Section:  .. / 0602-exploits  /

Page 3 of 7
<< 1 2 3 4 5 6 7 >> Files 50 - 75 of 152
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: evuln.MyQuiz.txt
Description:
MyQuiz 1.01 suffers from a command execution vulnerability.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/57/summary.html
File Size:972
Last Modified:Feb 6 04:38:21 2006
MD5 Checksum:42f7acaf1cd9751503d62356f4bcb54f

 ///  File Name: expl5.txt
Description:
Remote exploit for eXchangepop3 that makes use of a buffer overflow attack.
Author:securma massine
Homepage:http://www.morx.org/
Related File:exchangepop3.txt
File Size:4031
Last Modified:Feb 4 15:41:01 2006
MD5 Checksum:a044616357c53f8ec314838a0d89142e

 ///  File Name: eyeOS089.txt
Description:
eyeOS versions 0.8.9 and below suffer from a remote command execution flaw.
Homepage:http://www.gulftech.org/
File Size:1857
Last Modified:Feb 8 06:20:50 2006
MD5 Checksum:540a336a52918c998c078556aa64a34b

 ///  File Name: eZpublishXSS.txt
Description:
eZ publish versions 3.7.3 and below suffer from cross site scripting flaws.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:953
Last Modified:Feb 26 05:59:17 2006
MD5 Checksum:ab2d214203503739e143e64a1888a525

 ///  File Name: farsiInclusion.txt
Description:
FarsiNews versions 2.1 and below suffer from a remote file inclusion vulnerability.
Author:Hamid Ebadi
Homepage:http://hamid.ir/security
File Size:1303
Last Modified:Feb 2 12:00:10 2006
MD5 Checksum:9c475f3fd5fe557762169d53553da102

 ///  File Name: farsiNews.txt
Description:
FarsiNews versions 2.5 and below suffer from various local file inclusion and direct file access flaws.
Author:Hamid Ebadi
Homepage:http://hamid.ir/security
File Size:1991
Last Modified:Feb 13 07:43:37 2006
MD5 Checksum:bca38a41aa58750435700d49091876b2

 ///  File Name: fckeditor_22_xpl.html
Description:
Shell upload exploit for FCKEditor 2.0 versions 2.2 and below.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:14000
Last Modified:Feb 13 07:18:33 2006
MD5 Checksum:4d08ca4019ea91228301db4421b852be

 ///  File Name: firefox_queryinterface.pm.txt
Description:
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface().
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:5646
Related CVE(s):CVE-2006-0295
Last Modified:Feb 14 08:50:00 2006
MD5 Checksum:a331d364987cfd9feedeb9eeb5761a26

 ///  File Name: firefox_queryinterface_mac.pm.txt
Description:
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface(). Max OS X version.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:5654
Related CVE(s):CVE-2006-0295
Last Modified:Feb 14 08:54:46 2006
MD5 Checksum:0be0c57d21ee5289218310e4269f47de

 ///  File Name: flyspray_097_php5_incl_xpl.html
Description:
FlySpray version 0.9.7 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14634
Last Modified:Feb 14 08:42:27 2006
MD5 Checksum:edcfc76d9d4a66b86c4959ed7c147718

 ///  File Name: Fortinet-url.txt
Description:
It is possible to bypass Fortinet URL blocker by making special HTTP requests. Proof of concept perl script provided.
Author:Mathieu Dessus
File Size:2540
Last Modified:Feb 14 01:36:23 2006
MD5 Checksum:5f931ff8373ea0ff85abc57ef3100446

 ///  File Name: geeklog-1.3.11.txt
Description:
Geeklog is vulnerable to a number of different attacks such as SQL Injection, and arbitrary file inclusion. These attacks can be combined to ultimately execute code on the vulnerable web server in a very reliable manner.
Author:GulfTech Security Research
Homepage:http://www.gulftech.org/?node=research&article_id=00102-02192006
File Size:4908
Last Modified:Feb 22 20:33:09 2006
MD5 Checksum:b8d327eed304a17382aeea3644d954b8

 ///  File Name: gexp-openvmpsd.c
Description:
OpenVMPSd versions 1.3 and below remote format string exploit. Binds a shell to port 31337.
Author:barros, xgc
Homepage:http://gotfault.net/
File Size:8061
Last Modified:Feb 14 08:59:15 2006
MD5 Checksum:9c0d6272bd7bf0b699a00bbb8cac7440

 ///  File Name: gexp-powerd.c
Description:
Power Daemon versions 2.0.2 and below remote format string exploit.
Author:barros, xgc
Homepage:http://gotfault.net/
File Size:9813
Last Modified:Feb 14 09:00:32 2006
MD5 Checksum:bf56b8e1706fc8e7b5799af013ff3a49

 ///  File Name: guestbook06.txt
Description:
Login - Guestbox version 0.6 suffers from cross site scripting and administrative bypass flaws.
Author:l0om
Homepage:http://www.excluded.org
File Size:2771
Last Modified:Feb 25 23:09:24 2006
MD5 Checksum:524976647523d018bdecb03ae121f0db

 ///  File Name: guestbookPHP.txt
Description:
gastbuch versions 1.3.2 and below are susceptible to cross site scripting.
Author:Micha Borrmann
File Size:1092
Last Modified:Feb 14 08:37:21 2006
MD5 Checksum:144ce0b21664236abeb439e709045dc9

 ///  File Name: halfLifeDoS.txt
Description:
Remote denial of service exploit for Half-Life engines that cause it to fall in an infinite loop and stop processing requests.
Author:Firestorm
File Size:1080
Last Modified:Feb 9 06:06:48 2006
MD5 Checksum:66d32b957f64c66400a685f8b6a22b1e

 ///  File Name: hcidump-crash.c
Description:
POC exploit that crashes hcidump by sending bad L2CAP packet.
Homepage:http://www.secuobs.com/news/05022006-bluetooth8.shtml
File Size:1760
Last Modified:Feb 7 21:15:40 2006
MD5 Checksum:bfca67cf0f341020a9dbf4b6eaf9e79b

 ///  File Name: HiveMail-1.3.txt
Description:
HiveMail versions less than or equal to 1.3 suffer from multiple vulnerabilities including SQL injection and remote code execution.
Author:GulfTech Security Research
Homepage:http://www.gulftech.org/?node=research&article_id=00098-02102006
File Size:3946
Last Modified:Feb 13 09:44:56 2006
MD5 Checksum:12a67fb719e9529ba6186498beb050e0

 ///  File Name: HotmailCookieXploit.txt
Description:
Hotmail/MSN cross site scripting exploit.
Author:Simo Ben youssef
File Size:7107
Last Modified:Feb 26 05:52:58 2006
MD5 Checksum:b87ded6d6ee6ee2ea0ef065c9c27d979

 ///  File Name: htmlws.c
Description:
Microsoft HTML Help Workshop .hhp file compiled file header buffer overflow exploit.
Author:k3xji, darkeagle
Homepage:http://www.guvenliklab.com
File Size:2196
Last Modified:Feb 14 08:56:43 2006
MD5 Checksum:2209e4c4bd89df614b3e6c8b6b192f0f

 ///  File Name: HYSA-2006-003.txt
Description:
HYSA-2006-003 h4cky0u.org Advisory 012 - Oi! Email Marketing version 3.0 is susceptible to SQL injection attacks.
Author:Illuminatus
Homepage:http://www.h4cky0u.org
File Size:2296
Last Modified:Feb 26 04:56:06 2006
MD5 Checksum:9109bf4ab6e816ee8bfcfad1e0d171be

 ///  File Name: icqmailXSS.txt
Description:
ICQmail.com and Mail2World.com suffer from cross site scripting flaws.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1333
Last Modified:Feb 26 05:58:29 2006
MD5 Checksum:c3fee6f7605d4b6c0b0ed69706cf3e4e

 ///  File Name: igenus_remote.txt
Description:
iGENUS WebMail versions 2.0.2 and below remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:2080
Last Modified:Feb 26 06:15:24 2006
MD5 Checksum:7f5249c4a254c90842c0495c2fadd6bc

 ///  File Name: imageVue16.1.txt
Description:
The upload script in ImageVue 16.1 does not perform proper checking, thus allowing an attacker to upload a file to any writable directory.
Author:zjieb
File Size:887
Last Modified:Feb 13 09:54:22 2006
MD5 Checksum:ac2fd08ac3d1f1bf95a207cbda525b77