Section:
..
/ 0602-exploits /
Page 4 of 7
<<
1
2
3
4
5
6
7
>>
Files 75 - 100 of 152
Currently sorted by: Last Modified
Sort By:
File Name
,
File Size
///
File Name:
dotProject-2.0.1.txt
Description:
dotProject versions 2.0.1 and below are vulnerable to multiple arbitrary code execution and information disclosure problems.
Author:
Robin Verton
File Size:
2186
Last Modified:
Feb 15 00:43:07 2006
MD5 Checksum:
0ed37715952044d9f805a8838e0b4b4a
///
File Name:
waraxe-2006-SA-044.txt
Description:
waraxe-2006-SA#044 - XSS in phpNuke version 7.8 and older.
Author:
waraxe
Homepage:
http://www.waraxe.us/advisory-44.html
File Size:
4584
Last Modified:
Feb 15 00:40:06 2006
MD5 Checksum:
3338c2a46ee42df46377927af922e7ef
///
File Name:
PHPClassifieds.txt
Description:
PHP Classifieds version 6.2 and lower suffer from an authentication bypass vulnerability.
Author:
Audun Larsen
File Size:
1438
Last Modified:
Feb 15 00:38:14 2006
MD5 Checksum:
aee4bd6d2912e9bc74b9c164000f48b0
///
File Name:
gexp-powerd.c
Description:
Power Daemon versions 2.0.2 and below remote format string exploit.
Author:
barros, xgc
Homepage:
http://gotfault.net/
File Size:
9813
Last Modified:
Feb 14 09:00:32 2006
MD5 Checksum:
bf56b8e1706fc8e7b5799af013ff3a49
///
File Name:
gexp-openvmpsd.c
Description:
OpenVMPSd versions 1.3 and below remote format string exploit. Binds a shell to port 31337.
Author:
barros, xgc
Homepage:
http://gotfault.net/
File Size:
8061
Last Modified:
Feb 14 08:59:15 2006
MD5 Checksum:
9c0d6272bd7bf0b699a00bbb8cac7440
///
File Name:
htmlws.c
Description:
Microsoft HTML Help Workshop .hhp file compiled file header buffer overflow exploit.
Author:
k3xji
, darkeagle
Homepage:
http://www.guvenliklab.com
File Size:
2196
Last Modified:
Feb 14 08:56:43 2006
MD5 Checksum:
2209e4c4bd89df614b3e6c8b6b192f0f
///
File Name:
firefox_queryinterface_mac.pm.txt
Description:
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface(). Max OS X version.
Author:
H D Moore
Homepage:
http://www.metasploit.com
File Size:
5654
Related CVE(s):
CVE-2006-0295
Last Modified:
Feb 14 08:54:46 2006
MD5 Checksum:
0be0c57d21ee5289218310e4269f47de
///
File Name:
eudora_imap.pm.txt
Description:
This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0).
Author:
y0
Homepage:
http://www.metasploit.com
File Size:
3554
Related CVE(s):
CVE-2005-4267
Last Modified:
Feb 14 08:53:24 2006
MD5 Checksum:
b4d3dce552bdd96a74351c34818fce93
///
File Name:
firefox_queryinterface.pm.txt
Description:
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface().
Author:
H D Moore
Homepage:
http://www.metasploit.com
File Size:
5646
Related CVE(s):
CVE-2006-0295
Last Modified:
Feb 14 08:50:00 2006
MD5 Checksum:
a331d364987cfd9feedeb9eeb5761a26
///
File Name:
flyspray_097_php5_incl_xpl.html
Description:
FlySpray version 0.9.7 remote command execution exploit.
Author:
rgod
Homepage:
http://retrogod.altervista.org/
File Size:
14634
Last Modified:
Feb 14 08:42:27 2006
MD5 Checksum:
edcfc76d9d4a66b86c4959ed7c147718
///
File Name:
egs_10rc4_php5_incl_xpl.php.txt
Description:
EGS Enterprise Groupware System versions 1.0 rc4 and below remote command execution exploit.
Author:
rgod
Homepage:
http://retrogod.altervista.org/
File Size:
14946
Last Modified:
Feb 14 08:40:38 2006
MD5 Checksum:
9b8239760e4f2fe3b077fb38481d07b9
///
File Name:
guestbookPHP.txt
Description:
gastbuch versions 1.3.2 and below are susceptible to cross site scripting.
Author:
Micha Borrmann
File Size:
1092
Last Modified:
Feb 14 08:37:21 2006
MD5 Checksum:
144ce0b21664236abeb439e709045dc9
///
File Name:
EveryoneXSS.txt
Description:
everyone.net suffers from a cross site scripting vulnerability.
Author:
Simo Ben youssef
Homepage:
http://www.morx.org
File Size:
2860
Last Modified:
Feb 14 06:17:23 2006
MD5 Checksum:
8fafb9701be58a46551e5886bcc89d87
///
File Name:
EV0064.txt
Description:
Clever Copy version 3 is susceptible to cross site scripting attacks.
Author:
Aliaksandr Hartsuyeu
Homepage:
http://evuln.com/
File Size:
1330
Related CVE(s):
CVE-2006-0627
Last Modified:
Feb 14 06:13:35 2006
MD5 Checksum:
eafe9c2f664a9d93884cbbf881e4dda4
///
File Name:
EV0061.txt
Description:
phpstatus version 1.0 is susceptible to authentication bypass via SQL injection and an issue with cookie verification.
Author:
Aliaksandr Hartsuyeu
Homepage:
http://evuln.com/
File Size:
1617
Related CVE(s):
CVE-2006-0570
,
CVE-2006-0571
,
CVE-2006-0572
Last Modified:
Feb 14 06:11:52 2006
MD5 Checksum:
29fbf97903cf1a4808c34d06d38e187a
///
File Name:
EV0060.txt
Description:
phphd version 1.0 is susceptible to authentication bypass, SQL injection, and cross site scripting attacks.
Author:
Aliaksandr Hartsuyeu
Homepage:
http://evuln.com/
File Size:
2251
Related CVE(s):
CVE-2006-0607
,
CVE-2006-0608
,
CVE-2006-0609
Last Modified:
Feb 14 06:08:51 2006
MD5 Checksum:
ab7bdb372f3ebe013ba4ba8e0e4c6031
///
File Name:
srvcheck2.zip
Description:
Privilege escalation exploit for Windows networks using weak service restrictions.
Author:
aT4r
Homepage:
http://www.haxorcitos.com
Related File:
winval.pdf
File Size:
36799
Last Modified:
Feb 14 05:54:07 2006
MD5 Checksum:
ad3eb5a3df759022d366d2a22d076536
///
File Name:
DBeSession102.txt
Description:
DB_eSession 1.0.2 is susceptible to SQL injection attacks. Details provided.
Homepage:
http://www.gulftech.org/
File Size:
2812
Last Modified:
Feb 14 05:45:03 2006
MD5 Checksum:
1689d07a74662034a1dc635361cb6f16
///
File Name:
Fortinet-url.txt
Description:
It is possible to bypass Fortinet URL blocker by making special HTTP requests. Proof of concept perl script provided.
Author:
Mathieu Dessus
File Size:
2540
Last Modified:
Feb 14 01:36:23 2006
MD5 Checksum:
5f931ff8373ea0ff85abc57ef3100446
///
File Name:
ArmySystemv2.1.txt
Description:
Invision Power Board Army System Mod Version 2.1 and earlier SQL injection exploit.
Author:
fRoGGz SecuBox Labs
Homepage:
http://secubox.shadock.net
File Size:
4588
Last Modified:
Feb 13 11:08:38 2006
MD5 Checksum:
e950f502d08387c09b0a8e2fc3d8bf53
///
File Name:
VCardLITE-2.4.txt
Description:
The default installation of VCardLITE does not remove install.php leading to remote code execution.
Author:
disruptor
File Size:
1266
Last Modified:
Feb 13 10:58:52 2006
MD5 Checksum:
20935c52523feda376b3c35386e27b9b
///
File Name:
docmgr_0542_incl_xpl
Description:
DocMGR versions less than or equal to 0.54.2 arbitrary remote inclusion exploit.
Author:
rgod
Homepage:
http://retrogod.altervista.org/docmgr_0542_incl_xpl.html
File Size:
12812
Last Modified:
Feb 13 10:55:09 2006
MD5 Checksum:
5fd6d96849de8d6d12deb7e2e93d7ba3
///
File Name:
EV0059.txt
Description:
phpht Topsites suffers from Authentication Bypass and SQL injection vulnerabilities.
Author:
Aliaksandr Hartsuyeu
Homepage:
http://evuln.com/vulns/59/summary.html
File Size:
2240
Last Modified:
Feb 13 10:50:48 2006
MD5 Checksum:
1a5e0c872c771f2748bfff7b43de0fe4
///
File Name:
EV0058.txt
Description:
phphg Guestbook suffers from SQL injection and XSS vulnerabilities.
Author:
Aliaksandr Hartsuyeu
Homepage:
http://evuln.com/vulns/58/summary.html
File Size:
2340
Last Modified:
Feb 13 10:46:43 2006
MD5 Checksum:
d40292f3d9c83a7d32e2fcea7e7de0de
///
File Name:
siteframe5.0.1a_xss.txt
Description:
Unavailable.
File Size:
2109
Last Modified:
Feb 13 10:19:27 2006
MD5 Checksum:
ca84390a45d096ed4d9f813090796434