08:51:07 2005
MD5 Checksum:8a4541ed8f9025712b62efe9c1989d31

 ///  File Name: mall23.txt
Description:
Mall23 is vulnerable to a SQL injection attack in AddItem.asp. Versions below 4.11 are susceptible.
Author:David Sopas Ferreira
File Size:1714
Last Modified:Sep 23 08:48:01 2005
MD5 Checksum:b5930d3085f3fa34e7ba1f5e486a1080

 ///  File Name: mantis-poc.tar.gz
Description:
Mantis Bugtracker exploit scanner that looks for versions less than 1.0.0RC2 and greater than 0.18.3 which are vulnerable to XSS and variable poisoning attacks if register_globals is enabled.
Author:Joxean Guay del Paraguay
Related Exploit:mantis-poc.txt"
File Size:1893
Last Modified:Sep 29 05:46:09 2005
MD5 Checksum:0f28dffbd3d89ef328aab25d1033fb7b

 ///  File Name: mantis-poc.txt
Description:
Mantis Bugtracker versions less than 1.0.0RC2 and greater than 0.18.3 are vulnerable to XSS and variable poisoning attacks if register_globals is enabled.
Author:Joxean Guay del Paraguay
Related Exploit:mantis-poc.tar.gz"
File Size:10303
Last Modified:Sep 29 05:37:57 2005
MD5 Checksum:d3137f93b98019ab086082b975926888

 ///  File Name: mercury_imap.c
Description:
Mercury Mail IMAP server versions 4.01a and below remote buffer overflow exploit.
Author:c0d3r
Homepage:http://www.ihsteam.com
File Size:9314
Last Modified:Sep 23 07:56:20 2005
MD5 Checksum:071e805167e5cc006d1d151ea6d12887

 ///  File Name: midicartInject.txt
Description:
MidiCart ASP Shopping Cart, evaluation/standard/pro versions 7, are susceptible to cross site scripting and SQL injection attacks.
Author:John Cobb
Homepage:http://www.NoBytes.com
File Size:1459
Last Modified:Sep 7 06:49:45 2005
MD5 Checksum:24e7ca324c0390f45bfc77653b3b3222

 ///  File Name: mivaXSS.txt
Description:
A vulnerability has been reported in MIVA Merchant, which can be exploited by malicious people to conduct cross-site scripting attacks.
File Size:855
Last Modified:Sep 22 07:24:14 2005
MD5 Checksum:7e8e6abcab582f5b254e3e1a7dce5a8b

 ///  File Name: mkZebedeeDoS.c
Description:
Zebedee 2.4.1 is susceptible to a denial of service attack when receiving a zero as a port number in the protocol option header. Sample exploit is provided.
Author:Mitsuaki Shiraishi, Tomoki Sanaki, Mutallip Ablimit
File Size:2154
Last Modified:Sep 13 08:39:48 2005
MD5 Checksum:602aabf1e44b2c2568c22b1b45e58eac

 ///  File Name: ms05-018.c
Description:
MS05-018 windows CSRSS.EXE stack overflow local exploit version 1.0. Systems affected: Windows 2000 SP3/SP4 (all languages).
Author:eyas
Homepage:http://www.xfocus.net/
File Size:5853
Last Modified:Sep 7 08:57:25 2005
MD5 Checksum:4fb30891a7dbd3754cf3c85610729680

 ///  File Name: mtaboom.zip
Description:
Proof of concept exploit for MultiTheftAuto versions 0.5 patch 1 and below. This causes Windows to crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:mtaboom.txt
File Size:6271
Last Modified:Sep 26 07:39:39 2005
MD5 Checksum:99976b5912749ccd7466e53d66e16d27

 ///  File Name: MyBBPR2.txt
Description:
SQL injection exploit for MyBB PR2
Author:stranger-killer
File Size:404
Last Modified:Sep 8 05:32:15 2005
MD5 Checksum:cd9f735b64bb72ddccd074a3c0ff4aa2

 ///  File Name: mybbXSS.txt
Description:
All versions of MyBB suffer from cross site scripting attacks.
Author:robokoder
File Size:1141
Last Modified:Sep 7 08:45:19 2005
MD5 Checksum:bf18c9d0c91614f1c04bd48b6039f24d

 ///  File Name: mylittle15_16b.txt
Description:
My Little Forum 1.5 SQL injection exploit that retrieves an md5 password hash.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:8164
Last Modified:Sep 23 08:38:47 2005
MD5 Checksum:c59af767c4a1416bec0a1e0907d82cb4

 ///  File Name: noahSQLXSS.txt
Description:
Noah's Classifieds are vulnerable to SQL injection and cross site scripting attacks. Flaws have been tested against version 1.3, others are possibly susceptible.
Author:trueend5
File Size:2198
Last Modified:Sep 22 07:35:16 2005
MD5 Checksum:57eb733a6a38d31506bc9cd201c588a8