Section:  .. / 0611-exploits  /

Page 6 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 125 - 150 of 258
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: winzipFAC.txt
Description:
WinZIP versions 10.0.7245 and below FileView ActiveX control stack overflow proof of concept exploit.
Author:prdelka
Homepage:https://prdelka.blackart.org.uk/
File Size:2494
Last Modified:Nov 16 17:17:07 2006
MD5 Checksum:e5fa1c5b814dfd7c07d77f162db6b969

 ///  File Name: helm.txt
Description:
Helm version 3.2.10 suffers from multiple cross site scripting flaws.
Homepage:http://aria-security.net/
File Size:969
Last Modified:Nov 16 17:03:29 2006
MD5 Checksum:a9dab943fa314a5e3e0915b2a1b1f737

 ///  File Name: ecalpro30.txt
Description:
E-Calendar Pro version 3.0 suffers from login bypass and SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:332
Last Modified:Nov 16 16:59:07 2006
MD5 Checksum:f733f638b753d9118f0a494d5942ee56

 ///  File Name: multicalendars.txt
Description:
MultiCalendars suffers from SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:450
Last Modified:Nov 16 16:58:20 2006
MD5 Checksum:a6880ede243c366024ad551626cfc908

 ///  File Name: dragonevents.txt
Description:
Dragon Events Listing suffers from login bypass and SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:368
Last Modified:Nov 16 16:57:34 2006
MD5 Checksum:994d58c0259bc58f0037fc84ba4876f0

 ///  File Name: astoreecom.txt
Description:
A+ Store E-Commerce suffers from SQL injection and cross site scripting vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:525
Last Modified:Nov 16 16:56:38 2006
MD5 Checksum:590f519d894c3a2bf42bd167bb55c822

 ///  File Name: evolveSQL.txt
Description:
Evolve Merchant suffers from a SQL injection vulnerability.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:243
Last Modified:Nov 16 16:55:59 2006
MD5 Checksum:aedf41439f6e64cc9fd91ab5a7bf06c6

 ///  File Name: acartpro.txt
Description:
A-Cart Pro suffers from a SQL injection vulnerability.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:393
Last Modified:Nov 16 16:55:16 2006
MD5 Checksum:e1343d869bb259dbdbac7b5d7edfab76

 ///  File Name: hpecs.txt
Description:
The hpecs shopping cart suffers from login bypass and SQL injection vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:389
Last Modified:Nov 16 16:53:39 2006
MD5 Checksum:d8b1be6614779910f351b7cce261c81e

 ///  File Name: blogmev3.txt
Description:
Blogme version 3 suffers from SQL injection and cross site scripting vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:326
Last Modified:Nov 16 16:47:35 2006
MD5 Checksum:f4205b94f16c971b5069c0a6d20569ba

 ///  File Name: funkyasp10.txt
Description:
FunkyASP Glossary version 1.0 suffers from a SQL injection vulnerability.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:272
Last Modified:Nov 16 16:46:46 2006
MD5 Checksum:9acf48e91517a50b0a907861f9c8c917

 ///  File Name: propsiteman.txt
Description:
Property Site Manager suffers from SQL injection, login bypass, and cross site scripting vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:580
Last Modified:Nov 16 16:45:57 2006
MD5 Checksum:4088ae3a521895d0fe9dee17fbd3e6ff

 ///  File Name: carsite.txt
Description:
Car Site Manager suffers from SQL injection and cross site scripting vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:555
Last Modified:Nov 16 16:45:20 2006
MD5 Checksum:12a4433760c57a35806538d5dc666656

 ///  File Name: inventorymanager.txt
Description:
Inventory Manager suffers from SQL injection and cross site scripting vulnerabilities.
Author:laurent gaffi, benjamin moss
Homepage:http://s-a-p.ca/
File Size:622
Last Modified:Nov 16 16:44:57 2006
MD5 Checksum:c49eee7f00f3426ea87f489e252c3fd1

 ///  File Name: bpg.txt
Description:
The BPG Content Management System suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:464
Last Modified:Nov 16 16:20:37 2006
MD5 Checksum:f1ea5ef9d217d4aa19c30dd0328e25d1

 ///  File Name: em.txt
Description:
Engine Manager suffers from a SQL injection flaw.
Homepage:http://aria-security.net/
File Size:386
Last Modified:Nov 16 16:20:02 2006
MD5 Checksum:c25b49ef625a3fb751c3e26cd467a455

 ///  File Name: ecommercestore.txt
Description:
ECommerce Store Shop Builder suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:494
Last Modified:Nov 16 16:19:35 2006
MD5 Checksum:0f63cf0d65b50d4e61e8e9f7eaf24009

 ///  File Name: eshopping.txt
Description:
eShopping suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:436
Last Modified:Nov 16 16:19:19 2006
MD5 Checksum:c1fb660ef0c41dd1278a8a2ec386854e

 ///  File Name: sitexpress.txt
Description:
SiteXpress suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:411
Last Modified:Nov 16 16:17:54 2006
MD5 Checksum:ba994ebd49ae6225cb5817c1d46f1839

 ///  File Name: wwweb.txt
Description:
WWWeb Cocepts suffers from a SQL injection vulnerability.
Homepage:http://aria-security.net/
File Size:431
Last Modified:Nov 16 16:17:06 2006
MD5 Checksum:9a2e8fa7502ce312d4d44304f635cdd7

 ///  File Name: aspintranet.txt
Description:
ASPintranet suffers from a SQL injection flaw.
Homepage:http://aria-security.net/
File Size:373
Last Modified:Nov 16 16:15:33 2006
MD5 Checksum:c6ccba84d68125c0c6de5cfe879e463b

 ///  File Name: realSQL.txt
Description:
The Real Estate Listing System suffers from a SQL injection flaw.
Homepage:http://aria-security.net/
File Size:409
Last Modified:Nov 16 16:14:52 2006
MD5 Checksum:bbc71c53e8a85d61d8d157442412e588

 ///  File Name: broadcom_wifi_ssid.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Broadcom Wireless driver that allows remote code execution in kernel mode by sending a 802.11 probe response that contains a long SSID. The target MAC address must be provided to use this exploit. The two cards tested fell into the 00:14:a5:06:XX:XX and 00:14:a4:2a:XX:XX ranges.
Author:Chris Eagle, Johnny Cache, skape, H D Moore
Homepage:http://projects.info-pull.com/mokb/
File Size:5063
Last Modified:Nov 14 08:59:18 2006
MD5 Checksum:8e29a33ce3fa0dea0811bce89496dec2

 ///  File Name: dlink_wifi_rates.rb.txt
Description:
This Metasploit module exploits a stack overflow in the A5AGU.SYS driver provided with the D-Link DWL-G132 USB wireless adapter. This stack overflow allows remote code execution in kernel mode. The stack overflow is triggered when a 802.11 Beacon frame is received that contains a long Rates information element. This exploit was tested with version 1.0.1.41 of the A5AGU.SYS driver and a D-Link DWL-G132 USB adapter (HW: A2, FW: 1.02). Newer versions of the A5AGU.SYS driver are provided with the D-Link WUA-2340 adapter and appear to resolve this flaw, but D-Link does not offer an updated driver for the DWL-G132. Since this vulnerability is exploited via beacon frames, all cards within range of the attack will be affected. The tested adapter used a MAC address in the range of 00:11:95:f2:XX:XX.
Author:H D Moore, Matt Miller, Johnny Cache, LMH
Homepage:http://projects.info-pull.com/mokb/
File Size:5873
Last Modified:Nov 14 08:56:53 2006
MD5 Checksum:a403e8304d2632dbf796bf0e140b69a9

 ///  File Name: minibb2-rfi.txt
Description:
MiniBB Forum versions 2.0 and below suffer from a remote file inclusion vulnerability in index.php.
Author:ThE-LoRd-Of-CrAcKiNg
File Size:1335
Last Modified:Nov 14 08:28:22 2006
MD5 Checksum:434d0cda87e8545b15ddfef150870811