Section:  .. / 0608-exploits  /

Page 3 of 9
<< 1 2 3 4 5 6 7 8 9 >> Files 50 - 75 of 209
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: diesel.txt
Description:
Diesel Job Site is susceptible to cross site scripting attacks.
Author:Night_Warrior
File Size:369
Last Modified:Aug 27 23:18:25 2006
MD5 Checksum:e9b92457a98d639ea06fee40e9f3b01d

 ///  File Name: dieselpaid.txt
Description:
Diesel Paid Mail is susceptible to a cross site scripting attack in getad.php.
Author:Night_Warrior
File Size:288
Last Modified:Aug 27 23:19:36 2006
MD5 Checksum:f634a66e94794954e90ec63ced3cb0cc

 ///  File Name: dieselpay.txt
Description:
Diesel Pay is susceptible to cross site scripting attacks.
Author:Night_Warrior
File Size:262
Last Modified:Aug 27 23:20:51 2006
MD5 Checksum:70ee08187eec85ead9dc0f5b34fb605c

 ///  File Name: discloser.txt
Description:
discloser version 0.0.4 remote file inclusion exploit.
Author:Dr.t3rr0r1st, Outlaw
Homepage:http://www.aria-security.net
File Size:1898
Last Modified:Aug 27 19:52:22 2006
MD5 Checksum:5836a9ab313a453ba88b85c8a5b1a83b

 ///  File Name: docpile.txt
Description:
docpile:we version 0.2.2 suffers from a remote file inclusion vulnerability.
Author:x0r0n
File Size:652
Last Modified:Aug 18 07:45:05 2006
MD5 Checksum:caf20aed0c04a078eb5cba7740149fed

 ///  File Name: dragonflyCMS.txt
Description:
Dragonfly CMS versions 9.0.6.1 and below suffer from a cross site scripting flaw.
Author:HeLiOsZ
Homepage:http://www.darkend.org/
File Size:775
Last Modified:Aug 27 02:35:52 2006
MD5 Checksum:c6b2d42ea57aa89c042bc667e57cc8e4

 ///  File Name: dupoll31.txt
Description:
DUPoll version 3.1 suffers from a direct database download flaw.
Author:BoZKuRTSeRDaR
File Size:1222
Last Modified:Aug 30 03:25:05 2006
MD5 Checksum:069cde939dc5cdf8f937a08946aeaa00

 ///  File Name: e107-GLOBALS-php.txt
Description:
e107 versions 0.75 and below GLOBALS[] overwrite/Zend_Hash_Del_Key_Or_Index remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:7855
Last Modified:Aug 29 05:14:13 2006
MD5 Checksum:19c1c99889e6397f41a806c18f527c93

 ///  File Name: easy-py.txt
Description:
Easy File Sharing ftp server version 2.0 remote proof of concept exploit.
Author:h07
File Size:1761
Last Modified:Aug 28 00:46:10 2006
MD5 Checksum:c46200256c681182faf098fb9b781efd

 ///  File Name: estateagent.txt
Description:
The Estate Agent Mambo component suffers from a remote file inclusion vulnerability.
Author:Outlaw
Homepage:http://www.aria-security.net
File Size:1612
Last Modified:Aug 27 23:01:59 2006
MD5 Checksum:54372a5d8368366ec2005525a88519af

 ///  File Name: EV0132.txt
Description:
MyBB versions 1.1.6 and below suffer from a cross site scripting vulnerability.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1201
Last Modified:Aug 17 09:59:41 2006
MD5 Checksum:49d9c9f358121006c4bd969ce4ff1eca

 ///  File Name: ExBB.txt
Description:
ExBB Italian versions 2.0 and below suffer from a remote file inclusion vulnerability.
Author:SHiKaA
File Size:1797
Last Modified:Aug 30 10:21:04 2006
MD5 Checksum:6b7112f31a3306a9312cf5fcb2986838

 ///  File Name: exp_call_rand.pl.txt
Description:
Exploit solution against Linux kernel 2.6 stack randomization using the call *%edx technique.
Author:bunker
Homepage:http://rawlab.altervista.org/
File Size:2223
Last Modified:Aug 17 08:04:50 2006
MD5 Checksum:0472c077c87c0aad0c313118d10c68a5

 ///  File Name: exp_jmp_rand.pl.txt
Description:
Exploit solution against Linux kernel 2.6 stack randomization using the jmp *%esp technique.
Author:bunker
Homepage:http://rawlab.altervista.org/
File Size:2177
Last Modified:Aug 17 08:05:36 2006
MD5 Checksum:22beccefff60fd611438348e5c0637e3

 ///  File Name: faille.txt
Description:
VeriTECH suffers from a remote file inclusion flaw.
Author:king-hacker
File Size:500
Last Modified:Aug 27 23:44:00 2006
MD5 Checksum:06a456c70d0a795f93b6cf0d9041654e

 ///  File Name: faqscript.txt
Description:
FAQ Script versions 1.0 suffers from a remote command execution vulnerability.
Author:botan
File Size:452
Last Modified:Aug 17 09:00:18 2006
MD5 Checksum:1bc067ac6bb7d3b42670e173865a1f52

 ///  File Name: filemanagerrem.txt
Description:
FileManager suffers from a remote command execution vulnerability.
Author:botan
File Size:503
Last Modified:Aug 17 09:00:53 2006
MD5 Checksum:b58bb51262d4fda46f922f627d6ce71d

 ///  File Name: firefox-DoS.txt
Description:
Mozilla Firefox versions 1.5.0.6 and below FTP request remote denial of service exploit.
Author:Tomas Kempinsky
File Size:1018
Last Modified:Aug 28 00:56:50 2006
MD5 Checksum:6a8609a7c6cc2e593bbde84bc9e64258

 ///  File Name: Frogss-php.txt
Description:
CMS Frogss versions 0.4 and below remote SQL injection exploit.
Author:Kacper
Homepage:http://www.rahim.webd.pl/
File Size:9236
Last Modified:Aug 28 00:52:04 2006
MD5 Checksum:80eb3c8fc82c2c974686df8985ed997d

 ///  File Name: fusionnews.txt
Description:
Fusion News version 3.7 remote file inclusion exploit.
Author:Outlaw
Homepage:http://www.aria-security.net
File Size:1877
Last Modified:Aug 27 07:44:24 2006
MD5 Checksum:2be8016fba170287a0893fb82deddc01

 ///  File Name: getpwnedmail-ppc.pl.txt
Description:
Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the PPC architecture.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related Exploit:gotpwnedagainmail.sh.txt"
File Size:3747
Last Modified:Aug 17 09:34:43 2006
MD5 Checksum:752760949c1d758357649064c5823cb1

 ///  File Name: getpwnedmail-x86.pl.txt
Description:
Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the x86 architecture.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related Exploit:getpwnedmail-ppc.pl.txt"
File Size:3168
Last Modified:Aug 17 09:36:34 2006
MD5 Checksum:5540112f83f80479f953f28a5a073bf2

 ///  File Name: gotpwnedagainmail.sh.txt
Description:
Shellscript exploit for fetchmail on Mac OSX versions 10.4.7 and below.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related Exploit:getpwnedmail-x86.pl.txt"
File Size:324
Last Modified:Aug 17 09:35:47 2006
MD5 Checksum:c5b3c3753ea2421ea50b1a278d8a801d

 ///  File Name: guestbook35.txt
Description:
Guestbook version 3.5 suffer from a remote command execution vulnerability.
Author:botan
File Size:593
Last Modified:Aug 17 08:59:38 2006
MD5 Checksum:5b816882fd42ae537e48f610f9f15c16

 ///  File Name: hlstatsXSS.txt
Description:
HLStats version 1.34 suffers from a cross site scripting vulnerability.
Author:kefka
File Size:452
Last Modified:Aug 29 19:01:55 2006
MD5 Checksum:455aa23a71043522ef1c47661a0229f7