Section:  .. / 0807-exploits  /

Page 4 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 75 - 100 of 268
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: msaccess-activex.txt
Description:
Microsoft Access ActiveX related remote exploit that makes use of Snapview.ocx version 10.0.5529.0.
Author:callAX
Homepage:http://goodfellas.shellcode.com.ar/
File Size:1430
Last Modified:Jul 24 12:21:15 2008
MD5 Checksum:aff43a4e8259ae6e765d04ccc03f104a

 ///  File Name: wordpressdm-upload.txt
Description:
WordPress Download Manager plugin version 0.2 arbitrary file upload exploit.
Author:SaO
Homepage:http://www.saohackstyle.com/
File Size:886
Last Modified:Jul 24 12:20:02 2008
MD5 Checksum:ab5a1c03a0efe55d5896dd7fcf629eec

 ///  File Name: ibase-disclose.txt
Description:
ibase versions 2.03 and below suffer from a remote file disclosure vulnerability in download.php.
Author:Dyshoo
File Size:254
Last Modified:Jul 24 12:18:51 2008
MD5 Checksum:fe43ec1fa0a052b7535851f9cb69cd63

 ///  File Name: atomphotoblog-sql.txt
Description:
Atom PhotoBlog version 1.1.5b1 suffers from a remote SQL injection vulnerability.
Author:Mr.SQL
Homepage:http://www.pal-hacker.com/
File Size:1488
Last Modified:Jul 24 12:17:57 2008
MD5 Checksum:69a36f18579002640832d44da0a6de28

 ///  File Name: bailiwicked_domain.rb.txt
Description:
This exploit targets a fairly ubiquitous flaw in DNS implementations which allow the insertion of malicious DNS records into the cache of the target nameserver. This exploit caches a single malicious nameserver entry into the target nameserver which replaces the legitimate nameservers for the target domain. By causing the target nameserver to query for random hostnames at the target domain, the attacker can spoof a response to the target server including an answer for the query, an authority server record, and an additional record for that server, causing target nameserver to insert the additional record into the cache. This insertion completely replaces the original nameserver records for the target domain.
Author:I)ruid,H D Moore
Homepage:http://www.caughq.org/
File Size:15954
Related CVE(s):CVE-2008-1447
Last Modified:Jul 24 12:14:00 2008
MD5 Checksum:5882e859718d26d63b3bc1167eacb0fd

 ///  File Name: bailiwicked_host.rb.txt
Description:
This exploit targets a fairly ubiquitous flaw in DNS implementations which allow the insertion of malicious DNS records into the cache of the target nameserver. This exploit caches a single malicious host entry into the target nameserver. By causing the target nameserver to query for random hostnames at the target domain, the attacker can spoof a response to the target server including an answer for the query, an authority server record, and an additional record for that server, causing target nameserver to insert the additional record into the cache.
Author:I)ruid,H D Moore
Homepage:http://www.caughq.org/
File Size:16025
Related CVE(s):CVE-2008-1447
Last Modified:Jul 23 20:05:48 2008
MD5 Checksum:4def3738d35dc00d760fa023d0106a29

 ///  File Name: emc-sql.txt
Description:
EMC's Centera Universal Access product version CUA4.0_4735.p4 suffers from a SQL injection vulnerability.
Author:Aaron Brown,Lars Heidelberg
File Size:4007
Last Modified:Jul 23 19:44:55 2008
MD5 Checksum:535213a9fae7b8708f9e219a84119c62

 ///  File Name: joomlamamml-upload.txt
Description:
The Joomla Mamml component suffers from a remote file disclosure vulnerability.
Author:e.wiZz!
File Size:627
Last Modified:Jul 23 19:26:13 2008
MD5 Checksum:0a4d3aebca4602e890770992430bc74c

 ///  File Name: oss-bypass.txt
Description:
Outpost Security Suite Pro version 2009 suffers from multiple bypass vulnerabilities when using special characters.
Author:Juan Pablo Lopez Yacubian
File Size:2287
Last Modified:Jul 23 19:21:59 2008
MD5 Checksum:7570d3a72f5096b9588136427c83cebc

 ///  File Name: PR08-16.txt
Description:
Moodle versions 1.7.4 and below suffer from a cross site request forgery vulnerability.
Homepage:http://www.procheckup.com/
File Size:4631
Last Modified:Jul 23 19:20:03 2008
MD5 Checksum:3a664b6adfa3d72f4d9f2a8baec3e8ec

 ///  File Name: PR08-13.txt
Description:
A cross site scripting vulnerability exists in Moodle versions 1.7.4 and below.
Homepage:http://www.procheckup.com/
File Size:2955
Last Modified:Jul 23 19:18:13 2008
MD5 Checksum:2c780311bb56dbfd1b088e81afe2297d

 ///  File Name: presurveypoll-sql.txt
Description:
Pre Survey Poll suffers from a SQL injection vulnerability in default.asp.
Author:DreamTurk
File Size:723
Last Modified:Jul 23 18:49:39 2008
MD5 Checksum:4c8cc48caee75fdfa46bf471483ffa69

 ///  File Name: ezwebalbum-cookie.txt
Description:
EZWebAlbum suffers from an insecure cookie handling vulnerability that allows anyone to be an administrator.
Author:hadihadi
Homepage:http://www.virangar.org/
File Size:1539
Last Modified:Jul 23 18:48:56 2008
MD5 Checksum:dd69a0f4eeaba3414e0cf5efa2ed5988

 ///  File Name: minix-dos.txt
Description:
Minix version 3.1.2a suffers from a tty panic local denial of service vulnerability.
Author:Knud Erik Hojgaard
File Size:577
Last Modified:Jul 23 18:47:56 2008
MD5 Checksum:a22651fcf1856f9932203452a358dc4e

 ///  File Name: intellitamper207-exec.txt
Description:
IntelliTamper version 2.07 server header remote code execution exploit.
Author:Koshi
File Size:3030
Last Modified:Jul 23 18:46:53 2008
MD5 Checksum:74a2288e27182326674ac87efbcd2952

 ///  File Name: intellitamper207-overflow.c
Description:
IntelliTamper version 2.0.7 html parser remote buffer overflow exploit.
Author:r0ut3r
File Size:3008
Last Modified:Jul 23 18:45:59 2008
MD5 Checksum:88adf11e2c77e652031d76ddfa50908f

 ///  File Name: DSECRG-08-032.txt
Description:
Claroline eLearning and eWorking Platform version 1.8.10 suffers from cross site scripting vulnerabilities.
Author:Digital Security Research Group
Homepage:http://www.dsec.ru/
File Size:2842
Last Modified:Jul 22 14:01:02 2008
MD5 Checksum:f71ed888ac06312f64ea478ffcfbd3f2

 ///  File Name: shopcartdx-sql.txt
Description:
ShopCartDx version 4.30 suffers from a remote SQL injection vulnerability.
Author:Cr@zy_King
File Size:450
Last Modified:Jul 22 13:38:51 2008
MD5 Checksum:f0f09d010d615e954dc6bfdb548ae189

 ///  File Name: youtubeblog-rfisqlxss.txt
Description:
YouTube Blog version 0.1 suffers from remote file inclusion, SQL injection, and cross site scripting vulnerabilities.
Author:unohope
Homepage:http://www.chroot.org/
File Size:1361
Last Modified:Jul 22 13:38:13 2008
MD5 Checksum:9c83470e6b3fb9d7f64df17a816bc054

 ///  File Name: intellitamper-overflow.txt
Description:
IntelliTamper version 2.0.7 html parser remote buffer overflow exploit.
Author:Guido Landi
File Size:1934
Last Modified:Jul 22 13:37:17 2008
MD5 Checksum:768f68895d134f16b4510549cd649793

 ///  File Name: modjk1219-overflow.txt
Description:
Apache mod_jk version 1.2.19 remote buffer overflow exploit for win32.
Author:unohope
Homepage:http://www.chroot.org/
File Size:6190
Last Modified:Jul 22 13:36:06 2008
MD5 Checksum:53fca1af8a7eee242ef26ee3bac1db44

 ///  File Name: zdaemonull.zip
Description:
ZDaemon version 1.08.07 denial of service exploit that makes use of a NULL pointer vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:zdaemonull.txt
File Size:489489
Last Modified:Jul 21 18:18:59 2008
MD5 Checksum:5f9b6541fd39cf4504ce5850fe7e2902

 ///  File Name: DSEGRG-08-31.txt
Description:
Interact E-Learning System version 2.4.1 suffers from a local file inclusion vulnerability in help/help.php.
Author:Digital Security Research Group
Homepage:http://www.dsec.ru/
File Size:2242
Last Modified:Jul 21 18:06:52 2008
MD5 Checksum:ccda3be106036a8fbfe5b9e8eace4a84

 ///  File Name: mojoauto-sql.txt
Description:
MojoAuto remote blind SQL injection exploit that leverages mojoAuto.cgi.
Author:Mr.SQL
Homepage:http://www.pal-hacker.com/
File Size:2936
Last Modified:Jul 21 17:47:35 2008
MD5 Checksum:d04691ad559e33cbbc59249c39579e5c

 ///  File Name: mojojobs-sql.txt
Description:
MojoJobs remote blind SQL injection exploit that leverages mojoJobs.cgi.
Author:Mr.SQL
Homepage:http://www.pal-hacker.com/
File Size:2924
Last Modified:Jul 21 17:46:46 2008
MD5 Checksum:461b2c496a611ce5d039516b65ed8f42