Section:  .. / 0602-exploits  /

Page 6 of 7
<< 1 2 3 4 5 6 7 >> Files 125 - 150 of 152
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: Sof-PunkBuster.txt
Description:
It is possible to DOS Soldier of Fortune II with PunkBuster enabled by crashing the server.
Author:aluigi
Homepage:http://aluigi.altervista.org
File Size:3193
Last Modified:Feb 22 01:40:23 2006
MD5 Checksum:b6993537feb0131685ead405062c0ea7

 ///  File Name: sPaizXSS.txt
Description:
sPaiz-Nuke is susceptible to cross site scripting attacks.
Author:Night_Warrior
File Size:440
Last Modified:Feb 2 03:00:56 2006
MD5 Checksum:f78200187af39e42787ddb2ce2c00b9c

 ///  File Name: spip_182g_shell_inj_xpl.html
Description:
SPIP versions 1.8.2g and below remote command execution exploit that makes use of an arbitrary local inclusion flaw and SQL injection.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:11464
Last Modified:Feb 9 05:56:53 2006
MD5 Checksum:66a4f913c42aa8b6ab29bec9dfa02183

 ///  File Name: srvcheck2.zip
Description:
Privilege escalation exploit for Windows networks using weak service restrictions.
Author:aT4r
Homepage:http://www.haxorcitos.com
Related File:winval.pdf
File Size:36799
Last Modified:Feb 14 05:54:07 2006
MD5 Checksum:ad3eb5a3df759022d366d2a22d076536

 ///  File Name: thebatSpoof.txt
Description:
The design flow in the way The Bat! 2.x displays messages allows attackers to spoof RFC 822 headers and more.
Author:3APA3A
Homepage:http://www.security.nnov.ru/
File Size:3667
Last Modified:Feb 8 05:47:26 2006
MD5 Checksum:212fb85e01a3ee49cc29be81def5dcca

 ///  File Name: UebiMiauXSS.txt
Description:
UebiMiau version 2.7.9 is susceptible to cross site scripting attacks.
Author:M.Neset KABAKLI
Homepage:http://www.wakiza.com
File Size:1410
Last Modified:Feb 2 03:02:24 2006
MD5 Checksum:8d6e33609ec1f7f788c61bf903b4d7e1

 ///  File Name: VCardLITE-2.4.txt
Description:
The default installation of VCardLITE does not remove install.php leading to remote code execution.
Author:disruptor
File Size:1266
Last Modified:Feb 13 10:58:52 2006
MD5 Checksum:20935c52523feda376b3c35386e27b9b

 ///  File Name: vuSQL.pl.txt
Description:
Simple perl exploit that makes use of a flaw in VU Site Engine version 2.0 that allows for unauthenticated addition of administrative users.
Author:GeW, censored
Homepage:http://www.security.nitro.ru
File Size:1414
Last Modified:Feb 26 04:59:07 2006
MD5 Checksum:75085f71818bbd10217bebbaf1a3d5ac

 ///  File Name: waraxe-2006-SA-044.txt
Description:
waraxe-2006-SA#044 - XSS in phpNuke version 7.8 and older.
Author:waraxe
Homepage:http://www.waraxe.us/advisory-44.html
File Size:4584
Last Modified:Feb 15 00:40:06 2006
MD5 Checksum:3338c2a46ee42df46377927af922e7ef

 ///  File Name: waraxe-2006-SA-045.txt
Description:
waraxe-2006-SA#045 - Bypassing CAPTCHA in phpNuke 6.x-7.9.
Author:waraxe
Homepage:http://www.waraxe.us/advisory-45.html
File Size:5418
Last Modified:Feb 20 23:34:11 2006
MD5 Checksum:063b8691c3fbfe346e8096aa8ebbcbcb

 ///  File Name: waraxe-2006-SA-046.txt
Description:
waraxe-2006-SA#046 - Critical sql injection in phpNuke 7.5-7.8.
Author:waraxe
Homepage:http://www.waraxe.us/advisory-46.html
File Size:5091
Last Modified:Feb 20 23:47:53 2006
MD5 Checksum:811085c5fa14dc1bcfc184789306ef0a

 ///  File Name: whompSQL.txt
Description:
Whomp Real Estate Manager XP 2005 is susceptible to SQL injection attacks.
Author:Night_Warrior
File Size:310
Last Modified:Feb 9 05:52:08 2006
MD5 Checksum:57726d8067dbc4a3d3c95fd29a785cce

 ///  File Name: wmp-ms06-005.cpp
Description:
Windows Media Player BMP heap overflow exploit.
Author:ATmaCA, Kozan
Homepage:http://www.spyinstructors.com
File Size:3486
Last Modified:Feb 26 06:04:20 2006
MD5 Checksum:1567da57e75b11cbd1aee574fd513983

 ///  File Name: wmp-profiteer.zip
Description:
Exploit for the Windows Media Player vulnerabilities discussed in MS06-006. Written in Perl.
Author:Matthew Murphy
File Size:2120
Last Modified:Feb 26 02:27:16 2006
MD5 Checksum:ae7a8fdf06e709fd53afeb8f04bfae1b

 ///  File Name: wmp_overflow.htm.txt
Description:
Microsoft Windows Media Player 10 Plug-In EMBED overflow universal exploit that makes use of the flaw discussed in MS06-006.
Author:Matthew Murphy
File Size:6508
Last Modified:Feb 26 06:08:54 2006
MD5 Checksum:a2a5799ed02302d4740c0a4ba2537157

 ///  File Name: wmp_plugin_ms06_006.pm.txt
Description:
This Metasploit module exploits a vulnerability in the Windows Media Player plugin for non-Microsoft web browsers. This module has been tested with Windows Media Player 9 on Windows 2000 SP4, Windows XP SP2, and Windows 2003 SP0 (Firefox 1.5 and Opera 8.5).
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:6097
Last Modified:Feb 26 06:07:30 2006
MD5 Checksum:4e91f5c4a5d1ab1836872f7b2b6eb6ee

 ///  File Name: woltlabbb2xXSS.txt
Description:
Woltlab Burning Board 2.x is susceptible to multiple cross site scripting flaws. Details provided.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1226
Last Modified:Feb 26 05:39:52 2006
MD5 Checksum:420c3e636135a43dce33fd16c785df0a

 ///  File Name: WordPress2.0.0-autorswebsite.txt
Description:
WordPress 2.0.0 has a XSS vulnerability in the comments section.
Homepage:http://security.myimei.com
File Size:1286
Last Modified:Feb 17 01:06:26 2006
MD5 Checksum:77d18b54ae834f23e375dde291656b9f

 ///  File Name: WorldMail-3.0.pl.txt
Description:
Eudora WorldMail 3.0 Windows 2000 remote SYSTEM exploit written in perl.
Homepage:http://www.com-winner.com/CWCOM/cwc-index/
File Size:2661
Last Modified:Feb 8 05:33:33 2006
MD5 Checksum:0cfd5e87d583a9b7f84900fda512fb36

 ///  File Name: xfocus-SD-060206.txt
Description:
Test exploit to see if a BCB compiler is susceptible to an integer overflow. Versions BCB6+ent_upd4 and below are susceptible.
Homepage:http://www.xfocus.org
File Size:2265
Last Modified:Feb 8 05:36:25 2006
MD5 Checksum:762827aa2f720d62f47699b6bbb2a57e

 ///  File Name: xmame-sploits.txt
Description:
Proof of concept exploits in both C and Perl that demonstrate the existence of the local vulnerability found in Xmame version 0.102.
Author:Rafael San Miguel Carrasco
File Size:1463
Last Modified:Feb 2 12:09:29 2006
MD5 Checksum:6e5acd34e4318ff1b9f901aaf1f47c75

 ///  File Name: XMB-1.9.3.txt
Description:
XMB Forum versions less than or equal to 1.9.3 are vulnerable to SQL injection or XSS attacks.
Author:GulfTech Security Research
Homepage:http://www.gulftech.org/?node=research&article_id=00100-02122006
File Size:3522
Last Modified:Feb 17 00:02:45 2006
MD5 Checksum:3c7687372c754933f0fd7dc95fb875d9

 ///  File Name: XOR-HostAdmin.txt
Description:
XOR Crew :: Security Advisory - HostAdmin - Remote Command Execution Vulnerability. POC Included.
Homepage:http://www.xorcrew.net/
File Size:11974
Last Modified:Feb 20 22:35:41 2006
MD5 Checksum:a3822c6af19d6986347f2440fb18ad65

 ///  File Name: XOR-iUser.txt
Description:
XOR Crew :: Security Advisory - iUser Ecommerce - Remote Command Execution Vulnerability. POC exploit included.
Author:Scott Dewey
Homepage:http://www.xorcrew.net/
File Size:11528
Last Modified:Feb 20 22:33:39 2006
MD5 Checksum:9e024c74b23959c5aea8d0c1a202b516

 ///  File Name: XOR-wcp.txt
Description:
XOR Crew :: Security Advisory - Web Calendar Pro - Denial of Service SQL injection (lame). POC included.
Homepage:http://www.xorcrew.net/
File Size:8281
Last Modified:Feb 20 22:34:45 2006
MD5 Checksum:62d38045ab7f6461ba6a084de44aa940