exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files from Exploit Labs

First Active2004-05-12
Last Active2006-10-20
Exploit Labs Security Advisory 2006.5
Posted Oct 20, 2006
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2006-005 exploitlabs.com Retro Advisory 002 - SHTTPD: SHTTPD is vulnerable to an overly long GET request.

tags | advisory
SHA-256 | 9ecaa0cca2d02c7da5a4e9a9cc79e5eee2bc762ddd43342d7059ab4877555440
Exploit Labs Security Advisory 2006.4
Posted Jul 2, 2006
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2006-004 exploitlabs.com Advisory 049 - phpFormGenerator forces insecure usage of permissions for the application to work.

tags | exploit
SHA-256 | 7409cc0d2a8c442311df468f57b9b2f314bdcfcc3caa612cba3fa534895c9ee8
Exploit Labs Security Advisory 2006.1
Posted Jan 11, 2006
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

exploitlabs.com Advisory 047 - AspTopSites is susceptible to SQL injection attacks. Details on exploitation provided.

tags | exploit, sql injection
SHA-256 | ae0500296b7791f6b8c62c297a23bd0ff3f72a1806282d10ee61c8b5a66629a4
Exploit Labs Security Advisory 2005.17
Posted Dec 28, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2005-017 exploitlabs.com Advisory 046 - Dev hound suffers from multiple vulnerabilities including XSS and path disclosure.

tags | advisory, vulnerability
SHA-256 | 91c0c40600c9b49ab6f372d2158ef227d46eba203d6428fb4507b65dbd700319
Exploit Labs Security Advisory 2005.15
Posted Oct 6, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

TellMe versions 1.2 and below are susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | e0d8d19326916e2fc873564e971c288d15bf3ace0da18692fdb232e9bac8d1fb
Exploit Labs Security Advisory 2005.14
Posted Sep 23, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Perldiver versions 1.x and 2.x suffer from cross site scripting flaws.

tags | exploit, xss
SHA-256 | c119c3422a6ce54a1acc8dfdade412bb0bdd52b52a6876f319a899bcea72823c
Exploit Labs Security Advisory 2005.10
Posted Aug 17, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Mac OS X Weblog Server version 10.4.0 is susceptible to cross site scripting attacks.

tags | exploit, xss
systems | apple, osx
advisories | CVE-2005-2523
SHA-256 | cd839b3975e97a7cc43a50f400458622d99c52a49dfd7c5d496467a705bb86ae
Exploit Labs Security Advisory 2005.8
Posted Aug 7, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Site Studio guestbook does not filter HTML code from user-supplied input. A remote user can create a specially crafted entry that, when the page rendered, will cause arbitrary scripting to be executed by the user's browser.

tags | advisory, remote, arbitrary
SHA-256 | d1ecee131bdc6efb5f7fa557e952149ebfb57fd6db7044011a2e7d9c08c7f7ee
Exploit Labs Security Advisory 2005.7
Posted Aug 7, 2005
Authored by Donnie Werner, Exploit Labs

H-Sphere allows for local username and password disclosure.

tags | advisory, local
SHA-256 | 3ce67c3e92d804139dd783d5e61b2ca3af8105f347e031dc542d406b77434aa4
Exploit Labs Security Advisory 2005.11
Posted Jul 7, 2005
Authored by Donnie Werner, Exploit Labs

QuickBlogger version 1.4 and below is susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | ff3e82e8c502f427c05bcddb61b4a211c3bbd510fcae82f3c5f0ed4868c38b20
Exploit Labs Security Advisory 2005.9
Posted Jun 21, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Cool Cafe Chat 1.2.1 suffers from a SQL injection vulnerability via an unsanitized password variable.

tags | exploit, sql injection
SHA-256 | 6b78863a9257dee742b652723b329cb3ae31c28d7db77fd5ad0dc78f007e9109
Exploit Labs Security Advisory 2005.6
Posted Apr 18, 2005
Authored by Exploit Labs, Morning Wood | Site exploitlabs.com

XAMPP contains multiple vulnerabilities, including default usernames / passwords and Cross-site scripting issues. Example exploit URLs provided as part of advisory.

tags | exploit, vulnerability, xss
SHA-256 | 1c1cffe32942fde51d981767af0ae64e1987d397b5288232d1cce12aa159380c
Exploit Labs Security Advisory 2005.3
Posted Mar 30, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Adventia Chat Server Pro 3.0 suffers from cross site scripting flaw.

tags | advisory, xss
SHA-256 | f5be810e51ce7ac691078c31fe2d121af2db6850a6b2fbc89c05a553bf3508c8
Exploit Labs Security Advisory 2005.3
Posted Mar 30, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

E-Data 2.0 is susceptible to cross site scripting flaws in its search functionality.

tags | advisory, xss
SHA-256 | 820a3a8cc04faebb9fe783b48bdadd595291f8984a989a7e12280e2bbcad577e
Exploit Labs Security Advisory 2005.2
Posted Mar 22, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2005-002 exploitlabs.com Advisory 031 - The Samsung ADSL Modem ships with default root, admin, and user accounts and also allows for arbitrary file access on the underlying filesystem.

tags | exploit, arbitrary, root
SHA-256 | 8781cdcc8a0e6d219a4402867b7c5194121711e509530df3a557353ae00e8bfe
Exploit Labs Security Advisory 2005.1
Posted Feb 22, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2005-001 exploitlabs.com Advisory 030 - A vulnerability in Microsoft Outlook Web Access allows malicious attackers to redirect the login to any URL they wish.

tags | exploit, web
SHA-256 | cc0fadb803b3aa16e9acd02377c86e4024ea510cee5b3e6bb7f1f5c8d1dfa1bf
Exploit Labs Security Advisory 2004.2
Posted Jun 7, 2004
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

SurgeMail 1.x is susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | e147d20f72f67a6e383c4c5c6754d254d02006b048bfcbfb5ace73ccb50f3091
Exploit Labs Security Advisory 2003.27
Posted May 12, 2004
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Exploitlabs.com Advisory 27 - Microsoft Windows Help and Support Center has a vulnerability due to an unspecified input validation error. This can be exploited via the HCP protocol on Microsoft Windows XP and Microsoft Windows 2003 through Internet Explorer or Outlook and allows for arbitrary code execution.

tags | advisory, arbitrary, code execution, protocol
systems | windows
SHA-256 | d988b8210aca1e91cb4d3d9dd5b3f573ea60e02d6175fb32fad685eae2dc0074
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close