Section:  .. / 0608-exploits  /

Page 8 of 9
<< 1 2 3 4 5 6 7 8 9 >> Files 175 - 200 of 209
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: EV0132.txt
Description:
MyBB versions 1.1.6 and below suffer from a cross site scripting vulnerability.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1201
Last Modified:Aug 17 09:59:41 2006
MD5 Checksum:49d9c9f358121006c4bd969ce4ff1eca

 ///  File Name: getpwnedmail-x86.pl.txt
Description:
Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the x86 architecture.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related Exploit:getpwnedmail-ppc.pl.txt"
File Size:3168
Last Modified:Aug 17 09:36:34 2006
MD5 Checksum:5540112f83f80479f953f28a5a073bf2

 ///  File Name: gotpwnedagainmail.sh.txt
Description:
Shellscript exploit for fetchmail on Mac OSX versions 10.4.7 and below.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related Exploit:getpwnedmail-x86.pl.txt"
File Size:324
Last Modified:Aug 17 09:35:47 2006
MD5 Checksum:c5b3c3753ea2421ea50b1a278d8a801d

 ///  File Name: getpwnedmail-ppc.pl.txt
Description:
Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the PPC architecture.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related Exploit:gotpwnedagainmail.sh.txt"
File Size:3747
Last Modified:Aug 17 09:34:43 2006
MD5 Checksum:752760949c1d758357649064c5823cb1

 ///  File Name: barracudeArbitrary.txt
Description:
The Barracuda Spam Firewalls from versions 3.3.01.001 through 3.3.02.053 are vulnerable to arbitrary file disclosure via the preview_email.cgi script.
Author:Greg Sinclair
File Size:2721
Last Modified:Aug 17 09:28:36 2006
MD5 Checksum:d2bb821a7c98e671d9e2e57a0de6a4f7

 ///  File Name: barracudeHardcode.txt
Description:
The Barracuda Spam Firewalls from versions 3.3.01.001 through 3.3.02.053 have a hardcoded password for the guest account in the Login.pm script.
Author:Greg Sinclair
File Size:2096
Last Modified:Aug 17 09:27:46 2006
MD5 Checksum:9e63e4f9eb0b3503c180627f41fc0ef5

 ///  File Name: wowroster15x.txt
Description:
WoW Roster versions 1.5.x and below suffer from a remote file inclusion vulnerability.
Author:AG-Spider
File Size:899
Last Modified:Aug 17 09:03:21 2006
MD5 Checksum:b34a7a9b66089ce4ac7a0b7860909253

 ///  File Name: shoutboxrem.txt
Description:
Shoutbox suffers from a remote command execution vulnerability.
Author:botan
File Size:901
Last Modified:Aug 17 09:01:54 2006
MD5 Checksum:e766774643b54785f5ab44a5157b5240

 ///  File Name: quickie.txt
Description:
Quickie suffers from a remote command execution vulnerability.
Author:botan
File Size:972
Last Modified:Aug 17 09:01:19 2006
MD5 Checksum:794438aeb69836321e7d2c4bc904c7bb

 ///  File Name: filemanagerrem.txt
Description:
FileManager suffers from a remote command execution vulnerability.
Author:botan
File Size:503
Last Modified:Aug 17 09:00:53 2006
MD5 Checksum:b58bb51262d4fda46f922f627d6ce71d

 ///  File Name: faqscript.txt
Description:
FAQ Script versions 1.0 suffers from a remote command execution vulnerability.
Author:botan
File Size:452
Last Modified:Aug 17 09:00:18 2006
MD5 Checksum:1bc067ac6bb7d3b42670e173865a1f52

 ///  File Name: guestbook35.txt
Description:
Guestbook version 3.5 suffer from a remote command execution vulnerability.
Author:botan
File Size:593
Last Modified:Aug 17 08:59:38 2006
MD5 Checksum:5b816882fd42ae537e48f610f9f15c16

 ///  File Name: newsletter35.txt
Description:
NewsLetter versions 3.5 and below suffer from a remote file inclusion vulnerability.
Author:Tr_ZiNDaN
File Size:1365
Last Modified:Aug 17 08:57:56 2006
MD5 Checksum:ce0265474a793badfc94b881d1e32c72

 ///  File Name: BTP00022P003BI.zip
Description:
Test exploit that was built to demonstrate an inability in BlackICE to protect pamversion.dll.
Author:David Matousek
Homepage:http://www.matousec.com/
Related File:matousec-2006-08-01.01.txt
File Size:8237
Last Modified:Aug 17 08:53:57 2006
MD5 Checksum:7b1bc0bc04ba7fe3a6ede1c60c7d26ce

 ///  File Name: tsep0942.txt
Description:
TSEP version 0.9.4.2 suffers from a remote file inclusion vulnerability.
Author:Philipp Niedziela
File Size:1398
Last Modified:Aug 17 08:39:35 2006
MD5 Checksum:2165bbb61e582514630fe9e915f50d21

 ///  File Name: exp_jmp_rand.pl.txt
Description:
Exploit solution against Linux kernel 2.6 stack randomization using the jmp *%esp technique.
Author:bunker
Homepage:http://rawlab.altervista.org/
File Size:2177
Last Modified:Aug 17 08:05:36 2006
MD5 Checksum:22beccefff60fd611438348e5c0637e3

 ///  File Name: exp_call_rand.pl.txt
Description:
Exploit solution against Linux kernel 2.6 stack randomization using the call *%edx technique.
Author:bunker
Homepage:http://rawlab.altervista.org/
File Size:2223
Last Modified:Aug 17 08:04:50 2006
MD5 Checksum:0472c077c87c0aad0c313118d10c68a5

 ///  File Name: mynewsgroups06b.txt
Description:
MyNewsGroups versions 0.6b and below suffer from a remote file inclusion vulnerability.
Author:Philipp Niedziela
File Size:1609
Last Modified:Aug 17 07:58:22 2006
MD5 Checksum:8a8f0002530cf5ef9a8b7d3f1763964d

 ///  File Name: ocpbof.zip
Description:
Proof of concept exploit for buffer overflows in Open Cuber Player versions 2.6.0pre6 and below on DOS/Windows and versions 0.1.10_rc5 and below on Linux and *BSD.
Author:Luigi Auriemma
Homepage:http://aluigi.org
Related File:ocpbof.txt
File Size:4830
Last Modified:Aug 17 07:57:02 2006
MD5 Checksum:ed0df8779b22c223e018a948da795ad8

 ///  File Name: Powerpoint2003_SP2updated_Exploit_F..>
Description:
Microsoft PowerPoint 2003 SP2 updated (french version) exploit that was tested by the author on WinXP SP2.
Author:NSRocket
File Size:181224
Last Modified:Aug 17 07:31:46 2006
MD5 Checksum:7f6b1dd7eaa0153729a3226d206dfb5d

 ///  File Name: seirCMS.txt
Description:
Seir Anphin version 666 CMS suffers from SQL injection vulnerabilities.
Author:CR
Homepage:http://www.svt.nukleon.us
File Size:3929
Last Modified:Aug 17 07:28:42 2006
MD5 Checksum:8928e6332be3be1976f08314c5bf9bae

 ///  File Name: phpauction21.txt
Description:
PHPAuction version 2.1 with phpAdsNew version 2.0.5 suffers from a remote file inclusion flaw.
Author:Philipp Niedziela
File Size:1634
Last Modified:Aug 17 07:27:08 2006
MD5 Checksum:4880183f6d5e4e39124a3b3a384b85c9

 ///  File Name: atutor1531.txt
Description:
ATutor versions 1.5.3.1 and below 'links' blind SQL injection exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:8624
Last Modified:Aug 17 07:24:50 2006
MD5 Checksum:cf8f7b65bdcf7853687d9fd2b574c5b5

 ///  File Name: xstatics120.txt
Description:
X-Statics version 1.20 suffers from a SQL injection vulnerability.
Author:SirDarckCat
Homepage:http://elhacker.net/
File Size:651
Last Modified:Aug 17 07:23:49 2006
MD5 Checksum:8be076e326dc896cef343488b124541d

 ///  File Name: xprotection110.txt
Description:
X-Protection version 1.10 suffers from a SQL injection vulnerability.
Author:SirDarckCat
Homepage:http://elhacker.net/
File Size:593
Last Modified:Aug 17 07:23:05 2006
MD5 Checksum:b765443edccaffc01b6eb7f825a3d659