Section:  .. / 0602-exploits  /

Page 5 of 7
<< 1 2 3 4 5 6 7 >> Files 100 - 125 of 152
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: NSAG-201-25.02.2006.txt
Description:
NSA Group Advisory - SPiD version 1.3.1 suffers from a classic directory traversal flaw.
Homepage:http://www.nsag.ru/
File Size:1107
Last Modified:Feb 26 05:55:19 2006
MD5 Checksum:fb2c7f7b0a9e482e7b6e02404373198e

 ///  File Name: NSAG-202-25.02.2006.txt
Description:
NSA Group Advisory - Website Generator version 3.3 suffers from an arbitrary remote PHP file inclusion flaw.
Homepage:http://www.nsag.ru/
File Size:985
Last Modified:Feb 26 05:46:42 2006
MD5 Checksum:7804124a6a7b0e99f86a6ee674060f9c

 ///  File Name: nukedXSS.txt
Description:
Nuked-klaN suffers from a cross site scripting vulnerability in index.php.
Author:Night_Warrior
File Size:277
Last Modified:Feb 2 11:14:02 2006
MD5 Checksum:8e5a5bbe155a4c9efdd585c6b47def5b

 ///  File Name: oprofile.txt
Description:
OProfile versions 0.9.1 and below suffer from an insecure path vulnerability that allows for privilege escalation.
Author:Luis Miguel Ferreira da Silva
File Size:2343
Last Modified:Feb 8 06:18:05 2006
MD5 Checksum:de21c1464c1dae6ec3fe4ad71c8e36c0

 ///  File Name: PentacleBypass.txt
Description:
Pentacle In-Out Board versions 6.03 and below suffer from a SQL injection flaw in login.asp that allows for authentication bypass.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:860
Last Modified:Feb 26 05:56:44 2006
MD5 Checksum:ebfc4d1823dd0b1a3a33ba4e0fef444d

 ///  File Name: PentacleSQL.txt
Description:
Pentacle In-Out Board versions 6.03 and below suffer from a SQL injection flaw in newsdetailsview.asp.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1035
Last Modified:Feb 26 05:57:38 2006
MD5 Checksum:fef12d62b3fe84a2836fd1b5c31d4c67

 ///  File Name: phpBB2.0.19.txt
Description:
phpBB 2.0.19 suffers from several Cross Site Request Forgeries and XSS vulnerabilities. Detailed exploitation provided.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/achievement_securityalert/31
File Size:6581
Last Modified:Feb 6 04:26:14 2006
MD5 Checksum:c749fb7426de02ec663c1d01fb5e9a3a

 ///  File Name: PHPClassifieds.txt
Description:
PHP Classifieds version 6.2 and lower suffer from an authentication bypass vulnerability.
Author:Audun Larsen
File Size:1438
Last Modified:Feb 15 00:38:14 2006
MD5 Checksum:aee4bd6d2912e9bc74b9c164000f48b0

 ///  File Name: phpkit_161r2_incl_xpl.txt
Description:
PHPKit v.1.6.1 release 2 remote code execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:11241
Last Modified:Feb 20 23:02:09 2006
MD5 Checksum:c74559bd973108f43a4f289ace75750b

 ///  File Name: PHPNuke-sp3x.c
Description:
PHPNuke versions 7.8 and below remote SQL injection exploit that makes use of the vulnerability in the Your_Account module.
Author:sp3x
Homepage:http://www.securityreason.com/
File Size:3447
Last Modified:Feb 25 02:17:20 2006
MD5 Checksum:ae7a89cb77d6ee2b1f417f96db41addd

 ///  File Name: PHPNuke-Your_Account.txt
Description:
PHPNuke version 7.8 "Your_Account" SQL injection exploit.
Author:sp3x
Homepage:http://securityreason.com/achievement_exploitalert/7
File Size:11206
Last Modified:Feb 22 21:39:27 2006
MD5 Checksum:2a7cde876d2a3e35d794920dfbb5dcb8

 ///  File Name: PluggedOut-1.9.9c.txt
Description:
PluggedOut Blog Version: 1.9.9c suffers from SQL injection and XSS.
Author:Hamid Network Security Team
Homepage:http://hamid.ir/security/
File Size:1092
Last Modified:Feb 6 04:47:23 2006
MD5 Checksum:72abe0abba2d252be06af293b28c8aa4

 ///  File Name: PunBB1.2.10.txt
Description:
PunBB 1.2.10 database flooding Denial of Service exploit.
Author:[NST]
Homepage:http://www.neosecurityteam.net/advisories/Advisory-16.txt
File Size:16570
Last Modified:Feb 22 20:21:50 2006
MD5 Checksum:cb4ca4d6279339ddcef1c475822df27b

 ///  File Name: RCblog.xpl
Description:
RCBlog 1.0.3 and 1.0.2 password disclosure exploit.
Author:Hessam-x
Homepage:http://www.hessamx.net
File Size:914
Last Modified:Feb 22 20:16:29 2006
MD5 Checksum:ac5daaba30961e3a866d7dc42cc4dddf

 ///  File Name: redms06-005.py.txt
Description:
Microsoft Windows Media Player BMP handling buffer overflow denial of service exploit.
Author:redsand
File Size:2707
Last Modified:Feb 26 06:06:01 2006
MD5 Checksum:a08077d3cdc17d30808fcbc0c03e6191

 ///  File Name: rubronegrodotnet.txt
Description:
www.rubronegro.net is susceptible to cross site scripting and SQL injection attacks.
Author:Rephumos
File Size:1215
Last Modified:Feb 26 04:34:19 2006
MD5 Checksum:4f5151d022a964fa9621ec82b683f9f2

 ///  File Name: RUNCMS1.3a-sql.tyxt
Description:
RUNCMS version 1.3a is vulnerable to SQL injection due to improper user input sanitization. POC included.
Author:h e
Homepage:http://www.runcms.org/public/modules/forum/viewtopic.php?topic_id=4003&forum=18
File Size:2514
Last Modified:Feb 20 22:46:22 2006
MD5 Checksum:a591d89417da6212625bb43c43e71d92

 ///  File Name: runcms_13a_xpl.html
Description:
RunCMS versions 1.2 and below arbitrary remote inclusion exploit. Also allows for code execution on RunCMS versions 1.3a2 and below by making use of an upload flaw via FCKEditor.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:19460
Last Modified:Feb 13 07:17:25 2006
MD5 Checksum:41ab4e99ce769362efd908d736fd7ce0

 ///  File Name: runcmsXSS.txt
Description:
Runcms 1.x is susceptible to cross site scripting attacks.
Author:Roozbeh Afrasiabi
Homepage:http://www.kapda.ir
File Size:1779
Last Modified:Feb 26 02:30:36 2006
MD5 Checksum:89023b9287375c0f75cf440226e2cecb

 ///  File Name: safari_safefiles_exec.pm.txt
Description:
This Metasploit module exploits a vulnerability in Safari's "Safe file" feature, which will automatically open any file with one of the allowed extensions. This can be abused by supplying a zip file, containing a shell script, with a metafile indicating that the file should be opened by Terminal.app. This module depends on the 'zip' command-line utility.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:12432
Last Modified:Feb 26 06:11:18 2006
MD5 Checksum:caf3501268c966ac68fd12049bcd0d09

 ///  File Name: saphplesson.pl.txt
Description:
SaphpLesson version 2.0 remote SQL injection exploit.
Author:SnIpEr_SA
File Size:1312
Last Modified:Feb 26 06:17:11 2006
MD5 Checksum:5ac4708a3b589768e21f0f412b7c4513

 ///  File Name: schooltools.htm.txt
Description:
Schooltools Site Builder Educator Edition remote SQL injection exploit.
Author:MurderSkillz, uid0
Homepage:http://www.g00ns.net
File Size:1839
Last Modified:Feb 25 22:56:50 2006
MD5 Checksum:14a55eb4e06fd4df973d243b69079c19

 ///  File Name: shoutcast_expl.c
Description:
Shoutcast versions 1.9.4 and below HTTP GET filename request remote format string exploit that binds to port 7000.
Author:crash-x
File Size:10252
Last Modified:Feb 2 00:16:04 2006
MD5 Checksum:d399666b22163efa3814d4715651ab91

 ///  File Name: siteframe5.0.1a_xss.txt
Description:
Unavailable.
File Size:2109
Last Modified:Feb 13 10:19:27 2006
MD5 Checksum:ca84390a45d096ed4d9f813090796434

 ///  File Name: siteframe_5.0.2_xss.txt
Description:
Siteframe Beaumont 5.0.1a suffers from a flaw that allows a remote cross site scripting attack.
Author:Kiki
Homepage:http://www.kiki91.altervista.org
File Size:2578
Last Modified:Feb 20 23:06:57 2006
MD5 Checksum:ce03740986426700893c23a5ec0d333c