Section:  .. / 0603-exploits  /

Page 3 of 7
<< 1 2 3 4 5 6 7 >> Files 50 - 75 of 158
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: evoBlogXSS.txt
Description:
evoBlog is prone to cross site scripting attacks via commentaries.
Author:sikik
Homepage:http://www.ajaxreview.com/
File Size:600
Last Modified:Mar 8 08:42:13 2006
MD5 Checksum:d9f00f24047074a049e2057172f6902f

 ///  File Name: explorerXP.txt
Description:
All versions of ExplorerXP suffer cross site scripting and directory traversal flaws. Written in French.
Author:Amine ABOUD aka Silitix
Homepage:http://www.Silitix.com
File Size:1106
Last Modified:Apr 1 07:51:14 2006
MD5 Checksum:0cbc53bed241e291a6f10b453e161db3

 ///  File Name: EzASPSiteSQL.txt
Description:
EzASPSite version 2.0 RC3 and below remote SQL injection exploit.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1214
Last Modified:Apr 1 08:56:14 2006
MD5 Checksum:288348ce057b31fd0f4c35b11a628b9d

 ///  File Name: FantasticSQL.txt
Description:
Fantastic News version 2.1.1 is susceptible to multiple SQL injection attacks.
Author:SAUDI
File Size:302
Last Modified:Mar 2 10:27:02 2006
MD5 Checksum:fa473eaf52926915c94050468dcc155a

 ///  File Name: freecivdos.zip
Description:
Proof of concept denial of service exploit for Freeciv versions 2.0.7 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:freeciv207.txt
File Size:6456
Last Modified:Mar 8 08:50:41 2006
MD5 Checksum:9e06e9ff00fa21066185db2ee40471d7

 ///  File Name: FusionPHP.txt
Description:
FusionPHP version 1.0 is susceptible to cross site scripting, remote command execution, and remote file inclusion flaws. Exploitation details provided.
Author:0o_zeus_o0
Homepage:http://www.elitemexico.org
File Size:2013
Last Modified:Mar 3 09:14:01 2006
MD5 Checksum:c9feafdc236ba3023ab7a0cb9394caa4

 ///  File Name: gallery203.php.txt
Description:
Gallery version 2.0.3 and below stepOrder[] remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6784
Last Modified:Mar 9 07:03:47 2006
MD5 Checksum:d7a42fdd2ffe4c81b910cf7fd5d200ae

 ///  File Name: gamepanel.txt
Description:
Game-Panel versions 2.6.1 and below suffer from a cross site scripting flaw.
Author:retard, jim, sycko
File Size:533
Last Modified:Mar 8 05:52:36 2006
MD5 Checksum:4be47379d4be4047da20686ab509c5f8

 ///  File Name: gcards_145_xpl.html
Description:
Gallery versions 2.0.3 and below stepOrder[] remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14154
Last Modified:Apr 1 11:47:22 2006
MD5 Checksum:f7d7eb5902ff27604aec1548d2b1d76f

 ///  File Name: gregariusXSSSQL.txt
Description:
Gregarius version 0.5.2 is susceptible to cross site scripting and SQL injection vulnerabilities.
Author:tzitaroth
File Size:890
Last Modified:Mar 6 08:19:27 2006
MD5 Checksum:26086809d327c018deac398dbc10302c

 ///  File Name: greymatter121d-1.pl.txt
Description:
GreyMatter WebLog versions 1.21d and below remote command execution exploit.
Author:Hessam-X
Homepage:http://www.deltahacking.com
File Size:1645
Last Modified:Apr 1 08:22:43 2006
MD5 Checksum:0cf8dfe232f4a9b52eaa5e4423a388c4

 ///  File Name: greymatter121d-2.c
Description:
GreyMatter WebLog versions 1.21d and below remote command execution exploit.
Author:No_Face_king
Homepage:http://www.crouz.com
File Size:2690
Last Modified:Apr 1 08:23:38 2006
MD5 Checksum:b4ef90cfd62751dda2f921ea61f54e12

 ///  File Name: guppyDoS.txt
Description:
There is a high risk vulnerability in Guppy versions 4.5.11 and below that will allow remote attackers to destroy database files. Details provided.
Author:trueend5
Homepage:http://www.kapda.ir
File Size:2759
Last Modified:Mar 11 03:46:20 2006
MD5 Checksum:c026a973a1e5bfc98de4e5e0ad757d5d

 ///  File Name: HeffnerCMS.txt
Description:
HeffnerCMS version 1.07 is susceptible to cross site scripting attacks.
Author:botan
File Size:698
Last Modified:Apr 1 06:31:52 2006
MD5 Checksum:c8bdff46a288a3a82f77b721a6ea04dd

 ///  File Name: HT.c
Description:
A vulnerability in HT 9.1 allows attackers to supply a malicious file that will cause a buffer overflow to occur when it copies [file name] to [fullfilename] and print it on *htapp::window_create_file_bin using *printf()*. Local exploit.
Author:Qnix
File Size:2856
Last Modified:Mar 21 20:40:39 2006
MD5 Checksum:0251bf38db6b8951cb8743a808db3f74

 ///  File Name: HYSA-2006-005.txt
Description:
h4cky0u.org Advisory 014 - WordPress 2.0.1 Remote DoS Exploit. Written in perl.
Author:Illuminatus
Homepage:http://www.h4cky0u.org
File Size:8425
Last Modified:Mar 9 04:56:01 2006
MD5 Checksum:5005f982d0cf6772b3c79f4aa5de181c

 ///  File Name: HYSA-2006-006-g-book.txt
Description:
G-Book version 1.0 is susceptible to cross site scripting attacks.
Author:matrix_k, h4cky0u
Homepage:http://www.h4cky0u.org
File Size:1701
Last Modified:Apr 1 07:40:49 2006
MD5 Checksum:ea986e4e11da064400f16b6d1c4bc8bd

 ///  File Name: HYSA-2006-007-phpmyfamily.txt
Description:
phpmyfamily version 1.4.1 is susceptible to CRLF injection and cross site scripting attacks.
Author:matrix_k, h4cky0u
Homepage:http://www.h4cky0u.org/
File Size:1992
Last Modified:Apr 1 07:39:21 2006
MD5 Checksum:1f449573a48a4977386a61fde58d6bd0

 ///  File Name: imlock2006.txt
Description:
IM Lock 2006 suffers from a local password encryption weakness. Exploit included.
Author:fRoGGz
Homepage:http://secubox.shadock.net
File Size:3691
Last Modified:Mar 8 09:45:25 2006
MD5 Checksum:855c5b38e055c4c0743d0ac16cc28c81

 ///  File Name: ipb-v2.1.5.txt
Description:
Invision Power Board v2.1.5 suffers from SQL injection.
Author:Mr.SNAKE
Homepage:http://www.lezr.com
File Size:526
Last Modified:Mar 8 06:40:16 2006
MD5 Checksum:a42aceb251f5a9580ae30882d9004d38

 ///  File Name: irix6local.txt
Description:
SGI IRIX 6.5 local root exploit that makes use of /usr/sysadm/bin/lezririx.
Author:RoDhEDoR
File Size:1248
Last Modified:Mar 12 23:05:39 2006
MD5 Checksum:accacb1a726b2b73f1a62b596bc361f3

 ///  File Name: Jiros.txt
Description:
Jiros Banner Experience Pro versions 1.0 and below suffer from an authentication bypass vulnerability allowing any user to add a new administrative account. POC included.
Author:Mustafa Can Bjorn
Homepage:http://www.nukedx.com
File Size:3593
Last Modified:Mar 10 01:45:49 2006
MD5 Checksum:9296917cde276b6304fd51ab9780dcc3

 ///  File Name: JirosBanner.txt
Description:
Jiros Banner Experience Pro version 1.0 is susceptible to a remote privilege escalation flaw.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:3405
Last Modified:Mar 11 03:54:59 2006
MD5 Checksum:51fb10b7e62aa42a940bf22e31e7f1c3

 ///  File Name: joomla.txt
Description:
Joomla! CMS version 1.0.7 is susceptible to arbitrary file creation and denial of service flaws.
Author:Foster
Homepage:http://rst.void.ru/
File Size:1578
Last Modified:Mar 3 09:20:09 2006
MD5 Checksum:cbd8a8e2905436bf59ace2879d86f52c

 ///  File Name: JupiterCMS.txt
Description:
Jupiter CMS versions 1.1.5 and below suffer from multiple cross site scripting attack vectors. Details provided.
Author:zerogue
Homepage:http://0x4f4c.awardspace.com
File Size:1528
Last Modified:Mar 12 22:58:46 2006
MD5 Checksum:2a7b56e72aceb285d2cee9f31217e29b