Section:  .. / 0611-exploits  /

Page 4 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 75 - 100 of 258
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: debug217_php.txt
Description:
Invision Power Board 2.1.7 debug mode proof of concept exploit. Works if "Debug Level" is set to 3 or Enable SQL Debug Mode is turned on.
Author:Rapigator
File Size:3275
Last Modified:Nov 3 01:43:52 2006
MD5 Checksum:b3b5ba445fb8bbe566765130aca1725c

 ///  File Name: devwms15-rfi.txt
Description:
dev_wms versions 1.5 and below suffer from remote file inclusion vulnerabilities.
Author:the_Edit0r
File Size:1259
Last Modified:Nov 18 01:45:54 2006
MD5 Checksum:d2e6e5cc5db17c19cb270777f0c7ff6c

 ///  File Name: dicshunary01.txt
Description:
dicshunary version 0.1 alpha remote file inclusion exploit.
Author:the_Edit0r
File Size:3148
Last Modified:Nov 21 07:08:39 2006
MD5 Checksum:449bf48cab57a16ad740f2791a5478d0

 ///  File Name: directadmin-1281.txt
Description:
DirectAdmin version 1.28.1 suffers from a cross site scripting vulnerability.
Homepage:http://aria-security.net/
File Size:994
Last Modified:Nov 14 08:15:51 2006
MD5 Checksum:596ccf0c0743c29d93004c2441c033b3

 ///  File Name: discloser004-rfi.txt
Description:
discloser versions 0.0.4 and below suffer from a remote file inclusion vulnerability.
Author:the_Edit0r
File Size:1199
Last Modified:Nov 18 01:47:24 2006
MD5 Checksum:7cadfd791f88fce9e4c62cb46c34919f

 ///  File Name: disclosure004-rfi.pl.txt
Description:
discloser versions 0.0.4 and below remote file inclusion exploit.
Author:the_Edit0r
File Size:4685
Last Modified:Nov 18 01:46:48 2006
MD5 Checksum:30023b652dea0487d1fc450ea316be9c

 ///  File Name: dlink_wifi_rates.rb.txt
Description:
This Metasploit module exploits a stack overflow in the A5AGU.SYS driver provided with the D-Link DWL-G132 USB wireless adapter. This stack overflow allows remote code execution in kernel mode. The stack overflow is triggered when a 802.11 Beacon frame is received that contains a long Rates information element. This exploit was tested with version 1.0.1.41 of the A5AGU.SYS driver and a D-Link DWL-G132 USB adapter (HW: A2, FW: 1.02). Newer versions of the A5AGU.SYS driver are provided with the D-Link WUA-2340 adapter and appear to resolve this flaw, but D-Link does not offer an updated driver for the DWL-G132. Since this vulnerability is exploited via beacon frames, all cards within range of the attack will be affected. The tested adapter used a MAC address in the range of 00:11:95:f2:XX:XX.
Author:H D Moore, Matt Miller, Johnny Cache, LMH
Homepage:http://projects.info-pull.com/mokb/
File Size:5873
Last Modified:Nov 14 08:56:53 2006
MD5 Checksum:a403e8304d2632dbf796bf0e140b69a9

 ///  File Name: dodosmail201-rfi.txt
Description:
DodosMail versions 2.0.1 and below suffer from a remote file inclusion vulnerability in dodosmail.php.
Author:Cold Zero
File Size:2325
Last Modified:Nov 9 07:17:59 2006
MD5 Checksum:a7bd0ad9d553796fefdbf4e5dad18881

 ///  File Name: dragonevents.txt
Description:
Dragon Events Listing suffers from login bypass and SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:368
Last Modified:Nov 16 16:57:34 2006
MD5 Checksum:994d58c0259bc58f0037fc84ba4876f0

 ///  File Name: drakeCMS.txt
Description:
Drake CMS version 0.2 suffers from a cross site scripting vulnerability.
Author:CorryL
Homepage:http://www.x0n3-h4ck.org
File Size:1697
Last Modified:Nov 6 06:31:16 2006
MD5 Checksum:7e6c8136290a2aae4338a136364b343e

 ///  File Name: eam-13.txt
Description:
Estate Agent Manager versions 1.3 and below suffer from a SQL injection vulnerability in default.asp.
Author:ajann
File Size:430
Last Modified:Nov 14 07:04:31 2006
MD5 Checksum:b03162de534cfa20233fa72687e2f68c

 ///  File Name: easyFilePwn.txt
Description:
Easy File Sharing Web Server version 4 remote information stealing exploit.
Author:Greg Linares
File Size:6379
Last Modified:Nov 7 05:50:42 2006
MD5 Checksum:69d0257dcbcbdabff405d804a597d5dc

 ///  File Name: ecalpro30.txt
Description:
E-Calendar Pro version 3.0 suffers from login bypass and SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:332
Last Modified:Nov 16 16:59:07 2006
MD5 Checksum:f733f638b753d9118f0a494d5942ee56

 ///  File Name: eClassifieds.txt
Description:
eClassifieds suffers from multiple SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:355
Last Modified:Nov 21 07:57:23 2006
MD5 Checksum:f38dcab64d1afce364c9910c492aaca6

 ///  File Name: ecomkit1.txt
Description:
E-commerce Kit 1 PayPal Edition suffers from SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:353
Last Modified:Nov 18 00:45:14 2006
MD5 Checksum:397a34845940ecea4f8ed25352b61b02

 ///  File Name: ecommercestore.txt
Description:
ECommerce Store Shop Builder suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:494
Last Modified:Nov 16 16:19:35 2006
MD5 Checksum:0f63cf0d65b50d4e61e8e9f7eaf24009

 ///  File Name: efsStream.txt
Description:
EFS Easy Address Book web server versions 1.2 and below remote file stream exploit.
Author:Greg Linares
File Size:7426
Last Modified:Nov 7 05:53:56 2006
MD5 Checksum:a0e60c4c0b0df7017a24f65de41eef52

 ///  File Name: eggblog310.txt
Description:
eggblog versions 3.1.0 and below suffer from cross site scripting flaws.
Author:the_Edit0r
File Size:1264
Last Modified:Nov 18 01:42:06 2006
MD5 Checksum:c4ca475c0110251b076be100a3815afe

 ///  File Name: ehomes.txt
Description:
ehomes suffers from multiple cross site scripting and SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:775
Last Modified:Nov 21 08:00:05 2006
MD5 Checksum:bd59f8fd0351e3d909a70a9f5c6faa16

 ///  File Name: em.txt
Description:
Engine Manager suffers from a SQL injection flaw.
Homepage:http://aria-security.net/
File Size:386
Last Modified:Nov 16 16:20:02 2006
MD5 Checksum:c25b49ef625a3fb751c3e26cd467a455

 ///  File Name: encapscms036.txt
Description:
encapscms version 0.3.6 suffers from a remote file inclusion vulnerability.
Author:Firewall
File Size:1279
Last Modified:Nov 14 06:29:15 2006
MD5 Checksum:a340f68f1f06c7fb7fcf5e94f5f39af0

 ///  File Name: enomphp40.txt
Description:
enomphp versions 4.0 and below suffer from a classic remote directory traversal flaw.
Author:the_Edit0r
File Size:1336
Last Modified:Nov 21 06:29:26 2006
MD5 Checksum:9e70d1664b23ae534cbca044e7ef697c

 ///  File Name: eshopping.txt
Description:
eShopping suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:436
Last Modified:Nov 16 16:19:19 2006
MD5 Checksum:c1fb660ef0c41dd1278a8a2ec386854e

 ///  File Name: essentia215.txt
Description:
Essentia Web Server version 2.15 suffers from a buffer overflow vulnerability. Denial of service exploit included.
Author:CorryL
Homepage:http://www.x0n3-h4ck.org
File Size:2077
Last Modified:Nov 6 06:32:43 2006
MD5 Checksum:451677b193bcfd7e60f47f5e5d921aa0

 ///  File Name: etm_0612_remote_com.pl.txt
Description:
Remote command execution exploit for Etomite CMS versions 0.6.1.2 and below.
Author:Alfredo Pesoli
Related File:etomiteCMS0612.txt
File Size:5171
Last Modified:Nov 18 01:58:02 2006
MD5 Checksum:10a87a52c5fbfc16e8dfdd1dc143d156